Elmar Tischhauser

Orcid: 0000-0002-2031-8652

Affiliations:
  • University of Marburg, Germany
  • Technical University of Denmark, Department of Applied Mathematics and Computer Science, Kongens Lyngby, Denmark
  • KU Leuven, Belgium (PhD)


According to our database1, Elmar Tischhauser authored at least 33 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The COLM Authenticated Encryption Scheme.
J. Cryptol., June, 2024

Efficient Algorithm for Generating Optimal Inequality Candidates for MILP Modeling of Boolean Functions.
IACR Commun. Cryptol., 2024

Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems.
Proceedings of the Advances in Information and Computer Security, 2024

2020
Troika: a ternary cryptographic hash function.
Des. Codes Cryptogr., 2020

2018
Multivariate Profiling of Hulls for Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2018

SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things.
IACR Trans. Symmetric Cryptol., 2018

When Intrusion Detection Meets Blockchain Technology: A Review.
IEEE Access, 2018

2017
Cache timing attacks on recent microarchitectures.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

2016
A MAC Mode for Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

Multivariate Linear Cryptanalysis: The Past and Future of PRESENT.
IACR Cryptol. ePrint Arch., 2016

Comb to Pipeline: Fast Software Encryption Revisited.
IACR Cryptol. ePrint Arch., 2016

Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015

Twisted Polynomials and Forgery Attacks on GCM.
IACR Cryptol. ePrint Arch., 2015

2014
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis.
J. Comput. Appl. Math., 2014

AES-Based Authenticated Encryption Modes in Parallel High-Performance Software.
IACR Cryptol. ePrint Arch., 2014

Weak-Key Analysis of POET.
IACR Cryptol. ePrint Arch., 2014

Internal differential collision attacks on the reduced-round Grøstl-0 hash function.
Des. Codes Cryptogr., 2014

Key Recovery Attacks on Recent Authenticated Ciphers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
Parallelizable and Authenticated Online Ciphers.
IACR Cryptol. ePrint Arch., 2013

On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

ALE: AES-Based Lightweight Authenticated Encryption.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Mathematical Aspects of Symmetric-Key Cryptography (Wiskundige aspecten van geheime-sleutel cryptografie).
PhD thesis, 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations.
IACR Cryptol. ePrint Arch., 2012

Efficient reconfigurable hardware architecture for accurately computing success probability and data complexity of linear attacks.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2012

A Model for Structure Attacks, with Applications to PRESENT and Serpent.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

A Simple Key-Recovery Attack on McOE-X.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY.
J. Math. Cryptol., 2011

On the limits of privacy in reputation systems.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

2010
Improved Collision Attacks on the Reduced-Round Gröstl Hash Function.
IACR Cryptol. ePrint Arch., 2010

Whirlwind: a new cryptographic hash function.
Des. Codes Cryptogr., 2010

2009
The Lane hash function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009


  Loading...