Author of the publication

Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function.

, , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 511-536. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Post-quantum Security of Classical Authenticated Encryption Schemes., and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 79-104. Springer, (2023)Webis-Mnemonics-17., , and . (March 2017)Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers., and . ECMAST, volume 1629 of Lecture Notes in Computer Science, page 456-471. Springer, (1999)Cryptanalysis of ForkAES., , , , , , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 43-63. Springer, (2019)Issues on Designing a Cryptographic Compiler., , and . WEWoRC, volume P-74 of LNI, page 109-122. GI, (2005)Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function., , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 511-536. Springer, (2022)Mobile Identity Management Revisited., and . STM@IFIPTM, volume 244 of Electronic Notes in Theoretical Computer Science, page 125-137. Elsevier, (2008)Formal Language Theory for Practical Security - Extended Abstract -., , and . SP (Workshops), page 101-110. IEEE, (2021)Implicit Key-Stretching Security of Encryption Schemes., , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 17-40. Springer, (2022)Entity Recognition for Sensor Network Motes., , , and . GI Jahrestagung (2), volume P-68 of LNI, page 145-149. GI, (2005)