Elmar Tischhauser
ScholarGPS® ID: 22781710536219
Affiliation History
Discipline
Mathematics
Top Specialties
Cryptography | Collision
Metrics Summary
Publication Count
23
Predicted Citations
1,218
Predicted h-index
15
Ranking
Publications and Citation History
Publications based on Top Specialties
Types of Publication
- Publications
- Books
- Patents
- NIH/NSF
Add
Delete
|
---|
The COLM Authenticated Encryption Scheme (journal article) Journal of Cryptology, volume 37, issue 2 (2024). |
Troika: a ternary cryptographic hash function (journal article) Designs, Codes and Cryptography, volume 88, issue 1, pages 91-117 (2020). |
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things (journal article) IACR Transactions on Symmetric Cryptology (2018). |
Multivariate Profiling of Hulls for Linear Cryptanalysis (journal article) IACR Transactions on Symmetric Cryptology (2018). |
When Intrusion Detection Meets Blockchain Technology: A Review (journal article) IEEE Access, volume 6 (2018). |
Cache timing attacks on recent microarchitectures (conference) 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2017) Mclean, VA, USA |
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness (book chapter) In Advances in Cryptology – ASIACRYPT 2016 Springer Berlin Heidelberg (2016) |
A MAC Mode for Lightweight Block Ciphers (book chapter) In Fast Software Encryption Springer Berlin Heidelberg (2016) |
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks (book chapter) In Selected Areas in Cryptography – SAC 2015 Springer International Publishing (2016) |
Comb to Pipeline: Fast Software Encryption Revisited (book chapter) In Fast Software Encryption Springer Berlin Heidelberg (2015) |
Twisted Polynomials and Forgery Attacks on GCM (book chapter) In Advances in Cryptology -- EUROCRYPT 2015 Springer Berlin Heidelberg (2015) |
Key Recovery Attacks on Recent Authenticated Ciphers (book chapter) In Progress in Cryptology - LATINCRYPT 2014 Springer International Publishing (2015) |
Internal differential collision attacks on the reduced-round Grøstl-0 hash function (journal article) Designs, Codes and Cryptography, volume 70, issue 3, pages 251-271 (2014). |
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 (book chapter) In Fast Software Encryption Springer Berlin Heidelberg (2014) |
ALE: AES-Based Lightweight Authenticated Encryption (book chapter) In Fast Software Encryption Springer Berlin Heidelberg (2014) |
Parallelizable and Authenticated Online Ciphers (book chapter) In Advances in Cryptology - ASIACRYPT 2013 Springer Berlin Heidelberg (2013) |
2012 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2012) (2012) Cancun, Mexico |
A Model for Structure Attacks, with Applications to PRESENT and Serpent (book chapter) In Fast Software Encryption Springer Berlin Heidelberg (2012) |
A Simple Key-Recovery Attack on McOE-X (book chapter) In Cryptology and Network Security Springer Berlin Heidelberg (2012) |
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (book chapter) In Advances in Cryptology – EUROCRYPT 2012 Springer Berlin Heidelberg (2012) |