S
Stefan Lucks
Researcher at Bauhaus University, Weimar
Publications - 46
Citations - 577
Stefan Lucks is an academic researcher from Bauhaus University, Weimar. The author has contributed to research in topics: Block cipher & Hash function. The author has an hindex of 13, co-authored 46 publications receiving 506 citations. Previous affiliations of Stefan Lucks include University of Mannheim.
Papers
More filters
Book ChapterDOI
Gimli : A Cross-Platform Permutation
Daniel J. Bernstein,Stefan Kölbl,Stefan Lucks,Pedro Maat C. Massolino,Florian Mendel,Kashif Nawaz,Tobias Schneider,Peter Schwabe,François-Xavier Standaert,Yosuke Todo,Benoît Viguier +10 more
TL;DR: Gimli is presented, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64- bit and 32-bit ARM smartphone CPUs, 32- bit ARM microcontrollers, 8-bit AVR micro Controllers, FPGAs, ASICs without side- channel protection, and ASICs with side-channel protection.
Book ChapterDOI
Security of Cyclic Double Block Length Hash Functions
TL;DR: A practical DBL construction is given that has the highest security guarantee of all DBL compression functions currently known in literature and a (relatively weak) analysis of preimage resistance for Cyclic-DM is provided.
Book ChapterDOI
On the Security of Tandem-DM
TL;DR: The first proof of security for Tandem-DM was given in this paper, where it was shown that any adversary that asks less than 2120.4 queries cannot find a collision with success probability greater than 1/2.
Proceedings Article
A Collision-Resistant Rate-1 Double-Block-Length Hash Function
TL;DR: The construction employs ``combinatorial'' hashing as an underlying building block (like Universal Hashing for cryptographic message authentication by Wegman and Carter) and runs at rate ~1, thus improving on a similar rate~1/2 approach by Hirose (FSE 2006).
Book ChapterDOI
Slide Attacks on a Class of Hash Functions
TL;DR: In this paper, the application of slide attacks to hash functions was studied and the first cryptanalytic result on Grindahl-256 and Grindahl -512 hash functions were presented.