Profil

NIKOLIC Ivica

Main Referenced Co-authors
BIRYUKOV, Alex  (8)
KHOVRATOVICH, Dmitry  (3)
Matusiewicz, Krystian (2)
Gauravaram, Praveen (1)
Guo, Jian (1)
Main Referenced Keywords
related-key attack (3); cryptanalysis (2); Cryptanalysis tool (2); hash function (2); AES (1);
Main Referenced Disciplines
Computer science (9)

Publications (total 9)

The most downloaded
439 downloads
KHOVRATOVICH, D., BIRYUKOV, A., & NIKOLIC, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11 https://hdl.handle.net/10993/17081

The most cited

326 citations (OpenAlex)

BIRYUKOV, A., KHOVRATOVICH, D., & NIKOLIC, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14 https://hdl.handle.net/10993/17509

BIRYUKOV, A., Lamberger, M., Mendel, F., & NIKOLIC, I. (2011). Second-Order Differential Collisions for Reduced SHA-256. In 17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 270-287). Springer.
Peer reviewed

BIRYUKOV, A., & NIKOLIC, I. (2011). Search for Related-Key Differential Characteristics in DES-Like Ciphers. In Fast Software Encryption - 18th International Workshop (pp. 18-34). Springer.
Peer reviewed

BIRYUKOV, A., NIKOLIC, I., & ROY, A. (2011). Boomerang Attacks on BLAKE-32. In Fast Software Encryption - 18th International Workshop (pp. 218-237). Springer.
Peer reviewed

BIRYUKOV, A., & NIKOLIC, I. (2010). Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. In EUROCRYPT (pp. 322-344).
Peer reviewed

Matusiewicz, K., Naya-Plasencia, M., NIKOLIC, I., Sasaki, Y., & Schläffer, M. (2009). Rebound Attack on the Full Lane Compression Function. In Advances in Cryptology - ASIACRYPT 2009 (pp. 106-125). Berlin, Germany: Springer. doi:10.1007/978-3-642-10366-7_7

BIRYUKOV, A., Gauravaram, P., Guo, J., KHOVRATOVICH, D., Ling, S., Matusiewicz, K., NIKOLIC, I., Pieprzyk, J., & Wang, H. (2009). Cryptanalysis of the LAKE Hash Family. In Fast Software Encryption (pp. 156-179). Springer. doi:10.1007/978-3-642-03317-9_10
Peer reviewed

KHOVRATOVICH, D., BIRYUKOV, A., & NIKOLIC, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11
Peer reviewed

BIRYUKOV, A., KHOVRATOVICH, D., & NIKOLIC, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14
Peer reviewed

NIKOLIC, I., & BIRYUKOV, A. (2008). Collisions for Step-Reduced SHA-256. In Fast Software Encryption - 15th International Workshop, Revised Selected Papers (pp. 1–15). Springer.
Peer reviewed

Contact ORBilu