What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ivica Nikolic
Google Scholar
ORCID:
0000-0001-9578-4837
36
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/ccs
Unforgeability in Stochastic Gradient Descent.
Teodora Baluta
Ivica Nikolic
Racchit Jain
Divesh Aggarwal
Prateek Saxena
2021
journals/joc
The Deoxys AEAD Family.
Jérémy Jean
Ivica Nikolic
Thomas Peyrin
Yannick Seurin
2020
conf/sp
OHIE: Blockchain Scaling Made Simple.
Haifeng Yu
Ivica Nikolic
Ruomu Hou
Prateek Saxena
2018
conf/acsac
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale.
Ivica Nikolic
Aashish Kolluri
Ilya Sergey
Prateek Saxena
Aquinas Hobor
2017
conf/asiacrypt
How to Use Metaheuristics for Design of Symmetric-Key Primitives.
Ivica Nikolic
2016
journals/tosc
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
Jian Guo
Jérémy Jean
Ivica Nikolic
Yu Sasaki
2016
journals/tosc
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
Jian Guo
Jérémy Jean
Ivica Nikolic
Kexin Qiao
Yu Sasaki
Siang Meng Sim
2016
conf/fse
Efficient Design Strategies Based on the AES Round Function.
Jérémy Jean
Ivica Nikolic
2016
conf/asiacrypt
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem.
Ivica Nikolic
Yu Sasaki
2015
conf/fse
Rotational Cryptanalysis of ARX Revisited.
Dmitry Khovratovich
Ivica Nikolic
Josef Pieprzyk
Przemyslaw Sokolowski
Ron Steinfeld
2015
conf/fse
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation.
Jérémy Jean
Ivica Nikolic
2015
conf/asiacrypt
Refinements of the k-tree Algorithm for the Generalized Birthday Problem.
Ivica Nikolic
Yu Sasaki
2014
journals/joc
Rotational Rebound Attacks on Reduced Skein.
Dmitry Khovratovich
Ivica Nikolic
Christian Rechberger
2014
conf/ctrsa
Analysis of BLAKE2.
Jian Guo
Pierre Karpman
Ivica Nikolic
Lei Wang
Shuang Wu
2014
conf/asiacrypt
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
Sareh Emami
San Ling
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2014
conf/asiacrypt
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework.
Jérémy Jean
Ivica Nikolic
Thomas Peyrin
2014
conf/asiacrypt
Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Jian Guo
Jérémy Jean
Ivica Nikolic
Yu Sasaki
2014
conf/sacrypt
Practical Cryptanalysis of PAES.
Jérémy Jean
Ivica Nikolic
Yu Sasaki
Lei Wang
2014
conf/sacrypt
Colliding Keys for SC2000-256.
Alex Biryukov
Ivica Nikolic
2013
conf/fse
Security Analysis of PRINCE.
Jérémy Jean
Ivica Nikolic
Thomas Peyrin
Lei Wang
Shuang Wu
2013
conf/fse
Complementing Feistel Ciphers.
Alex Biryukov
Ivica Nikolic
2013
conf/fse
Cryptanalysis of Round-Reduced \mathttLED.
Ivica Nikolic
Lei Wang
Shuang Wu
2011
conf/fse
Boomerang Attacks on BLAKE-32.
Alex Biryukov
Ivica Nikolic
Arnab Roy
2011
conf/fse
Search for Related-Key Differential Characteristics in DES-Like Ciphers.
Alex Biryukov
Ivica Nikolic
2011
conf/asiacrypt
Second-Order Differential Collisions for Reduced SHA-256.
Alex Biryukov
Mario Lamberger
Florian Mendel
Ivica Nikolic
2010
conf/fse
Rotational Cryptanalysis of ARX.
Dmitry Khovratovich
Ivica Nikolic
2010
conf/icisc
Known and Chosen Key Differential Distinguishers for Block Ciphers.
Ivica Nikolic
Josef Pieprzyk
Przemyslaw Sokolowski
Ron Steinfeld
2010
conf/eurocrypt
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Alex Biryukov
Ivica Nikolic
2010
conf/asiacrypt
Rotational Rebound Attacks on Reduced Skein.
Dmitry Khovratovich
Ivica Nikolic
Christian Rechberger
2010
conf/sacrypt
Tweaking AES.
Ivica Nikolic
2009
conf/fse
Meet-in-the-Middle Attacks on SHA-3 Candidates.
Dmitry Khovratovich
Ivica Nikolic
Ralf-Philipp Weinmann
2009
conf/fse
Cryptanalysis of the LAKE Hash Family.
Alex Biryukov
Praveen Gauravaram
Jian Guo
Dmitry Khovratovich
San Ling
Krystian Matusiewicz
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2009
conf/crypto
Distinguisher and Related-Key Attack on the Full AES-256.
Alex Biryukov
Dmitry Khovratovich
Ivica Nikolic
2009
conf/ctrsa
Speeding up Collision Search for Byte-Oriented Hash Functions.
Dmitry Khovratovich
Alex Biryukov
Ivica Nikolic
2009
conf/asiacrypt
Rebound Attack on the Full Lane Compression Function.
Krystian Matusiewicz
María Naya-Plasencia
Ivica Nikolic
Yu Sasaki
Martin Schläffer
2008
conf/fse
Collisions for Step-Reduced SHA-256.
Ivica Nikolic
Alex Biryukov
Coauthors
Aashish Kolluri
(1)
Alex Biryukov
(10)
Aquinas Hobor
(1)
Arnab Roy
(1)
Christian Rechberger
(2)
Divesh Aggarwal
(1)
Dmitry Khovratovich
(8)
Florian Mendel
(1)
Haifeng Yu
(1)
Huaxiong Wang
(2)
Ilya Sergey
(1)
Ivica Nikolic
(36)
Jérémy Jean
(9)
Jian Guo
(5)
Josef Pieprzyk
(4)
Kexin Qiao
(1)
Krystian Matusiewicz
(2)
Lei Wang
(4)
María Naya-Plasencia
(1)
Mario Lamberger
(1)
Martin Schläffer
(1)
Pierre Karpman
(1)
Prateek Saxena
(3)
Praveen Gauravaram
(1)
Przemyslaw Sokolowski
(2)
Racchit Jain
(1)
Ralf-Philipp Weinmann
(1)
Ron Steinfeld
(2)
Ruomu Hou
(1)
San Ling
(2)
Sareh Emami
(1)
Shuang Wu
(3)
Siang Meng Sim
(1)
Teodora Baluta
(1)
Thomas Peyrin
(3)
Yannick Seurin
(1)
Yu Sasaki
(7)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to