default search action
Ivica Nikolic
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i32]Ivica Nikolic, Racchit Jain:
Fuzzing at Scale: The Untold Story of the Scheduler. CoRR abs/2406.18058 (2024) - 2023
- [j10]Bo Wang, Aashish Kolluri, Ivica Nikolic, Teodora Baluta, Prateek Saxena:
User-Customizable Transpilation of Scripting Languages. Proc. ACM Program. Lang. 7(OOPSLA1): 201-229 (2023) - [c36]Teodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena:
Unforgeability in Stochastic Gradient Descent. CCS 2023: 1138-1152 - [i31]Bo Wang, Aashish Kullori, Ivica Nikolic, Teodora Baluta, Prateek Saxena:
User-customizable Transpilation of Scripting Languages. CoRR abs/2301.11220 (2023) - 2021
- [j9]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Yannick Seurin:
The Deoxys AEAD Family. J. Cryptol. 34(3): 31 (2021) - [c35]Ivica Nikolic, Radu Mantu, Shiqi Shen, Prateek Saxena:
Refined Grey-Box Fuzzing with Sivo. DIMVA 2021: 106-129 - [i30]Ivica Nikolic, Radu Mantu, Shiqi Shen, Prateek Saxena:
Refined Grey-Box Fuzzing with SIVO. CoRR abs/2102.02394 (2021) - 2020
- [c34]Haifeng Yu, Ivica Nikolic, Ruomu Hou, Prateek Saxena:
OHIE: Blockchain Scaling Made Simple. SP 2020: 90-105
2010 – 2019
- 2019
- [j8]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Combining PUF with RLUTs: A Two-party Pay-per-device IP Licensing Scheme on FPGAs. ACM Trans. Embed. Comput. Syst. 18(2): 12:1-12:22 (2019) - [c33]Aashish Kolluri, Ivica Nikolic, Ilya Sergey, Aquinas Hobor, Prateek Saxena:
Exploiting the laws of order in smart contracts. ISSTA 2019: 363-373 - 2018
- [c32]Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. ACSAC 2018: 653-663 - [i29]Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. CoRR abs/1802.06038 (2018) - [i28]Aashish Kolluri, Ivica Nikolic, Ilya Sergey, Aquinas Hobor, Prateek Saxena:
Exploiting The Laws of Order in Smart Contracts. CoRR abs/1810.11605 (2018) - [i27]Haifeng Yu, Ivica Nikolic, Ruomu Hou, Prateek Saxena:
OHIE: Blockchain Scaling Made Simple. CoRR abs/1811.12628 (2018) - 2017
- [c31]Ivica Nikolic:
How to Use Metaheuristics for Design of Symmetric-Key Primitives. ASIACRYPT (3) 2017: 369-391 - [c30]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security. IVSW 2017: 134-139 - [c29]Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. SECRYPT 2017: 237-246 - [i26]Ivica Nikolic:
How to Use Metaheuristics for Design of Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2017: 851 (2017) - 2016
- [j7]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Extended meet-in-the-middle attacks on some Feistel constructions. Des. Codes Cryptogr. 80(3): 587-618 (2016) - [j6]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Forgeries and Distinguishers against PAES. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 39-48 (2016) - [j5]Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Trans. Symmetric Cryptol. 2016(1): 33-56 (2016) - [j4]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Trans. Symmetric Cryptol. 2016(2): 307-337 (2016) - [c28]Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. ASIACRYPT (1) 2016: 627-647 - [c27]Jérémy Jean, Ivica Nikolic:
Efficient Design Strategies Based on the AES Round Function. FSE 2016: 334-353 - [i25]Jérémy Jean, Ivica Nikolic:
Efficient Design Strategies Based on the AES Round Function. IACR Cryptol. ePrint Arch. 2016: 299 (2016) - [i24]Ivica Nikolic, Yu Sasaki:
Refinements of the k-tree Algorithm for the Generalized Birthday Problem. IACR Cryptol. ePrint Arch. 2016: 312 (2016) - [i23]Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. IACR Cryptol. ePrint Arch. 2016: 851 (2016) - [i22]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Cryptol. ePrint Arch. 2016: 973 (2016) - [i21]Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. IACR Cryptol. ePrint Arch. 2016: 1053 (2016) - [i20]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Cryptol. ePrint Arch. 2016: 1162 (2016) - 2015
- [j3]Ivica Nikolic, Lei Wang, Shuang Wu:
The parallel-cut meet-in-the-middle attack. Cryptogr. Commun. 7(3): 331-345 (2015) - [c26]Ivica Nikolic, Yu Sasaki:
Refinements of the k-tree Algorithm for the Generalized Birthday Problem. ASIACRYPT (2) 2015: 683-703 - [c25]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. FSE 2015: 519-536 - [c24]Jérémy Jean, Ivica Nikolic:
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation. FSE 2015: 537-556 - [i19]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. IACR Cryptol. ePrint Arch. 2015: 95 (2015) - [i18]Jérémy Jean, Ivica Nikolic:
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation. IACR Cryptol. ePrint Arch. 2015: 244 (2015) - [i17]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. IACR Cryptol. ePrint Arch. 2015: 372 (2015) - [i16]Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. IACR Cryptol. ePrint Arch. 2015: 426 (2015) - [i15]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced LED. IACR Cryptol. ePrint Arch. 2015: 429 (2015) - [i14]Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolic:
