Stefan Lucks
Orcid: 0000-0003-4906-5131Affiliations:
- University of Mannheim, Germany
According to our database1,
Stefan Lucks
authored at least 131 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the Secure IT Systems, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
General classification of the authenticated encryption schemes for the CAESAR competition.
Comput. Sci. Rev., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
2015
Catena Variants - Different Instantiations for an Extremely Flexible Password-Hashing Framework.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015
Proceedings of the Topics in Cryptology, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Overview of the Candidates for the Password Hashing Competition - And their Resistance against Garbage-Collector Attacks.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
IACR Cryptol. ePrint Arch., 2012
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
Designing the API for a Cryptographic Library - A Misuse-Resistant Application Programming Interface.
Proceedings of the Reliable Software Technologies - Ada-Europe 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
2010
Int. J. Appl. Cryptogr., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Datenschutz und Datensicherheit, 2007
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007
2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
Sicherheit von 1024 bit RSA-Schlüsseln gefährdet.
Datenschutz und Datensicherheit, 2003
How to turn a PIN into an Iron Beam.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Neue Ergebnisse zur Sicherheit des Verschlüsselungsstandards AES.
Datenschutz und Datensicherheit, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Standardmäßige Wave-LAN Unsicherheit.
Datenschutz und Datensicherheit, 2001
Pseudorandom functions in TC<sup>0</sup> and cryptographic limitations to proving lower bounds.
Comput. Complex., 2001
Proceedings of the STACS 2001, 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
On Learning versus Distinguishing and the Minimal Hardware Complexity of Pseudorandom Function Generators
Electron. Colloquium Comput. Complex., 2000
Sicherheit des GSM- Verschlüsselungsstandards A5.
Datenschutz und Datensicherheit, 2000
Stand der Faktorisierungsforschung.
Datenschutz und Datensicherheit, 2000
Die dritte AES-Konferenz in New York - Vor der Entscheidung über den DES Nachfolger.
Datenschutz und Datensicherheit, 2000
Der DES-Nachfolger Rijndael.
Datenschutz und Datensicherheit, 2000
Proceedings of the Telecommunication Network Intelligence, 2000
Proceedings of the Java on Smart Cards: Programming and Security, 2000
How to Make a Digital Whiteboard Secure - Using Java-Cards for Multimedia Applications.
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 2000
Remotely Keyed Encryption with Java Cards: A Secure and Efficient Method to Encrypt Multimedia Streams.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
How to Make DES-based Smartcards fit for the 21-st Century.
Proceedings of the Smart Card Research and Advanced Applications, 2000
Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Prax. Inf.verarb. Kommun., 1999
Advanced Encryption Standard - Verschlüsselungsstandard für das einundzwanzigste Jahrhundert.
Datenschutz und Datensicherheit, 1999
Proceedings of the 1st Workshop on Smartcard Technology, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Multimedia Applications, Services and Techniques, 1999
1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Proceedings of the Security Protocols, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1996
BEAST: A Fast Block Cipher for Arbitrary Blocksizes.
Proceedings of the Communications and Multimedia Security II, 1996
1995
Proceedings of the Cryptography and Coding, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994