BibTeX records: Florian Mendel

download as .bib file

@article{DBLP:journals/tches/GigerlKMMP24,
  author       = {Barbara Gigerl and
                  Franz Klug and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Smooth Passage with the Guards: Second-Order Hardware Masking of the
                  {AES} with Low Randomness and Low Latency},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {309--335},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.309-335},
  doi          = {10.46586/TCHES.V2024.I1.309-335},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GigerlKMMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DobraunigEMS24,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Elisabeth Oswald},
  title        = {Ascon MAC, PRF, and Short-Input {PRF} - Lightweight, Fast, and Efficient
                  Pseudorandom Functions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2024 - Cryptographers' Track at the
                  {RSA} Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14643},
  pages        = {381--403},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58868-6\_15},
  doi          = {10.1007/978-3-031-58868-6\_15},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DobraunigEMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GigerlMSP24,
  author       = {Barbara Gigerl and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer and
                  Robert Primas},
  title        = {Efficient Second-Order Masked Software Implementations of Ascon in
                  Theory and Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/755},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GigerlMSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS24,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Preliminary Analysis of Ascon-Xof and Ascon-Hash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/908},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrasadMSN23,
  author       = {Srinidhi Hari Prasad and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer and
                  Rishub Nagpal},
  title        = {Efficient Low-Latency Masking of Ascon without Fresh Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1914},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1914},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PrasadMSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ErlacherME22,
  author       = {Johannes Erlacher and
                  Florian Mendel and
                  Maria Eichlseder},
  title        = {Bounds for the Security of Ascon against Differential and Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {64--87},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.64-87},
  doi          = {10.46586/TOSC.V2022.I1.64-87},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ErlacherME22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DobraunigEMS21,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Ascon v1.2: Lightweight Authenticated Encryption and Hashing},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {33},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09398-9},
  doi          = {10.1007/S00145-021-09398-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DobraunigEMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS21,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Ascon PRF, MAC, and Short-Input {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1574},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1574},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangLCMD20,
  author       = {Gaoli Wang and
                  Fukang Liu and
                  Binbin Cui and
                  Florian Mendel and
                  Christoph Dobraunig},
  title        = {Improved (semi-free-start/near-) collision and distinguishing attacks
                  on round-reduced {RIPEMD-160}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {887--930},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00718-x},
  doi          = {10.1007/S10623-020-00718-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangLCMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DobraunigMM20,
  author       = {Christoph Dobraunig and
                  Florian Mendel and
                  Bart Mennink},
  title        = {Practical forgeries for {ORANGE}},
  journal      = {Inf. Process. Lett.},
  volume       = {159-160},
  pages        = {105961},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ipl.2020.105961},
  doi          = {10.1016/J.IPL.2020.105961},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/DobraunigMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DaemenDEGMP20,
  author       = {Joan Daemen and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Florian Mendel and
                  Robert Primas},
  title        = {Protecting against Statistical Ineffective Fault Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {508--543},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.508-543},
  doi          = {10.13154/TCHES.V2020.I3.508-543},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMMPU20,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Bart Mennink and
                  Robert Primas and
                  Thomas Unterluggauer},
  title        = {Isap v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {390--416},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.390-416},
  doi          = {10.13154/TOSC.V2020.IS1.390-416},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigMM20,
  author       = {Christoph Dobraunig and
                  Florian Mendel and
                  Bart Mennink},
  title        = {Practical Forgeries for {ORANGE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MendelS19,
  author       = {Florian Mendel and
                  Yu Sasaki},
  title        = {Preface to Volume 2019, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {1--4},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.1-4},
  doi          = {10.13154/TOSC.V2019.I1.1-4},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MendelS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  title        = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {169--192},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.169-192},
  doi          = {10.13154/TOSC.V2019.I3.169-192},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Efficient Collision Attack Frameworks for {RIPEMD-160}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {117--149},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_5},
  doi          = {10.1007/978-3-030-26951-7\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigEMS19,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Markus Schofnegger},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Algebraic Cryptanalysis of Variants of Frit},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {149--170},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_7},
