Author of the publication

Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function.

, , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 511-536. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers., and . ECMAST, volume 1629 of Lecture Notes in Computer Science, page 456-471. Springer, (1999)Cryptanalysis of ForkAES., , , , , , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 43-63. Springer, (2019)Security of the Ascon Authenticated Encryption Mode in the Presence of Quantum Adversaries., , , and . IACR Cryptol. ePrint Arch., (2025)On the Post-quantum Security of Classical Authenticated Encryption Schemes., and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 79-104. Springer, (2023)Webis-Mnemonics-17., , and . (March 2017)Generic Composition: From Classical to Quantum Security., , and . IACR Cryptol. ePrint Arch., (2025)Webis-Simple-Sentences-17 Corpus., , and . (February 2017)Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function., , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 511-536. Springer, (2022)Issues on Designing a Cryptographic Compiler., , and . WEWoRC, volume P-74 of LNI, page 109-122. GI, (2005)Mobile Identity Management Revisited., and . STM@IFIPTM, volume 244 of Electronic Notes in Theoretical Computer Science, page 125-137. Elsevier, (2008)