default search action
Nicky Mouha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e2]Nicky Mouha, Nick Nikiforakis:
Information Security - 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15257, Springer 2025, ISBN 978-3-031-75756-3 [contents] - [e1]Nicky Mouha, Nick Nikiforakis:
Information Security - 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15258, Springer 2025, ISBN 978-3-031-75763-1 [contents] - 2023
- [j7]Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023) - [c20]Nicky Mouha:
Exploring Formal Methods for Cryptographic Hash Function Implementations. ACISP 2023: 177-195 - [c19]Nicky Mouha, Christopher Celi:
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms. CT-RSA 2023: 3-28 - [c18]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. SAC 2023: 213-232 - [i20]Nicky Mouha, Christopher Celi:
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm. IACR Cryptol. ePrint Arch. 2023: 331 (2023) - [i19]Nicky Mouha:
Exploring Formal Methods for Cryptographic Hash Function Implementations. IACR Cryptol. ePrint Arch. 2023: 577 (2023) - [i18]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 1245 (2023) - 2022
- [j6]Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU. IACR Trans. Symmetric Cryptol. 2022(2): 161-200 (2022) - [i17]Anastasiya Gorodilova, Natalia N. Tokareva, Sergey Agievich, Ilya Beterov, Tim Beyne, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Valeria Idrisova, Nikolay Kolomeec, Aleksandr Kutsenko, Ekaterina Malygina, Nicky Mouha, Marina Pudovkina, Francesco Sica, Aleksei Udovenko:
An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO". CoRR abs/2204.11502 (2022) - 2021
- [j5]Nicky Mouha, Asmaa Hailane:
The Application of Formal Methods to Real-World Cryptographic Algorithms, Protocols, and Systems. Computer 54(1): 29-38 (2021) - [j4]Nicky Mouha, Nikolay Kolomeec, Danil Akhtiamov, Ivan Sutormin, Matvey Panferov, Kseniya Titova, Tatiana Bonich, Evgeniya Ishchukova, Natalia N. Tokareva, Bulat Zhantulikov:
Maximums of the Additive Differential Probability of Exclusive-Or. IACR Trans. Symmetric Cryptol. 2021(2): 292-313 (2021) - [c17]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T₅: Hashing Five Inputs with Three Compression Calls. ITC 2021: 24:1-24:23 - [i16]Anastasiya Gorodilova, Natalia N. Tokareva, Sergey Agievich, Claude Carlet, Valeria Idrisova, Konstantin Kalgin, D. Kolegov, Alexandr Kutsenko, Nicky Mouha, Marina Pudovkina, Aleksei Udovenko:
The Seventh International Olympiad in Cryptography NSUCRYPTO: problems and solutions. CoRR abs/2106.01053 (2021) - [i15]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T5: Hashing Five Inputs with Three Compression Calls. IACR Cryptol. ePrint Arch. 2021: 373 (2021) - 2020
- [c16]Nicky Mouha, Christopher Celi:
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations. CT-RSA 2020: 129-145
2010 – 2019
- 2019
- [i14]Nicky Mouha, Christopher Celi:
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations. IACR Cryptol. ePrint Arch. 2019: 1421 (2019) - 2018
- [j3]Apostol Vassilev, Nicky Mouha, Luís T. A. N. Brandão:
Psst, Can You Keep a Secret? Computer 51(1): 94-97 (2018) - [j2]Nicky Mouha, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Finding Bugs in Cryptographic Hash Function Implementations. IEEE Trans. Reliab. 67(3): 870-884 (2018) - 2017
- [c15]Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi:
The Iterated Random Function Problem. ASIACRYPT (2) 2017: 667-697 - [c14]Louiza Khati, Nicky Mouha, Damien Vergnaud:
Full Disk Encryption: Bridging Theory and Practice. CT-RSA 2017: 241-257 - [i13]Shay Gueron, Nicky Mouha:
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security. IACR Cryptol. ePrint Arch. 2017: 645 (2017) - [i12]Nicky Mouha, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Finding Bugs in Cryptographic Hash Function Implementations. IACR Cryptol. ePrint Arch. 2017: 891 (2017) - [i11]Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi:
The Iterated Random Function Problem. IACR Cryptol. ePrint Arch. 2017: 892 (2017) - 2016
- [c13]Shay Gueron, Nicky Mouha:
Simpira v2: A Family of Efficient Permutations Using the AES Round Function. ASIACRYPT (1) 2016: 95-125 - [i10]Shay Gueron, Nicky Mouha:
Simpira v2: A Family of Efficient Permutations Using the AES Round Function. IACR Cryptol. ePrint Arch. 2016: 122 (2016) - [i9]Louiza Khati, Nicky Mouha, Damien Vergnaud:
Full Disk Encryption: Bridging Theory and Practice. IACR Cryptol. ePrint Arch. 2016: 1114 (2016) - 2015
- [c12]Nicky Mouha, Atul Luykx:
Multi-key Security: The Even-Mansour Construction Revisited. CRYPTO (1) 2015: 209-223 - [i8]Nicky Mouha, Atul Luykx:
Multi-Key Security: The Even-Mansour Construction Revisited. IACR Cryptol. ePrint Arch. 2015: 101 (2015) - [i7]Nicky Mouha:
The Design Space of Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2015: 303 (2015) - [i6]Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolic:
More Rounds, Less Security? IACR Cryptol. ePrint Arch. 2015: 484 (2015) - [i5]Nicky Mouha:
Chaskey: a MAC Algorithm for Microcontrollers - Status Update and Proposal of Chaskey-12 -. IACR Cryptol. ePrint Arch. 2015: 1182 (2015) - 2014
- [c11]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. ASIACRYPT (1) 2014: 105-125 - [c10]Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. FSE 2014: 168-186 - [c9]Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede:
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. Selected Areas in Cryptography 2014: 306-323 - [i4]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. IACR Cryptol. ePrint Arch. 2014: 144 (2014) - [i3]Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede:
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. IACR Cryptol. ePrint Arch. 2014: 386 (2014) - 2013
- [i2]Nicky Mouha, Bart Preneel:
A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 328 (2013) - [i1]Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2013: 791 (2013) - 2012
- [b1]Nicky Mouha:
Automated Techniques for Hash Function and Block Cipher Cryptanalysis (Automatische technieken voor hashfunctie- en blokcijfercryptanalyse). Katholieke Universiteit Leuven, Belgium, 2012 - [j1]Nicky Mouha, Gautham Sekar, Bart Preneel:
Challenging the increased resistance of regular hash functions against birthday attacks. J. Math. Cryptol. 6(3-4): 229-248 (2012) - [c8]Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. FSE 2012: 287-305 - 2011
- [c7]Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel:
Algebraic Techniques in Differential Cryptanalysis Revisited. ACISP 2011: 120-141 - [c6]Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel:
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. Inscrypt 2011: 57-76 - [c5]Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel:
Meet-in-the-Middle Attacks on Reduced-Round XTEA. CT-RSA 2011: 250-267 - [c4]Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
The Additive Differential Probability of ARX. FSE 2011: 342-358 - [r1]Nicky Mouha:
MD4-MD5. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 768-771 - 2010
- [c3]Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel:
The Differential Analysis of S-Functions. Selected Areas in Cryptography 2010: 36-56
2000 – 2009
- 2009
- [c2]Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel:
Cryptanalysis of the ESSENCE Family of Hash Functions. Inscrypt 2009: 15-34 - [c1]Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel:
Finding Collisions for a 45-Step Simplified HAS-V. WISA 2009: 206-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint