Skip to main content

and
  1. Chapter and Conference Paper

    McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes

    On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably secure ag...

    Ewan Fleischmann, Christian Forler, Stefan Lucks in Fast Software Encryption (2012)

  2. No Access

    Chapter and Conference Paper

    Mars Attacks! Revisited:

    The block cipher MARS has been designed by a team from IBM and became one of the five finalists for the AES. A unique feature is the usage of two entirely different round function types. The ”wrapper rounds” a...

    Michael Gorski, Thomas Knapke, Eik List in Progress in Cryptology – INDOCRYPT 2011 (2011)

  3. No Access

    Chapter and Conference Paper

    New Boomerang Attacks on ARIA

    ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of tha...

    Ewan Fleischmann, Christian Forler in Progress in Cryptology - INDOCRYPT 2010 (2010)

  4. No Access

    Chapter and Conference Paper

    Some Observations on Indifferentiability

    At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural flaws in iterated hash functions. If one cannot differentiate a hash function using ideal primitives from a ra...

    Ewan Fleischmann, Michael Gorski, Stefan Lucks in Information Security and Privacy (2010)

  5. No Access

    Chapter and Conference Paper

    Attacks on the DECT Authentication Mechanisms

    Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic algorithms used in DECT are not ...

    Stefan Lucks, Andreas Schuler, Erik Tews in Topics in Cryptology – CT-RSA 2009 (2009)

  6. No Access

    Chapter and Conference Paper

    New Related-Key Boomerang Attacks on AES

    In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2

    Michael Gorski, Stefan Lucks in Progress in Cryptology - INDOCRYPT 2008 (2008)

  7. No Access

    Chapter and Conference Paper

    Concrete Security for Entity Recognition: The Jane Doe Protocol

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The cur...

    Stefan Lucks, Erik Zenner, André Weimerskirch in Progress in Cryptology - INDOCRYPT 2008 (2008)

  8. Chapter and Conference Paper

    A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order

    The Cramer-Shoup cryptosystem for groups of prime order is a practical public-key cryptosystem, provably secure in the standard model under standard assumptions. This paper extends the cryptosystem for groups ...

    Stefan Lucks in Advances in Cryptology — ASIACRYPT 2002 (2002)