Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Stefan Lucks
2010 – today
- 2013
[i24]Christian Forler, Stefan Lucks, Jakob Wenzel: Catena: A Memory-Consuming Password Scrambler. IACR Cryptology ePrint Archive 2013: 525 (2013)
[i23]Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel: Differential Cryptanalysis of Reduced-Round Simon. IACR Cryptology ePrint Archive 2013: 526 (2013)
[i22]Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel: Cryptanalysis of the Speck Family of Block Ciphers. IACR Cryptology ePrint Archive 2013: 568 (2013)- 2012
[c63]Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel: Weimar-DM: A Highly Secure Double-Length Compression Function. ACISP 2012: 152-165
[c62]Christian Forler, Stefan Lucks, Jakob Wenzel: Designing the API for a Cryptographic Library - A Misuse-Resistant Application Programming Interface. Ada-Europe 2012: 75-88
[c61]Ewan Fleischmann, Christian Forler, Stefan Lucks: The Collision Security of MDC-4. AFRICACRYPT 2012: 252-269
[c60]Ewan Fleischmann, Christian Forler, Stefan Lucks: McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes. FSE 2012: 196-215
[e4]Frederik Armknecht, Stefan Lucks (Eds.): Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7242, Springer 2012, ISBN 978-3-642-34158-8
[i21]Frederik Armknecht, Stefan Lucks, Bart Preneel, Phillip Rogaway: Symmetric Cryptography (Dagstuhl Seminar 12031). Dagstuhl Reports 2(1): 39-49 (2012)
[i20]Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel: The Collision Security of MDC-4 The Collision Security of MDC-4. IACR Cryptology ePrint Archive 2012: 96 (2012)
[i19]Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel: Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers. IACR Cryptology ePrint Archive 2012: 591 (2012)
[i18]Farzaneh Abed, Eik List, Stefan Lucks: On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis. IACR Cryptology ePrint Archive 2012: 712 (2012)- 2011
[c59]Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel: Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule. INDOCRYPT 2011: 94-113
[c58]Ewan Fleischmann, Christian Forler, Stefan Lucks: Γ-MAC[H, P] - A New Universal MAC Scheme. WEWoRC 2011: 83-98
[i17]Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel: McOE: A Foolproof On-Line Authenticated Encryption Scheme. IACR Cryptology ePrint Archive 2011: 644 (2011)- 2010
[j12]Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks: TWISTERpi - a framework for secure and fast hash functions. IJACT 2(1): 68-81 (2010)
[c57]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Some Observations on Indifferentiability. ACISP 2010: 117-134
[c56]Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks: New Boomerang Attacks on ARIA. INDOCRYPT 2010: 163-175
[c55]Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks: Collision Resistant Double-Length Hashing. ProvSec 2010: 102-118
[i16]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Some Observations on Indifferentiability. IACR Cryptology ePrint Archive 2010: 222 (2010)
[i15]Niels Ferguson, Stefan Lucks, Kerry A. McKay: Symmetric States and their Structure: Improved Analysis of CubeHash. IACR Cryptology ePrint Archive 2010: 273 (2010)
2000 – 2009
- 2009
[j11]Emin Islam Tatli, Stefan Lucks: Mobile Identity Management Revisited. Electr. Notes Theor. Comput. Sci. 244: 125-137 (2009)
[c54]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Attacking 9 and 10 Rounds of AES-256. ACISP 2009: 60-72
[c53]
[c52]Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel: Attacks on the DECT Authentication Mechanisms. CT-RSA 2009: 48-65
[c51]
[c50]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Security of Cyclic Double Block Length Hash Functions. IMA Int. Conf. 2009: 153-175
[c49]Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks: Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. INDOCRYPT 2009: 157-168
[c48]Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks: Twister- A Framework for Secure and Fast Hash Functions. ISPEC 2009: 257-273
