What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefan Lucks
Google Scholar
ORCID:
0000-0003-4906-5131
54
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Turning Hash-Based Signatures into Distributed Signatures and Threshold Signatures: Delegate Your Signing Capability, and Distribute it Among Trustees.
John Kelsey
Nathalie Lang
Stefan Lucks
2024
journals/tosc
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF.
John Kelsey
Stefan Lucks
Stephan Müller
2023
conf/africacrypt
On the Post-quantum Security of Classical Authenticated Encryption Schemes.
Nathalie Lang
Stefan Lucks
2022
conf/icisc
Implicit Key-Stretching Security of Encryption Schemes.
Jannis Bossert
Eik List
Stefan Lucks
2022
conf/ctrsa
Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function.
Jannis Bossert
Eik List
Stefan Lucks
Sebastian Schmitz
2021
conf/sp
Formal Language Theory for Practical Security - Extended Abstract -.
Andreas Jakoby
Jannis Leuther
Stefan Lucks
2019
conf/acns
Cryptanalysis of ForkAES.
Subhadeep Banik
Jannis Bossert
Amit Jana
Eik List
Stefan Lucks
Willi Meier
Mostafizar Rahman
Dhiman Saha
Yu Sasaki
2017
conf/acisp
Reforgeability of Authenticated Encryption Schemes.
Christian Forler
Eik List
Stefan Lucks
Jakob Wenzel
2017
conf/sp
Taming the Length Field in Binary Data: Calc-Regular Languages.
Stefan Lucks
Norina Marie Grosch
Joshua Konig
2017
conf/ches
Gimli : A Cross-Platform Permutation.
Daniel J. Bernstein
Stefan Kölbl
Stefan Lucks
Pedro Maat Costa Massolino
Florian Mendel
Kashif Nawaz
Tobias Schneider
Peter Schwabe
François-Xavier Standaert
Yosuke Todo
Benoît Viguier
2017
conf/ndss
A Large-scale Analysis of the Mnemonic Password Advice.
Johannes Kiesel
Benno Stein
Stefan Lucks
2016
conf/fse
RIV for Robust Authenticated Encryption.
Farzaneh Abed
Christian Forler
Eik List
Stefan Lucks
Jakob Wenzel
2016
conf/acisp
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
Christian Forler
Eik List
Stefan Lucks
Jakob Wenzel
2016
conf/sacrypt
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity.
Muhammad Barham
Orr Dunkelman
Stefan Lucks
Marc Stevens
2015
conf/ctrsa
Hash Functions from Defective Ideal Ciphers.
Jonathan Katz
Stefan Lucks
Aishwarya Thiruvengadam
2014
conf/fse
Differential Cryptanalysis of Round-Reduced Simon and Speck.
Farzaneh Abed
Eik List
Stefan Lucks
Jakob Wenzel
2014
conf/fse
Pipelineable On-line Encryption.
Farzaneh Abed
Scott R. Fluhrer
Christian Forler
Eik List
Stefan Lucks
David A. McGrew
Jakob Wenzel
2014
conf/asiacrypt
Memory-Demanding Password Scrambling.
Christian Forler
Stefan Lucks
Jakob Wenzel
2014
conf/africacrypt
Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions.
Farzaneh Abed
Christian Forler
Eik List
Stefan Lucks
Jakob Wenzel
2013
conf/fse
A Framework for Automated Independent-Biclique Cryptanalysis.
Farzaneh Abed
Christian Forler
Eik List
Stefan Lucks
Jakob Wenzel
2013
conf/fse
Attacks and Security Proofs of EAX-Prime.
Kazuhiko Minematsu
Stefan Lucks
Hiraku Morita
Tetsu Iwata
2013
conf/provsec
Improved Authenticity Bound of EAX, and Refinements.
Kazuhiko Minematsu
Stefan Lucks
Tetsu Iwata
2012
conf/fse
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes.
Ewan Fleischmann
Christian Forler
Stefan Lucks
2012
conf/acisp
Weimar-DM: A Highly Secure Double-Length Compression Function.
Ewan Fleischmann
Christian Forler
Stefan Lucks
Jakob Wenzel
2012
conf/africacrypt
The Collision Security of MDC-4.
Ewan Fleischmann
Christian Forler
Stefan Lucks
2010
conf/acisp
Some Observations on Indifferentiability.
Ewan Fleischmann
Michael Gorski
Stefan Lucks
2010
conf/provsec
Collision Resistant Double-Length Hashing.
Ewan Fleischmann
Christian Forler
Michael Gorski
Stefan Lucks
2009
conf/fse
On the Security of Tandem-DM.
Ewan Fleischmann
Michael Gorski
Stefan Lucks
2009
conf/acisp
Attacking 9 and 10 Rounds of AES-256.
Ewan Fleischmann
Michael Gorski
Stefan Lucks
2009
conf/ctrsa
Attacks on the DECT Authentication Mechanisms.
Stefan Lucks
Andreas Schuler
Erik Tews
Ralf-Philipp Weinmann
Matthias Wenzel
2009
conf/asiacrypt
Improved Generic Algorithms for 3-Collisions.
Antoine Joux
Stefan Lucks
2008
conf/pkc
Efficient Simultaneous Broadcast.