More Rounds, Less Security? IACR Cryptol. ePrint Arch. 2015: 484 (2015) - [i13]Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Full Midori64. IACR Cryptol. ePrint Arch. 2015: 1189 (2015) - 2014
- [j2]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
The resistance of PRESENT-80 against related-key differential attacks. Cryptogr. Commun. 6(3): 171-187 (2014) - [j1]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. J. Cryptol. 27(3): 452-479 (2014) - [c23]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. ASIACRYPT (1) 2014: 141-157 - [c22]Jérémy Jean, Ivica Nikolic, Thomas Peyrin:
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework. ASIACRYPT (2) 2014: 274-288 - [c21]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Generic Feistel Constructions. ASIACRYPT (1) 2014: 458-477 - [c20]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. CT-RSA 2014: 402-423 - [c19]Alex Biryukov, Ivica Nikolic:
Colliding Keys for SC2000-256. Selected Areas in Cryptography 2014: 77-91 - [c18]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Cryptanalysis of PAES. Selected Areas in Cryptography 2014: 228-242 - [i12]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. IACR Cryptol. ePrint Arch. 2014: 56 (2014) - [i11]Jérémy Jean, Ivica Nikolic, Thomas Peyrin:
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework. IACR Cryptol. ePrint Arch. 2014: 831 (2014) - 2013
- [c17]Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. FSE 2013: 3-18 - [c16]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. FSE 2013: 92-111 - [c15]Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced \mathttLED. FSE 2013: 112-129 - [i10]Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. IACR Cryptol. ePrint Arch. 2013: 467 (2013) - [i9]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
The Resistance of PRESENT-80 Against Related-Key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 522 (2013) - [i8]Ivica Nikolic, Lei Wang, Shuang Wu:
The Parallel-Cut Meet-In-The-Middle Attack. IACR Cryptol. ePrint Arch. 2013: 530 (2013) - [i7]Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang:
Cryptanalysis of Zorro. IACR Cryptol. ePrint Arch. 2013: 713 (2013) - 2011
- [c14]Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic:
Second-Order Differential Collisions for Reduced SHA-256. ASIACRYPT 2011: 270-287 - [c13]Alex Biryukov, Ivica Nikolic:
Search for Related-Key Differential Characteristics in DES-Like Ciphers. FSE 2011: 18-34 - [c12]Alex Biryukov, Ivica Nikolic, Arnab Roy:
Boomerang Attacks on BLAKE-32. FSE 2011: 218-237 - 2010
- [c11]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. ASIACRYPT 2010: 1-19 - [c10]Alex Biryukov, Ivica Nikolic:
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. EUROCRYPT 2010: 322-344 - [c9]Dmitry Khovratovich, Ivica Nikolic:
Rotational Cryptanalysis of ARX. FSE 2010: 333-346 - [c8]Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Known and Chosen Key Differential Distinguishers for Block Ciphers. ICISC 2010: 29-48 - [c7]Ivica Nikolic:
Tweaking AES. Selected Areas in Cryptography 2010: 198-210 - [i6]Alex Biryukov, Ivica Nikolic:
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. IACR Cryptol. ePrint Arch. 2010: 248 (2010) - [i5]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. IACR Cryptol. ePrint Arch. 2010: 538 (2010)
2000 – 2009
- 2009
- [c6]Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer:
Rebound Attack on the Full Lane Compression Function. ASIACRYPT 2009: 106-125 - [c5]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256. CRYPTO 2009: 231-249 - [c4]Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic:
Speeding up Collision Search for Byte-Oriented Hash Functions. CT-RSA 2009: 164-181 - [c3]Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [c2]Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann:
Meet-in-the-Middle Attacks on SHA-3 Candidates. FSE 2009: 228-245 - [i4]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version). IACR Cryptol. ePrint Arch. 2009: 241 (2009) - [i3]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Examples of differential multicollisions for 13 and 14 rounds of AES-256. IACR Cryptol. ePrint Arch. 2009: 242 (2009) - [i2]Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer:
Rebound Attack on the Full LANE Compression Function. IACR Cryptol. ePrint Arch. 2009: 443 (2009) - 2008
- [c1]Ivica Nikolic, Alex Biryukov:
Collisions for Step-Reduced SHA-256. FSE 2008: 1-15 - [i1]Dmitry Khovratovich, Ivica Nikolic:
Cryptanalysis of EnRUPT. IACR Cryptol. ePrint Arch. 2008: 467 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-04 03:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint