Start · Paper List (Normalized: Citations/Year) · Papers/Citations per Year (Plot) · Names in Top-h5 · Person Citations per Year · Top-h5 Papers per Person
Pos Paper Citations Year
1 896 2021
2 SPHINCS+ 291 2021
3 SIFA: exploiting ineffective fault inductions on symmetric cryptography 270 2018
4 Ascon v1.2 - Lightweight Authenticated Encryption and Hashing 184 2018
5 Rasta: A cipher with low ANDdepth and few ANDs per bit 177 2018
6 ISAP v2.0. Submission to NIST 139 2019
7 Cryptanalysis of Ascon 126 2015
8 Statistical ineffective fault attacks on masked AES with fault countermeasures 126 2018
9 ISAP–towards side-channel secure authenticated encryption 116 2017
10 Analysis of SHA-512/224 and SHA-512/256 107 2015
11 Out of Oddity–New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems 107 2020
12 Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes 95 2016
13 CSI: Rowhammer–Cryptographic security and integrity against rowhammer 91 2023
14 Protecting against Statistical Ineffective Fault Attacks 88 2019
15 An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC 84 2020
16 Ascon v1.2. Submission to the CAESAR competition 82 2016
17 Heuristic tool for linear cryptanalysis with applications to CAESAR candidates 70 2015
18 Higher-order cryptanalysis of LowMC 69 2015
19 65 2019
20 Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks 60 2023
21 The tweakable block cipher family QARMAv2 59 2023
22 PRINCE v2: More Security for (Almost) No Overhead 54 2020
23 Ascon v1. 2 submission to nist 45 2021
24 Malicious Hashing: Eve’s Variant of SHA-1 45 2014
25 Square Attack on 7-Round Kiasu-BC 42 2016
26 Branching heuristics in differential collision search with applications to SHA-512 41 2014
27 SPHINCS+: Submission to the NIST post-quantum project (v. 3.1) 40 2022
28 Throwing boomerangs into Feistel structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE 40 2022
29 Analyzing the Linear Keystream Biases in AEGIS 39 2022
30 Practical key-recovery attack on MANTIS5 38 2016
31 Bounds for the security of Ascon against differential and linear cryptanalysis 37 2022
32 Improved search for integral, impossible differential and zero-correlation attacks: application to ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2 37 2024
33 On the security of fresh re-keying to counteract side-channel and fault attacks 36 2014
34 Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT 34 2024
35 Clustering Related-Tweak Characteristics: Application to MANTIS-6 32 2017
36 Scatter and split securely: Defeating cache contention and occupancy attacks 32 2023
37 Ascon PRF, MAC, and Short-Input MAC: Lightweight, Fast, and Efficient Pseudorandom Functions 31 2024
38 Ascon v1 27 2014
39 Autoguess: a tool for finding guess-and-determine attacks and key bridges 26 2022
40 Statistical effective fault attacks: The other side of the coin 25 2022
Imprint