Distinguisher and related-key attack on the full AES-256 A Biryukov, D Khovratovich, I Nikolić Annual International Cryptology Conference, 231-249, 2009 | 376 | 2009 |
Finding the greedy, prodigal, and suicidal contracts at scale I Nikolić, A Kolluri, I Sergey, P Saxena, A Hobor Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 260 | 2018 |
Tweaks and keys for block ciphers: the TWEAKEY framework J Jean, I Nikolić, T Peyrin International Conference on the Theory and Application of Cryptology and …, 2014 | 173 | 2014 |
Rotational cryptanalysis of ARX D Khovratovich, I Nikolić International Workshop on Fast Software Encryption, 333-346, 2010 | 152 | 2010 |
Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others A Biryukov, I Nikolić Annual International Conference on the Theory and Applications of …, 2010 | 128 | 2010 |
Deoxys v1. CAESAR submission J Jean, I Nikolic, T Peyrin | 89* | 2014 |
Rotational rebound attacks on reduced Skein D Khovratovich, I Nikolić, C Rechberger International Conference on the Theory and Application of Cryptology and …, 2010 | 74 | 2010 |
Rebound attack on the full LANE compression function K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer International Conference on the Theory and Application of Cryptology and …, 2009 | 66 | 2009 |
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs J Guo, J Jean, I Nikolic, K Qiao, Y Sasaki, SM Sim IACR Transactions on Symmetric Cryptology, 33-56, 2016 | 64* | 2016 |
Security analysis of PRINCE J Jean, I Nikolić, T Peyrin, L Wang, S Wu Fast Software Encryption, 92-111, 2013 | 57 | 2013 |
Boomerang attacks on BLAKE-32 A Biryukov, I Nikolić, A Roy International Workshop on Fast Software Encryption, 218-237, 2011 | 56 | 2011 |
Cryptanalysis of Round-Reduced\ mathtt {LED} I Nikolić, L Wang, S Wu Fast Software Encryption, 112-129, 2013 | 54 | 2013 |
Joltik v1. CAESAR submission J Jean, I Nikolic, T Peyrin | 50* | 2014 |
Second-order differential collisions for reduced SHA-256 A Biryukov, M Lamberger, F Mendel, I Nikolić International Conference on the Theory and Application of Cryptology and …, 2011 | 50 | 2011 |
Collisions for step-reduced SHA-256 I Nikolić, A Biryukov International Workshop on Fast Software Encryption, 1-15, 2008 | 49 | 2008 |
Exploiting the laws of order in smart contracts A Kolluri, I Nikolic, I Sergey, A Hobor, P Saxena Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019 | 40 | 2019 |
Search for related-key differential characteristics in DES-like ciphers A Biryukov, I Nikolić International Workshop on Fast Software Encryption, 18-34, 2011 | 39 | 2011 |
Meet-in-the-middle attacks on generic Feistel constructions J Guo, J Jean, I Nikolić, Y Sasaki International Conference on the Theory and Application of Cryptology and …, 2014 | 37 | 2014 |
Cryptanalysis of Zorro. J Guo, I Nikolic, T Peyrin, L Wang IACR Cryptol. ePrint Arch. 2013, 713, 2013 | 32 | 2013 |
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. AD Dwivedi, M Kloucek, P Morawiecki, I Nikolic, J Pieprzyk, S Wójtowicz IACR Cryptol. ePrint Arch. 2016, 1053, 2016 | 30 | 2016 |