Aleksandar Kircanski

According to our database1, Aleksandar Kircanski authored at least 18 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities.
CoRR, 2021

2014
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA.
IACR Cryptol. ePrint Arch., 2014

2013
Second order collision for the 42-step reduced DHA-256 hash function.
Inf. Process. Lett., 2013

A heuristic for finding compatible differential paths with application to HAS-160.
IACR Cryptol. ePrint Arch., 2013

Rebound attacks on Stribog.
IACR Cryptol. ePrint Arch., 2013

2012
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
IACR Cryptol. ePrint Arch., 2012

Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Cryptanalysis of the Loiss Stream Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

On the Sosemanuk Related Key-IV Sets.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

On the Weak State in GGHN-like Ciphers.
Proceedings of the Seventh International Conference on Availability, 2012

2011
On the sliding property of SNOW 3 G and SNOW 2.0.
IET Inf. Secur., 2011

Differential Fault Analysis of Sosemanuk.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
On the structural weakness of the GGHN stream cipher.
Cryptogr. Commun., 2010

Differential Fault Analysis of HC-128.
Proceedings of the Progress in Cryptology, 2010

2009
A new distinguishing and key recovery attack on NGG stream cipher.
Cryptogr. Commun., 2009

Differential Fault Analysis of Rabbit.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

2008
Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia.
IEEE Commun. Lett., 2008

A Related-Key Attack on TREYFER.
Proceedings of the Second International Conference on Emerging Security Information, 2008


  Loading...