  doi          = {10.1007/978-3-030-38471-5\_7},
  timestamp    = {Tue, 07 May 2024 20:12:23 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigEMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenDEGMP19,
  author       = {Joan Daemen and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Florian Mendel and
                  Robert Primas},
  title        = {Protecting against Statistical Ineffective Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenDEGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  title        = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {547--572},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.547-572},
  doi          = {10.13154/TCHES.V2018.I3.547-572},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MendelN18,
  author       = {Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Preface to Volume 2018, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.1-4},
  doi          = {10.13154/TOSC.V2018.I1.1-4},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MendelN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEGMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {315--342},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_11},
  doi          = {10.1007/978-3-030-03329-3\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEGMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DobraunigE0LLLM18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Lorenzo Grassi and
                  Virginie Lallemand and
                  Gregor Leander and
                  Eik List and
                  Florian Mendel and
                  Christian Rechberger},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Rasta: {A} Cipher with Low ANDdepth and Few ANDs per Bit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {662--692},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_22},
  doi          = {10.1007/978-3-319-96884-1\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DobraunigE0LLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigMMP18,
  author       = {Christoph Dobraunig and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Fault Attacks on Nonce-Based Authenticated Encryption: Application
                  to Keyak and Ketje},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {257--277},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_12},
  doi          = {10.1007/978-3-030-10970-7\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigE0LLLM18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Lorenzo Grassi and
                  Virginie Lallemand and
                  Gregor Leander and
                  Eik List and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Rasta: {A} cipher with low ANDdepth and few ANDs per bit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigE0LLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEGMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Markus Schofnegger},
  title        = {Algebraic Cryptanalysis of Frit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigMMP18,
  author       = {Christoph Dobraunig and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Fault Attacks on Nonce-based Authenticated Encryption: Application
                  to Keyak and Ketje},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMU17,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {80--105},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.80-105},
  doi          = {10.13154/TOSC.V2017.I1.80-105},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AnkeleBCLMSW17,
  author       = {Ralph Ankele and
                  Subhadeep Banik and
                  Avik Chakraborti and
                  Eik List and
                  Florian Mendel and
                  Siang Meng Sim and
                  Gaoli Wang},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Related-Key Impossible-Differential Attack on Reduced-Round Skinny},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {208--228},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_11},
  doi          = {10.1007/978-3-319-61204-1\_11},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AnkeleBCLMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuMW17,
  author       = {Fukang Liu and
                  Florian Mendel and
                  Gaoli Wang},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {158--186},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_6},
  doi          = {10.1007/978-3-319-70694-8\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Gimli : {A} Cross-Platform Permutation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {299--320},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_15},
  doi          = {10.1007/978-3-319-66787-4\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DobraunigEKM17,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Florian Mendel},
  editor       = {Sylvain Guilley},
  title        = {Side-Channel Analysis of Keymill},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {138--152},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_9},
  doi          = {10.1007/978-3-319-64647-3\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/DobraunigEKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinKLMMNS17,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  title        = {Gimli: a cross-platform permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuMW17,
  author       = {Fukang Liu and
                  Florian Mendel and
                  Gaoli Wang},
  title        = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {800},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/800},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalesEM17,
  author       = {Daniel Kales and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Note on the Robustness of {CAESAR} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1137},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalesEM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KolblLMR16,
  author       = {Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {1--29},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.1-29},
  doi          = {10.13154/TOSC.V2016.I2.1-29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KolblLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEKM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Daniel Kales and
                  Florian Mendel},
  title        = {Practical Key-Recovery Attack on {MANTIS5}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {248--260},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.248-260},
  doi          = {10.13154/TOSC.V2016.I2.248-260},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BagheriMS16,
  author       = {Nasour Bagheri and
                  Florian Mendel and
                  Yu Sasaki},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate
