Follow
John Steinberger
John Steinberger
Verified email at tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Tight security bounds for key-alternating ciphers
S Chen, J Steinberger
Annual International Conference on the Theory and Applications of …, 2014
2202014
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations
A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ...
Annual international conference on the theory and applications of …, 2012
1172012
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
1002018
Constructing cryptographic hash functions from fixed-key blockciphers
P Rogaway, J Steinberger
Annual International Cryptology Conference, 433-450, 2008
922008
Security/efficiency tradeoffs for permutation-based hashing
P Rogaway, J Steinberger
Annual International Conference on the Theory and Applications of …, 2008
802008
The collision intractability of MDC-2 in the ideal-cipher model
JP Steinberger
Annual International Conference on the Theory and Applications of …, 2007
792007
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Annual Cryptology Conference, 531-550, 2013
762013
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
632012
Improved security bounds for key-alternating ciphers via Hellinger distance
J Steinberger
Cryptology ePrint Archive, 2012
562012
The collision security of Tandem-DM in the ideal cipher model
J Lee, M Stam, J Steinberger
Annual Cryptology Conference, 561-577, 2011
532011
Random oracles and non-uniformity
S Coretti, Y Dodis, S Guo, J Steinberger
Annual International Conference on the Theory and Applications of …, 2018
452018
The preimage security of double-block-length compression functions
F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger
International Conference on the Theory and Application of Cryptology and …, 2011
452011
Indifferentiability of 8-round Feistel networks
Y Dai, J Steinberger
Annual International Cryptology Conference, 95-120, 2016
412016
Message authentication codes from unpredictable block ciphers
Y Dodis, J Steinberger
Annual International Cryptology Conference, 267-285, 2009
382009
Domain extension for MACs beyond the birthday barrier
Y Dodis, J Steinberger
Annual International Conference on the Theory and Applications of …, 2011
362011
Indifferentiability of confusion-diffusion networks
Y Dodis, M Stam, J Steinberger, T Liu
Annual International Conference on the Theory and Applications of …, 2016
352016
Minimal vanishing sums of roots of unity with large coefficients
JP Steinberger
Proceedings of the London Mathematical Society 97 (3), 689-717, 2008
322008
Provable security of (tweakable) block ciphers based on substitution-permutation networks
B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ...
Annual International Cryptology Conference, 722-753, 2018
212018
Pseudorandom functions in almost constant depth from low-noise LPN
Y Yu, J Steinberger
Annual International Conference on the Theory and Applications of …, 2016
212016
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation
J Lee, J Steinberger
IEEE transactions on information theory 58 (9), 6165-6182, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20