Sebastian Faust
Emilia Käsper
Stefan Lucks
2008
conf/asiacrypt
Slide Attacks on a Class of Hash Functions.
Michael Gorski
Stefan Lucks
Thomas Peyrin
2006
conf/fse
Collisions and Near-Collisions for Reduced-Round Tiger.
John Kelsey
Stefan Lucks
2006
conf/sec
Authenticated Query Flooding in Sensor Networks.
Zinaida Benenson
Felix C. Freiling
Ernest Hammerschmidt
Stefan Lucks
Lexi Pimenidis
2005
conf/fse
Two-Pass Authenticated Encryption Faster Than Generic Composition.
Stefan Lucks
2005
conf/ches
Secure Data Management in Trusted Computing.
Ulrich Kühn
Klaus Kursawe
Stefan Lucks
Ahmad-Reza Sadeghi
Christian Stüble
2005
conf/asiacrypt
A Failure-Friendly Design Principle for Hash Functions.
Stefan Lucks
2004
conf/fse
Ciphers Secure against Related-Key Attacks.
Stefan Lucks
2003
conf/fse
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Niels Ferguson
Doug Whiting
Bruce Schneier
John Kelsey
Stefan Lucks
Tadayoshi Kohno
2003
conf/sec
How to turn a PIN into an Iron Beam.
Stefan Lucks
Rüdiger Weis
2002
conf/asiacrypt
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order.
Stefan Lucks
2001
conf/fse
Bias in the LEVIATHAN Stream Cipher.
Paul Crowley
Stefan Lucks
2001
conf/fse
The Saturation Attack - A Bait for Twofish.
Stefan Lucks
2001
conf/acisp
Improved Cryptanalysis of the Self-Shrinking Generator.
Erik Zenner
Matthias Krause
Stefan Lucks
2001
conf/sacrypt
Analysis of the E<sub>0</sub> Encryption System.
Scott R. Fluhrer
Stefan Lucks
2000
conf/fse
Improved Cryptanalysis of Rijndael.
Niels Ferguson
John Kelsey
Stefan Lucks
Bruce Schneier
Michael Stay
David A. Wagner
Doug Whiting
2000
conf/eurocrypt
The Sum of PRPs Is a Secure PRF.
Stefan Lucks
1999
conf/fse
Accelerated Remotely Keyed Encruption.
Stefan Lucks
1999
conf/fse
On Security of the 128-Bit Block Cipher DEAL.
Stefan Lucks
1998
conf/fse
Attacking Triple Encryption.
Stefan Lucks
1997
conf/fse
On the Security of Remotely Keyed Encryption.
Stefan Lucks
1996
conf/fse
Faster Luby-Rackoff Ciphers.
Stefan Lucks
1994
conf/fse
How to Exploit the Intractability of Exact TSP for Cryptography.
Stefan Lucks
Coauthors
Ahmad-Reza Sadeghi
(1)
Aishwarya Thiruvengadam
(1)
Amit Jana
(1)
Andreas Jakoby
(1)
Andreas Schuler
(1)
Antoine Joux
(1)
Benno Stein
(1)
Benoît Viguier
(1)
Bruce Schneier
(2)
Christian Forler
(11)
Christian Stüble
(1)
Daniel J. Bernstein
(1)
David A. McGrew
(1)
David A. Wagner
(1)
Dhiman Saha
(1)
Doug Whiting
(2)
Eik List
(10)
Emilia Käsper
(1)
Erik Tews
(1)
Erik Zenner
(1)
Ernest Hammerschmidt
(1)
Ewan Fleischmann
(7)
Farzaneh Abed
(5)
Felix C. Freiling
(1)
Florian Mendel
(1)
François-Xavier Standaert
(1)
Hiraku Morita
(1)
Jakob Wenzel
(9)
Jannis Bossert
(3)
Jannis Leuther
(1)
Johannes Kiesel
(1)
John Kelsey
(5)
Jonathan Katz
(1)
Joshua Konig
(1)
Kashif Nawaz
(1)
Kazuhiko Minematsu
(2)
Klaus Kursawe
(1)
Lexi Pimenidis
(1)
Marc Stevens
(1)
Matthias Krause
(1)
Matthias Wenzel
(1)
Michael Gorski
(5)
Michael Stay
(1)
Mostafizar Rahman
(1)
Muhammad Barham
(1)
Nathalie Lang
(2)
Niels Ferguson
(2)
Norina Marie Grosch
(1)
Orr Dunkelman
(1)
Paul Crowley
(1)
Pedro Maat Costa Massolino
(1)
Peter Schwabe
(1)
Ralf-Philipp Weinmann
(1)
Rüdiger Weis
(1)
Scott R. Fluhrer
(2)
Sebastian Faust
(1)
Sebastian Schmitz
(1)
Stefan Kölbl
(1)
Stefan Lucks
(54)
Stephan Müller
(1)
Subhadeep Banik
(1)
Tadayoshi Kohno
(1)
Tetsu Iwata
(2)
Thomas Peyrin
(1)
Tobias Schneider
(1)
Ulrich Kühn
(1)
Willi Meier
(1)
Yosuke Todo
(1)
Yu Sasaki
(1)
Zinaida Benenson
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to