Filter
Article in proceedings

Search results

  • 2025

    Is this your USB? No, but check this QR code for a free meal! Assessing awareness against dropped USBs and malicious QR codes

    Nordskov, J., Tiessen, T. & Vasilomanolakis, E., 2025, (Accepted/In press) Proceedings of the 7th Workshop on Attackers and Cyber-Crime Operations (WACCO 2025) : Co-located with the 10th IEEE European Symposium on Security and Privacy (Euro S&P) . IEEE, 13 p.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    29 Downloads (Orbit)
  • 2019

    Finding Integral Distinguishers with Ease

    Eskandari, Z., Kidmose, A. B., Kölbl, S. & Tiessen, T., 1 Jan 2019, Selected Areas in Cryptography – SAC 2018 . Cid, C. & Jacobson, M. J. (eds.). Springer, p. 115-138 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11349 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    261 Downloads (Orbit)
  • 2017

    From Higher-Order Differentials to Polytopic Cryptyanalysis

    Tiessen, T., 2017, Paradigms in Cryptology . Springer, Vol. 10311. p. 544-552 (Lecture Notes in Computer Science, Vol. 10311).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • 2016

    MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 2016, Advances in Cryptology – ASIACRYPT 2016: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security, Part I. p. 191-219 (Lecture Notes in Computer Science, Vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    1041 Downloads (Orbit)
  • Polytopic Cryptanalysis

    Tiessen, T., 2016, Advances in Cryptology – EUROCRYPT 2016: Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part 1. Fischlin, M. & Coron, J.-S. (eds.). p. 214-239 (Lecture Notes in Computer Science, Vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Open Access
    File
    432 Downloads (Orbit)
  • 2015

    Ciphers for MPC and FHE

    R. Albrecht, M., Rechberger, C., Schneider, T., Tiessen, T. & Zohner, M., 2015, Advances in Cryptology – EUROCRYPT 2015: Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part 1. Oswald, E. & Fischlin, M. (eds.). Springer, p. 430-454 (Lecture Notes in Computer Science, Vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Observations on the SIMON Block Cipher Family

    Kölbl, S., Leander, G. & Tiessen, T., 2015, Advances in Cryptology – CRYPTO 2015: Proceedings of the 35th Annual Cryptology Conference, Part 1. Gennaro, R. & Robshaw, M. (eds.). Springer, p. 161-185 (Lecture Notes in Computer Science, Vol. 9215).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Security of the AES with a Secret S-Box

    Tiessen, T., Knudsen, L. R., Kölbl, S. & Lauridsen, M. M., 2015, Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015). Leander, G. (ed.). Springer, p. 175-189

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    1 Downloads (Orbit)