Follow
Reza Reyhanitabar
Reza Reyhanitabar
Global Business Cybersecurity Manager for Digital Buildings at Siemens AG
Verified email at siemens.com - Homepage
Title
Cited by
Cited by
Year
Security of full-state keyed sponge and duplex: Applications to authenticated encryption
B Mennink, R Reyhanitabar, D Vizár
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
912015
Online authenticated-encryption and its nonce-reuse misuse-resistance
VT Hoang, R Reyhanitabar, P Rogaway, D Vizár
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
822015
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
International Conference on the Theory and Application of Cryptology and …, 2019
562019
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
372011
On the security of NOEKEON against side channel cube attacks
SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry
Information Security, Practice and Experience: 6th International Conference …, 2010
332010
ForkAE v
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
Submission to NIST lightweight cryptography project, 2019
302019
OMD: A compression function mode of operation for authenticated encryption
S Cogliani, DŞ Maimuţ, D Naccache, RP do Canto, R Reyhanitabar, ...
International Conference on Selected Areas in Cryptography, 112-128, 2014
272014
Authenticated encryption: Toward next-generation algorithms
D Maimut, R Reyhanitabar
IEEE security & privacy 12 (2), 70-72, 2014
252014
Boosting OMD for almost free authentication of associated data
R Reyhanitabar, S Vaudenay, D Vizár
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
232015
Misuse-resistant variants of the OMD authenticated encryption mode
R Reyhanitabar, S Vaudenay, D Vizár
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong …, 2014
212014
Forking a blockcipher for authenticated encryption of very short messages
E Andreeva, R Reyhanitabar, K Varici, D Vizár
Cryptology ePrint Archive, 2018
192018
Authenticated encryption with variable stretch
R Reyhanitabar, S Vaudenay, D Vizár
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
182016
Enhanced security notions for dedicated-key hash functions: Definitions and relationships
MR Reyhanitabar, W Susilo, Y Mu
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
132010
Enhanced target collision resistant hash functions revisited
MR Reyhanitabar, W Susilo, Y Mu
Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven …, 2009
122009
Fault analysis of the KATAN family of block ciphers
SF Abdul-Latip, MR Reyhanitabar, W Susilo, J Seberry
Information Security Practice and Experience: 8th International Conference …, 2012
102012
Non-interactive manual channel message authentication based on etcr hash functions
MR Reyhanitabar, S Wang, R Safavi-Naini
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
92007
Offset Merkle-Damgård (OMD) version 2.0
S Cogliani, DS Maimut, D Naccache, RP do Canto, R Reyhanitabar, ...
Submission to the CAESAR competition, 2015
82015
Innovative Security Solutions for Information Technology and Communications
I Bica, R Reyhanitabar
Springer, 2016
72016
Analysis of property-preservation capabilities of the ROX and esh hash domain extenders
MR Reyhanitabar, W Susilo, Y Mu
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
62009
Key encapsulation from noisy key agreement in the quantum random oracle model
A Szepieniec, R Reyhanitabar, B Preneel
Cryptology ePrint Archive, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20