Ivica Nikolić
Ivica Nikolić
Dirección de correo verificada de nus.edu.sg
Título
Citado por
Citado por
Año
Distinguisher and related-key attack on the full AES-256
A Biryukov, D Khovratovich, I Nikolić
Annual International Cryptology Conference, 231-249, 2009
3612009
Finding the greedy, prodigal, and suicidal contracts at scale
I Nikolić, A Kolluri, I Sergey, P Saxena, A Hobor
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
1782018
Tweaks and keys for block ciphers: the TWEAKEY framework
J Jean, I Nikolić, T Peyrin
International Conference on the Theory and Application of Cryptology and …, 2014
1462014
Rotational cryptanalysis of ARX
D Khovratovich, I Nikolić
International Workshop on Fast Software Encryption, 333-346, 2010
1422010
Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
A Biryukov, I Nikolić
Annual International Conference on the Theory and Applications of …, 2010
1192010
Deoxys v1. CAESAR submission
J Jean, I Nikolic, T Peyrin
76*2014
Rebound attack on the full LANE compression function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
702009
Rotational rebound attacks on reduced Skein
D Khovratovich, I Nikolić, C Rechberger
International Conference on the Theory and Application of Cryptology and …, 2010
692010
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolic, K Qiao, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology, 33-56, 2016
57*2016
Boomerang attacks on BLAKE-32
A Biryukov, I Nikolić, A Roy
International Workshop on Fast Software Encryption, 218-237, 2011
532011
Joltik v1. CAESAR submission
J Jean, I Nikolic, T Peyrin
51*2014
Collisions for step-reduced SHA-256
I Nikolić, A Biryukov
International Workshop on Fast Software Encryption, 1-15, 2008
492008
Security analysis of PRINCE
J Jean, I Nikolić, T Peyrin, L Wang, S Wu
Fast Software Encryption, 92-111, 2013
482013
Cryptanalysis of Round-Reduced\ mathtt {LED}
I Nikolić, L Wang, S Wu
Fast Software Encryption, 112-129, 2013
472013
Second-order differential collisions for reduced SHA-256
A Biryukov, M Lamberger, F Mendel, I Nikolić
International Conference on the Theory and Application of Cryptology and …, 2011
442011
Search for related-key differential characteristics in DES-like ciphers
A Biryukov, I Nikolić
International Workshop on Fast Software Encryption, 18-34, 2011
362011
Meet-in-the-middle attacks on generic Feistel constructions
J Guo, J Jean, I Nikolić, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2014
332014
Cryptanalysis of Zorro.
J Guo, I Nikolic, T Peyrin, L Wang
IACR Cryptology ePrint Archive 2013, 713, 2013
312013
Speeding up collision search for byte-oriented hash functions
D Khovratovich, A Biryukov, I Nikolic
Cryptographers’ Track at the RSA Conference, 164-181, 2009
292009
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.
AD Dwivedi, M Kloucek, P Morawiecki, I Nikolic, J Pieprzyk, S Wójtowicz
IACR Cryptology ePrint Archive 2016, 1053, 2016
242016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20