[c47]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. ISPEC 2009: 298-309
[c46]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. ISPEC 2009: 310-323
[i14]Ewan Fleischmann, Michael Gorski, Stefan Lucks: On the Security of Tandem-DM. IACR Cryptology ePrint Archive 2009: 54 (2009)
[i13]Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel: Attacks on the DECT authentication mechanisms. IACR Cryptology ePrint Archive 2009: 78 (2009)
[i12]Niels Ferguson, Stefan Lucks: Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform. IACR Cryptology ePrint Archive 2009: 113 (2009)
[i11]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff: Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper). IACR Cryptology ePrint Archive 2009: 175 (2009)
[i10]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Security of Cyclic Double Block Length Hash Functions including Abreast-DM. IACR Cryptology ePrint Archive 2009: 261 (2009)
[i9]Antoine Joux, Stefan Lucks: Improved generic algorithms for 3-collisions. IACR Cryptology ePrint Archive 2009: 305 (2009)
[i8]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Attacking Reduced Rounds of the ARIA Block Cipher. IACR Cryptology ePrint Archive 2009: 334 (2009)
[i7]Ewan Fleischmann, Michael Gorski, Stefan Lucks: Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode. IACR Cryptology ePrint Archive 2009: 335 (2009)- 2008
[c45]Michael Gorski, Stefan Lucks, Thomas Peyrin: Slide Attacks on a Class of Hash Functions. ASIACRYPT 2008: 143-160
[c44]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff: Concrete Security for Entity Recognition: The Jane Doe Protocol. INDOCRYPT 2008: 158-171
[c43]
[c42]Sebastian Faust, Emilia Käsper, Stefan Lucks: Efficient Simultaneous Broadcast. Public Key Cryptography 2008: 180-196
[e3]Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf (Eds.): Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4945, Springer 2008, ISBN 978-3-540-88352-4
[i6]Michael Gorski, Stefan Lucks, Thomas Peyrin: Slide Attacks on a Class of Hash Functions. IACR Cryptology ePrint Archive 2008: 263 (2008)
[i5]Michael Gorski, Stefan Lucks: New Related-Key Boomerang Attacks on AES. IACR Cryptology ePrint Archive 2008: 438 (2008)- 2007
[j10]Ulrich Kühn, Stefan Lucks: Auf dem Weg zu neuen Hashfunktionen - Ein Wettbewerb. Datenschutz und Datensicherheit 31(8): 596-601 (2007)
[c41]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007
[c40]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007
[c39]Stefan Lucks: A Collision-Resistant Rate-1 Double-Block-Length Hash Function. Symmetric Cryptography 2007
[e2]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen (Eds.): Symmetric Cryptography, 07.01. - 12.01.2007. Dagstuhl Seminar Proceedings 07021, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007- 2006
[c38]John Kelsey, Stefan Lucks: Collisions and Near-Collisions for Reduced-Round Tiger. FSE 2006: 111-125
[c37]Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks: Authenticated Query Flooding in Sensor Networks. PerCom Workshops 2006: 644-647
[c36]Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis: Authenticated Query Flooding in Sensor Networks. SEC 2006: 38-49- 2005
[c35]
[c34]Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble: Secure Data Management in Trusted Computing. CHES 2005: 324-338
[c33]Zinaida Benenson, Ulrich Kühn, Stefan Lucks: Cryptographic Attack Metrics. Dependability Metrics 2005: 133-156
[c32]
[c31]Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff: Entity Recognition for Sensor Network Motes. GI Jahrestagung (2) 2005: 145-149
[c30]Stefan Lucks, Nico Schmoigl, Emin Islam Tatli: Issues on Designing a Cryptographic Compiler. WEWoRC 2005: 109-122
[e1]Christopher Wolf, Stefan Lucks, Po-Wah Yau (Eds.): WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium. LNI 74, GI 2005, ISBN 3-88579-403-9- 2004
[c29]
[c28]