                  {PAEQ}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_19},
  doi          = {10.1007/978-3-319-40367-0\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BagheriMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Square Attack on 7-Round Kiasu-BC},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {500--517},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_27},
  doi          = {10.1007/978-3-319-39555-5\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEKLM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Victor Lomn{\'{e}} and
                  Florian Mendel},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Statistical Fault Attacks on Nonce-Based Authenticated Encryption
                  Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {369--395},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_14},
  doi          = {10.1007/978-3-662-53887-6\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEKLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BagheriHJMS16,
  author       = {Nasour Bagheri and
                  Tao Huang and
                  Keting Jia and
                  Florian Mendel and
                  Yu Sasaki},
  editor       = {Thomas Peyrin},
  title        = {Cryptanalysis of Reduced {NORX}},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {554--574},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_28},
  doi          = {10.1007/978-3-662-52993-5\_28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BagheriHJMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Thomas Peyrin},
  title        = {Analysis of the Kupyna-256 Hash Function},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {575--590},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_29},
  doi          = {10.1007/978-3-662-52993-5\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Roberto Avanzi and
                  Howard M. Heys},
  title        = {Cryptanalysis of Simpira v1},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
                  St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10532},
  pages        = {284--298},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69453-5\_16},
  doi          = {10.1007/978-3-319-69453-5\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolblLMR16,
  author       = {Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Haraka - Efficient Short-Input Hashing for Post-Quantum Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolblLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Cryptanalysis of Simpira},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Square Attack on 7-Round Kiasu-BC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16b,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Analysis of {SHA-512/224} and {SHA-512/256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheriHJMS16,
  author       = {Nasour Bagheri and
                  Tao Huang and
                  Keting Jia and
                  Florian Mendel and
                  Yu Sasaki},
  title        = {Cryptanalysis of Reduced {NORX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheriHJMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKLM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Victor Lomn{\'{e}} and
                  Florian Mendel},
  title        = {Practical Fault Attacks on Authenticated Encryption Modes for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16c,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Key Recovery for {MANTIS-5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Florian Mendel},
  title        = {Side-Channel Analysis of Keymill},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/793},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMMU16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive
                  Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleBCLMSW16,
  author       = {Ralph Ankele and
                  Subhadeep Banik and
                  Avik Chakraborti and
                  Eik List and
                  Florian Mendel and
                  Siang Meng Sim and
                  Gaoli Wang},
  title        = {Related-Key Impossible-Differential Attack on Reduced-Round {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleBCLMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LambergerMSRR15,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer and
                  Christian Rechberger and
                  Vincent Rijmen},
  title        = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {257--296},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9166-5},
  doi          = {10.1007/S00145-013-9166-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/LambergerMSRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR}
                  Candidates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {490--509},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_20},
  doi          = {10.1007/978-3-662-48800-3\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Analysis of {SHA-512/224} and {SHA-512/256}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {612--630},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_25},
  doi          = {10.1007/978-3-662-48800-3\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DobraunigKMMS15,
  author       = {Christoph Dobraunig and
                  Fran{\c{c}}ois Koeune and
                  Stefan Mangard and
                  Florian Mendel and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_14},
  doi          = {10.1007/978-3-319-31271-2\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/DobraunigKMMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DobraunigEMS15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of Ascon},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {371--387},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_20},
  doi          = {10.1007/978-3-319-16715-2\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DobraunigEMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Gregor Leander},
  title        = {Related-Key Forgeries for Pr{\o}st-OTR},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_14},
  doi          = {10.1007/978-3-662-48116-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Higher-Order Cryptanalysis of LowMC},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_6},
  doi          = {10.1007/978-3-319-30840-1\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Forgery Attacks on Round-Reduced {ICEPOLE-128}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {479--492},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_27},
  doi          = {10.1007/978-3-319-31301-6\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Cryptanalysis of Ascon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel},
  title        = {On the Security of Fresh Re-keying to Counteract Side-Channel and
