Tight security bounds for key-alternating ciphers S Chen, J Steinberger Annual International Conference on the Theory and Applications of …, 2014 | 220 | 2014 |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ... Annual international conference on the theory and applications of …, 2012 | 117 | 2012 |
Minimizing the two-round Even–Mansour cipher S Chen, R Lampe, J Lee, Y Seurin, J Steinberger Journal of Cryptology 31 (4), 1064-1119, 2018 | 100 | 2018 |
Constructing cryptographic hash functions from fixed-key blockciphers P Rogaway, J Steinberger Annual International Cryptology Conference, 433-450, 2008 | 92 | 2008 |
Security/efficiency tradeoffs for permutation-based hashing P Rogaway, J Steinberger Annual International Conference on the Theory and Applications of …, 2008 | 80 | 2008 |
The collision intractability of MDC-2 in the ideal-cipher model JP Steinberger Annual International Conference on the Theory and Applications of …, 2007 | 79 | 2007 |
On the indifferentiability of key-alternating ciphers E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger Annual Cryptology Conference, 531-550, 2013 | 76 | 2013 |
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC Y Dodis, T Ristenpart, J Steinberger, S Tessaro Annual Cryptology Conference, 348-366, 2012 | 63 | 2012 |
Improved security bounds for key-alternating ciphers via Hellinger distance J Steinberger Cryptology ePrint Archive, 2012 | 56 | 2012 |
The collision security of Tandem-DM in the ideal cipher model J Lee, M Stam, J Steinberger Annual Cryptology Conference, 561-577, 2011 | 53 | 2011 |
Random oracles and non-uniformity S Coretti, Y Dodis, S Guo, J Steinberger Annual International Conference on the Theory and Applications of …, 2018 | 45 | 2018 |
The preimage security of double-block-length compression functions F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger International Conference on the Theory and Application of Cryptology and …, 2011 | 45 | 2011 |
Indifferentiability of 8-round Feistel networks Y Dai, J Steinberger Annual International Cryptology Conference, 95-120, 2016 | 41 | 2016 |
Message authentication codes from unpredictable block ciphers Y Dodis, J Steinberger Annual International Cryptology Conference, 267-285, 2009 | 38 | 2009 |
Domain extension for MACs beyond the birthday barrier Y Dodis, J Steinberger Annual International Conference on the Theory and Applications of …, 2011 | 36 | 2011 |
Indifferentiability of confusion-diffusion networks Y Dodis, M Stam, J Steinberger, T Liu Annual International Conference on the Theory and Applications of …, 2016 | 35 | 2016 |
Minimal vanishing sums of roots of unity with large coefficients JP Steinberger Proceedings of the London Mathematical Society 97 (3), 689-717, 2008 | 32 | 2008 |
Provable security of (tweakable) block ciphers based on substitution-permutation networks B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ... Annual International Cryptology Conference, 722-753, 2018 | 21 | 2018 |
Pseudorandom functions in almost constant depth from low-noise LPN Y Yu, J Steinberger Annual International Conference on the Theory and Applications of …, 2016 | 21 | 2016 |
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation J Lee, J Steinberger IEEE transactions on information theory 58 (9), 6165-6182, 2012 | 20 | 2012 |