John Steinberger
John Steinberger
Verified email at tsinghua.edu.cn - Homepage
TitleCited byYear
Tight security bounds for key-alternating ciphers
S Chen, J Steinberger
Annual International Conference on the Theory and Applications of …, 2014
1512014
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations
A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ...
Annual international conference on the theory and applications of …, 2012
912012
Constructing cryptographic hash functions from fixed-key blockciphers
P Rogaway, J Steinberger
Annual International Cryptology Conference, 433-450, 2008
802008
The collision intractability of MDC-2 in the ideal-cipher model
JP Steinberger
Annual International Conference on the Theory and Applications of …, 2007
772007
Security/efficiency tradeoffs for permutation-based hashing
P Rogaway, J Steinberger
Annual International Conference on the Theory and Applications of …, 2008
752008
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
712018
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Annual Cryptology Conference, 531-550, 2013
612013
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
502012
The collision security of Tandem-DM in the ideal cipher model
J Lee, M Stam, J Steinberger
Annual Cryptology Conference, 561-577, 2011
492011
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance.
JP Steinberger
IACR Cryptology ePrint Archive 2012, 481, 2012
472012
The preimage security of double-block-length compression functions
F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger
International Conference on the Theory and Application of Cryptology and …, 2011
392011
Message authentication codes from unpredictable block ciphers
Y Dodis, J Steinberger
Annual International Cryptology Conference, 267-285, 2009
312009
Domain extension for MACs beyond the birthday barrier
Y Dodis, J Steinberger
Annual International Conference on the Theory and Applications of …, 2011
302011
Minimal vanishing sums of roots of unity with large coefficients
JP Steinberger
Proceedings of the London Mathematical Society 97 (3), 689-717, 2008
252008
Indifferentiability of 8-round feistel networks
Y Dai, J Steinberger
Annual International Cryptology Conference, 95-120, 2016
222016
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation
J Lee, J Steinberger
IEEE transactions on information theory 58 (9), 6165-6182, 2012
212012
Random oracles and non-uniformity
S Coretti, Y Dodis, S Guo, J Steinberger
Annual International Conference on the Theory and Applications of …, 2018
192018
Indifferentiability of confusion-diffusion networks
Y Dodis, M Stam, J Steinberger, T Liu
Annual International Conference on the Theory and Applications of …, 2016
182016
The security of multiple encryption in the ideal cipher model
Y Dai, J Lee, B Mennink, J Steinberger
Annual Cryptology Conference, 20-38, 2014
162014
The security of multiple encryption in the ideal cipher model
Y Dai, J Lee, B Mennink, J Steinberger
Annual Cryptology Conference, 20-38, 2014
162014
The system can't perform the operation now. Try again later.
Articles 1–20