                  Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Related-Key Forgeries for Pr{\o}st-OTR},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelNS15,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  title        = {Improving Local Collisions: New Attacks on Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Forgery Attacks on round-reduced {ICEPOLE-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15b,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Higher-order cryptanalysis of LowMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginBKMW15,
  author       = {Beg{\"{u}}l Bilgin and
                  Andrey Bogdanov and
                  Miroslav Knezevic and
                  Florian Mendel and
                  Qingju Wang},
  title        = {{FIDES:} Lightweight Authenticated Cipher with Side-Channel Resistance
                  for Constrained Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/424},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginBKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15c,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Analysis of the Kupyna-256 Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/956},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15d,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR}
                  Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1200},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DobraunigEMM14,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel},
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {On the Security of Fresh Re-keying to Counteract Side-Channel and
                  Fault Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  pages        = {233--244},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16763-3\_14},
  doi          = {10.1007/978-3-319-16763-3\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/DobraunigEMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EichlsederMS14,
  author       = {Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Branching Heuristics in Differential Collision Search with Applications
                  to {SHA-512}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {473--488},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_24},
  doi          = {10.1007/978-3-662-46706-0\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EichlsederMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelRS14,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Collision Attack on 5 Rounds of Gr{\o}stl},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {509--521},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_26},
  doi          = {10.1007/978-3-662-46706-0\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BogdanovDELMST14,
  author       = {Andrey Bogdanov and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Martin M. Lauridsen and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer and
                  Elmar Tischhauser},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {Key Recovery Attacks on Recent Authenticated Ciphers},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {274--287},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_15},
  doi          = {10.1007/978-3-319-16295-9\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BogdanovDELMST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AlbertiniAEMS14,
  author       = {Ange Albertini and
                  Jean{-}Philippe Aumasson and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Malicious Hashing: Eve's Variant of {SHA-1}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_1},
  doi          = {10.1007/978-3-319-13051-4\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AlbertiniAEMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigMS14,
  author       = {Christoph Dobraunig and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Differential Cryptanalysis of SipHash},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {165--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_10},
  doi          = {10.1007/978-3-319-13051-4\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederMS14,
  author       = {Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Branching Heuristics in Differential Collision Search with Applications
                  to {SHA-512}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelRS14,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {Collision Attack on 5 Rounds of Gr{\o}stl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbertiniAEMS14a,
  author       = {Ange Albertini and
                  Jean{-}Philippe Aumasson and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Malicious Hashing: Eve's Variant of {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbertiniAEMS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigMS14,
  author       = {Christoph Dobraunig and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Differential Cryptanalysis of SipHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/722},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelPSWW13,
  author       = {Florian Mendel and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer and
                  Lei Wang and
                  Shuang Wu},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Improved Cryptanalysis of Reduced {RIPEMD-160}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {484--503},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_25},
  doi          = {10.1007/978-3-642-42045-0\_25},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelPSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BilginBKMW13,
  author       = {Beg{\"{u}}l Bilgin and
                  Andrey Bogdanov and
                  Miroslav Knezevic and
                  Florian Mendel and
                  Qingju Wang},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Fides: Lightweight Authenticated Cipher with Side-Channel Resistance
                  for Constrained Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {142--158},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_9},
  doi          = {10.1007/978-3-642-40349-1\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BilginBKMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MendelRTV13,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Ed Dawson},
  title        = {Collisions for the {WIDEA-8} Compression Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {162--173},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_11},
  doi          = {10.1007/978-3-642-36095-4\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MendelRTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MendelNS13,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Ed Dawson},
  title        = {Finding Collisions for Round-Reduced {SM3}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {174--188},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_12},