[i4]Stefan Lucks: Design Principles for Iterated Hash Functions. IACR Cryptology ePrint Archive 2004: 253 (2004)- 2003
[j9]Rüdiger Weis, Stefan Lucks, Andreas Bogk: Sicherheit von 1024 bit RSA-Schlüsseln gefährdet. Datenschutz und Datensicherheit 27(6) (2003)
[c27]Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346
[c26]- 2002
[j8]Stefan Lucks, Rüdiger Weis: Neue Ergebnisse zur Sicherheit des Verschlüsselungsstandards AES. Datenschutz und Datensicherheit 26(12) (2002)
[c25]Stefan Lucks: A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. ASIACRYPT 2002: 27-45
[i3]Stefan Lucks: A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order. IACR Cryptology ePrint Archive 2002: 52 (2002)- 2001
[j7]Matthias Krause, Stefan Lucks: Pseudorandom functions in TC0 and cryptographic limitations to proving lower bounds. Computational Complexity 10(4): 297-313 (2001)
[j6]Rüdiger Weis, Stefan Lucks: Standardmäßige Wave-LAN Unsicherheit. Datenschutz und Datensicherheit 25(11) (2001)
[c24]Erik Zenner, Matthias Krause, Stefan Lucks: Improved Cryptanalysis of the Self-Shrinking Generator. ACISP 2001: 21-35
[c23]
[c22]
[c21]Scott R. Fluhrer, Stefan Lucks: Analysis of the E0 Encryption System. Selected Areas in Cryptography 2001: 38-48
[c20]Matthias Krause, Stefan Lucks: On the Minimal Hardware Complexity of Pseudorandom Function Generators. STACS 2001: 419-430- 2000
[j5]Rüdiger Weis, Stefan Lucks, Werner Geyer: Stand der Faktorisierungsforschung. Datenschutz und Datensicherheit 24(3) (2000)
[j4]Rüdiger Weis, Stefan Lucks: Die dritte AES-Konferenz in New York - Vor der Entscheidung über den DES Nachfolger. Datenschutz und Datensicherheit 24(7) (2000)
[j3]Erik Zenner, Rüdiger Weis, Stefan Lucks: Sicherheit des GSM- Verschlüsselungsstandards A5. Datenschutz und Datensicherheit 24(7) (2000)
[j2]Stefan Lucks, Rüdiger Weis: Der DES-Nachfolger Rijndael. Datenschutz und Datensicherheit 24(12) (2000)
[c19]Stefan Lucks: Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. AES Candidate Conference 2000: 215-229
[c18]Stefan Lucks, Rüdiger Weis: How to Make DES-based Smartcards fit for the 21-st Century. CARDIS 2000: 93-114
[c17]
[c16]Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting: Improved Cryptanalysis of Rijndael. FSE 2000: 213-230
[c15]Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks: Remotely Keyed Encryption with Java Cards: A Secure and Efficient Method to Encrypt Multimedia Streams. IEEE International Conference on Multimedia and Expo (I) 2000: 537-540
[c14]Rüdiger Weis, Jürgen Vogel, Wolfgang Effelsberg, Werner Geyer, Stefan Lucks: How to Make a Digital Whiteboard Secure - Using Java-Cards for Multimedia Applications. IDMS 2000: 187-198
[c13]Rüdiger Weis, Bastiaan Bakker, Stefan Lucks: Security on Your Hand: Secure Filesystems with a ``Non-Cryptographic'' JAVA-Ring. Java Card Workshop 2000: 151-162
[c12]Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks: Combining Authentication and Light-Weight Payment for Active Networks. SMARTNET 2000: 453-470
[i2]Matthias Krause, Stefan Lucks: On Learning versus Distinguishing and the Minimal Hardware Complexity of Pseudorandom Function Generators. Electronic Colloquium on Computational Complexity (ECCC) 7(14) (2000)
[i1]Stefan Lucks: The Saturation Attack - a Bait for Twofish. IACR Cryptology ePrint Archive 2000: 46 (2000)
1990 – 1999
- 1999
[j1]Rüdiger Weis, Stefan Lucks: Advanced Encryption Standard - Verschlüsselungsstandard für das einundzwanzigste Jahrhundert. Datenschutz und Datensicherheit 23(9) (1999)
[c11]Rüdiger Weis, Stefan Lucks: Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. ECMAST 1999: 456-471
[c10]
[c9]- 1998
[c8]
[c7]- 1997
[c6]
[c5]Stefan Lucks: Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. Security Protocols Workshop 1997: 79-90- 1996
[c4]Stefan Lucks: BEAST: A Fast Block Cipher for Arbitrary Blocksizes. Communications and Multimedia Security 1996: 144-153
[c3]- 1995
[c2]- 1994
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:08 CEST by the dblp team



