scispace - formally typeset
E

Eik List

Researcher at Bauhaus University, Weimar

Publications -  52
Citations -  699

Eik List is an academic researcher from Bauhaus University, Weimar. The author has contributed to research in topics: Block cipher & Encryption. The author has an hindex of 13, co-authored 47 publications receiving 549 citations. Previous affiliations of Eik List include Weimar Institute.

Papers
More filters
Book ChapterDOI

Reforgeability of Authenticated Encryption Schemes

TL;DR: This work pursues the idea of multi-forgery attacks as introduced by Ferguson in 2002, and introduces a security notion for the integrity (in terms of reforgeability) of authenticated encryption schemes: \(j\text {-}\textsc {Int} {-} textsc {CTXT}\), which is derived from the notion INT-CTXT.
Posted Content

Pholkos - Efficient Large-state Tweakable Block Ciphers from the AES Round Function.

TL;DR: Pholkos is no novel round-function design, but utilizes the AES round function, following design ideas of Haraka and AESQ to profit from earlier analysis results, to build a family of primitives with state and key sizes of 256 and 512 bits for flexible applications, providing high security at high performance.
Journal ArticleDOI

POEx : A beyond-birthday-bound-secure on-line cipher

TL;DR: This work proposes POEx, a beyond-birthday-bound-secure on-line cipher which employs one call to a tweakable block cipher and onecall to a 2n-bit universal hash function per message block which builds upon the recently proposed XTX tweak extender by Iwata and Minematsu.
Journal ArticleDOI

CENCPP - Beyond-birthday-secure Encryption from Public Permutations

TL;DR: This work tries to address the gap in encryption schemes with beyond-birthday-bound security by proposing CENCPP ∗, a nonce-based encryption scheme from public permutations that is a variant of Iwata’s block-cipher-based mode CENC that is adapted for public permutation, thereby generalizing Chen et al.

Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks.

TL;DR: In this paper, an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, client-independent update and server relief, their security, e.g., memory-hardness and side-channel resistance, and its general properties, such as memory usage and flexibility of the underlying primitives.