  doi          = {10.1007/978-3-642-36095-4\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MendelNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MendelNS13,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Improving Local Collisions: New Attacks on Reduced {SHA-256}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {262--278},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_16},
  doi          = {10.1007/978-3-642-38348-9\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MendelNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BogdanovMRRT13,
  author       = {Andrey Bogdanov and
                  Florian Mendel and
                  Francesco Regazzoni and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  editor       = {Shiho Moriai},
  title        = {{ALE:} AES-Based Lightweight Authenticated Encryption},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {447--466},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_23},
  doi          = {10.1007/978-3-662-43933-3\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BogdanovMRRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KolblMNS13,
  author       = {Stefan K{\"{o}}lbl and
                  Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Martijn Stam},
  title        = {Differential Cryptanalysis of Keccak Variants},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_9},
  doi          = {10.1007/978-3-642-45239-0\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KolblMNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelPSWW13,
  author       = {Florian Mendel and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer and
                  Lei Wang and
                  Shuang Wu},
  title        = {Improved Cryptanalysis of Reduced {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/600},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelPSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LambergerMRS12,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Vincent Rijmen and
                  Koen Simoens},
  title        = {Memoryless near-collisions via coding theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {1--18},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9484-2},
  doi          = {10.1007/S10623-011-9484-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LambergerMRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiMA12,
  author       = {Yu Sasaki and
                  Florian Mendel and
                  Kazumaro Aoki},
  title        = {Preimage Attacks against PKC98-Hash and {HAS-V}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {111--124},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.111},
  doi          = {10.1587/TRANSFUN.E95.A.111},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiMA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelRTV12,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Differential Analysis of the {LED} Block Cipher},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {190--207},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_13},
  doi          = {10.1007/978-3-642-34961-4\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelRTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MendelMRT12,
  author       = {Florian Mendel and
                  Bart Mennink and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {A Simple Key-Recovery Attack on McOE-X},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {23--31},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_3},
  doi          = {10.1007/978-3-642-35404-5\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/MendelMRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelNS12,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Anne Canteaut},
  title        = {Collision Attacks on the Reduced Dual-Stream Hash Function {RIPEMD-128}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {226--243},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_14},
  doi          = {10.1007/978-3-642-34047-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LambergerMR12,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Vincent Rijmen},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Collision Attack on the Hamsi-256 Compression Function},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_10},
  doi          = {10.1007/978-3-642-34931-7\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LambergerMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MendelNSS12,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Stefan Scherz and
                  Martin Schl{\"{a}}ffer},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Differential Attacks on Reduced {RIPEMD-160}},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {23--38},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_2},
  doi          = {10.1007/978-3-642-33383-5\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/MendelNSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelRTV12,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  title        = {Differential Analysis of the {LED} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelRTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KolblM11,
  author       = {Stefan K{\"{o}}lbl and
                  Florian Mendel},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Practical Attacks on the Maelstrom-0 Compression Function},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {449--461},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_26},
  doi          = {10.1007/978-3-642-21554-4\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KolblM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BiryukovLMN11,
  author       = {Alex Biryukov and
                  Mario Lamberger and
                  Florian Mendel and
                  Ivica Nikolic},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Second-Order Differential Collisions for Reduced {SHA-256}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {270--287},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_15},
  doi          = {10.1007/978-3-642-25385-0\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BiryukovLMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelNS11,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Finding {SHA-2} Characteristics: Searching through a Minefield of
                  Contradictions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {288--307},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_16},
  doi          = {10.1007/978-3-642-25385-0\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelNS11,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Howon Kim},
  title        = {Cryptanalysis of Round-Reduced {HAS-160}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_3},
  doi          = {10.1007/978-3-642-31912-9\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MendelN11,
  author       = {Florian Mendel and
