Profil

NIKOLIC Ivica

Main Referenced Co-authors
BIRYUKOV, Alex  (8)
KHOVRATOVICH, Dmitry  (3)
Matusiewicz, Krystian (2)
Gauravaram, Praveen (1)
Guo, Jian (1)
Main Referenced Keywords
related-key attack (3); cryptanalysis (2); Cryptanalysis tool (2); hash function (2); AES (1);
Main Referenced Disciplines
Computer science (9)

Publications (total 9)

The most downloaded
423 downloads
Khovratovich, D., Biryukov, A., & Nikolic, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11 https://hdl.handle.net/10993/17081

The most cited

219 citations (Scopus®)

Biryukov, A., Khovratovich, D., & Nikolic, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14 https://hdl.handle.net/10993/17509

Biryukov, A., Lamberger, M., Mendel, F., & Nikolic, I. (2011). Second-Order Differential Collisions for Reduced SHA-256. In 17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 270-287). Springer.
Peer reviewed

Biryukov, A., & Nikolic, I. (2011). Search for Related-Key Differential Characteristics in DES-Like Ciphers. In Fast Software Encryption - 18th International Workshop (pp. 18-34). Springer.
Peer reviewed

Biryukov, A., Nikolic, I., & Roy, A. (2011). Boomerang Attacks on BLAKE-32. In Fast Software Encryption - 18th International Workshop (pp. 218-237). Springer.
Peer reviewed

Biryukov, A., & Nikolic, I. (2010). Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. In EUROCRYPT (pp. 322-344).
Peer reviewed

Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., Nikolic, I., Pieprzyk, J., & Wang, H. (2009). Cryptanalysis of the LAKE Hash Family. In Fast Software Encryption (pp. 156-179). Springer. doi:10.1007/978-3-642-03317-9_10
Peer reviewed

Khovratovich, D., Biryukov, A., & Nikolic, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11
Peer reviewed

Matusiewicz, K., Naya-Plasencia, M., Nikolic, I., Sasaki, Y., & Schläffer, M. (2009). Rebound Attack on the Full Lane Compression Function. In Advances in Cryptology - ASIACRYPT 2009 (pp. 106-125). Berlin, Germany: Springer. doi:10.1007/978-3-642-10366-7_7

Biryukov, A., Khovratovich, D., & Nikolic, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14
Peer reviewed

Nikolic, I., & Biryukov, A. (2008). Collisions for Step-Reduced SHA-256. In Fast Software Encryption - 15th International Workshop, Revised Selected Papers (pp. 1–15). Springer.
Peer reviewed

Contact ORBilu