                  Tomislav Nad},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Boomerang Distinguisher for the {SIMD-512} Compression Function},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_19},
  doi          = {10.1007/978-3-642-25578-6\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MendelN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LambergerM11,
  author       = {Mario Lamberger and
                  Florian Mendel},
  title        = {Higher-Order Differential Attack on Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LambergerM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10,
  author       = {Praveen Gauravaram and
                  Ga{\"{e}}tan Leurent and
                  Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Cryptanalysis of the 10-Round Hash and Full Compression Function of
                  SHAvite-3-512},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {419--436},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_25},
  doi          = {10.1007/978-3-642-12678-9\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MendelRST10,
  author       = {Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer and
                  S{\o}ren S. Thomsen},
  editor       = {Josef Pieprzyk},
  title        = {Rebound Attacks on the Reduced Gr{\o}stl Hash Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {350--365},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_24},
  doi          = {10.1007/978-3-642-11925-5\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MendelRST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiMA10,
  author       = {Yu Sasaki and
                  Florian Mendel and
                  Kazumaro Aoki},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Preimage Attacks against PKC98-Hash and {HAS-V}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {68--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_5},
  doi          = {10.1007/978-3-642-24209-0\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/SasakiMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LambergerMRRS10,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Christian Rechberger and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LambergerMRRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MendelRS09,
  author       = {Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Cryptanalysis of Twister},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {342--353},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_21},
  doi          = {10.1007/978-3-642-01957-9\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/MendelRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MendelNS09,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Collision Attack on Boole},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {369--381},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_23},
  doi          = {10.1007/978-3-642-01957-9\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/MendelNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AumassonDMRT09,
  author       = {Jean{-}Philippe Aumasson and
                  Orr Dunkelman and
                  Florian Mendel and
                  Christian Rechberger and
                  S{\o}ren S. Thomsen},
  editor       = {Bart Preneel},
  title        = {Cryptanalysis of Vortex},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_2},
  doi          = {10.1007/978-3-642-02384-2\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AumassonDMRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Mendel09,
  author       = {Florian Mendel},
  editor       = {Bart Preneel},
  title        = {Two Passes of Tiger Are Not One-Way},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {29--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_3},
  doi          = {10.1007/978-3-642-02384-2\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Mendel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LambergerMRRS09,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Christian Rechberger and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {Rebound Distinguishers: Results on the Full Whirlpool Compression
                  Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_8},
  doi          = {10.1007/978-3-642-10366-7\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LambergerMRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelRS09,
  author       = {Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {{MD5} Is Weaker Than Weak: Attacks on Concatenated Combiners},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_9},
  doi          = {10.1007/978-3-642-10366-7\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenMRT09,
  author       = {Lars R. Knudsen and
                  Florian Mendel and
                  Christian Rechberger and
                  S{\o}ren S. Thomsen},
  editor       = {Antoine Joux},
  title        = {Cryptanalysis of {MDC-2}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {106--120},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_6},
  doi          = {10.1007/978-3-642-01001-9\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenMRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelRST09,
  author       = {Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer and
                  S{\o}ren S. Thomsen},
  editor       = {Orr Dunkelman},
  title        = {The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr{\o}stl},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {260--276},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_16},
  doi          = {10.1007/978-3-642-03317-9\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelRST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MendelN09,
  author       = {Florian Mendel and
                  Tomislav Nad},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {A Distinguisher for the Compression Function of {SIMD-512}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {219--232},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_15},
  doi          = {10.1007/978-3-642-10628-6\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MendelN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LambergerM09,
  author       = {Mario Lamberger and
                  Florian Mendel},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Structural Attacks on Two {SHA-3} Candidates: Blender-n and DCH-n},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {68--78},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_6},
  doi          = {10.1007/978-3-642-04474-8\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/LambergerM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MendelS09,
  author       = {Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {On Free-Start Collisions and Collisions for {TIB3}},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_8},
  doi          = {10.1007/978-3-642-04474-8\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/MendelS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPS09,
  author       = {Sebastiaan Indesteege and
                  Florian Mendel and
                  Bart Preneel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Practical Collisions for {SHAMATA-256}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_1},
  doi          = {10.1007/978-3-642-05445-7\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MendelPRS09,
  author       = {Florian Mendel and
                  Thomas Peyrin and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Improved Cryptanalysis of the Reduced Gr{\o}stl Compression Function,
                  {ECHO} Permutation and {AES} Block Cipher},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {16--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_2},
  doi          = {10.1007/978-3-642-05445-7\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MendelPRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer and
                  S{\o}ren S. Thomsen},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Gr{\o}stl - a {SHA-3} candidate},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MendelS08,
  author       = {Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Collisions for Round-Reduced {LAKE}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {267--281},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_20},
  doi          = {10.1007/978-3-540-70500-0\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MendelS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MendelPRKS08,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Marcin Kontak and
                  Janusz Szmidt},
  editor       = {David A. Wagner},
  title        = {Cryptanalysis of the {GOST} Hash Function},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {162--178},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_10},
  doi          = {10.1007/978-3-540-85174-5\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MendelPRKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPR08,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger},
  editor       = {Kaisa Nyberg},
  title        = {A (Second) Preimage Attack on the {GOST} Hash Function},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {224--234},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_14},
  doi          = {10.1007/978-3-540-71039-4\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AumassonMM08,
  author       = {Jean{-}Philippe Aumasson and
                  Willi Meier and
                  Florian Mendel},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_8},
  doi          = {10.1007/978-3-642-04159-4\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AumassonMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPR08,
  author       = {Sebastiaan Indesteege and
                  Florian Mendel and
                  Bart Preneel and
                  Christian Rechberger},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Collisions and Other Non-random Properties for Step-Reduced {SHA-256}},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {276--293},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_18},
  doi          = {10.1007/978-3-642-04159-4\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelS08,
  author       = {Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Collisions for Round-Reduced {LAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelPRR08,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  title        = {Analysis of Step-Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelPRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IndesteegeMPR08,
  author       = {Sebastiaan Indesteege and
                  Florian Mendel and
                  Bart Preneel and
                  Christian Rechberger},
  title        = {Collisions and other Non-Random Properties for Step-Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IndesteegeMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonMM08,
  author       = {Jean{-}Philippe Aumasson and
                  Willi Meier and
                  Florian Mendel},
  title        = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelR07,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kaoru Kurosawa},
  title        = {Cryptanalysis of the Tiger Hash Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {536--550},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_33},
  doi          = {10.1007/978-3-540-76900-2\_33},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MendelLP07,
  author       = {Florian Mendel and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Masayuki Abe},
  title        = {Cryptanalysis of Reduced Variants of the {FORK-256} Hash Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_6},
  doi          = {10.1007/11967668\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MendelLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelR07,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Colliding Message Pair for 53-Step {HAS-160}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {324--334},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_26},
  doi          = {10.1007/978-3-540-76788-6\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelR07a,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Weaknesses in the {HAS-V} Compression Function},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {335--345},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_27},
  doi          = {10.1007/978-3-540-76788-6\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CanniereMR07,
  author       = {Christophe De Canni{\`{e}}re and
                  Florian Mendel and
                  Christian Rechberger},
  editor       = {Carlisle M. Adams and
                  Ali Miri and
                  Michael J. Wiener},
  title        = {Collisions for 70-Step {SHA-1:} On the Full Cost of Collision Search},
  booktitle    = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
                  2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {56--73},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77360-3\_4},
  doi          = {10.1007/978-3-540-77360-3\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CanniereMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPRR06,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Matthew J. B. Robshaw},
  title        = {Analysis of Step-Reduced {SHA-256}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_9},
  doi          = {10.1007/11799313\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPRR06a,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Matthew J. B. Robshaw},
  title        = {The Impact of Carries on the Complexity of Collision Attacks on {SHA-1}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_18},
  doi          = {10.1007/11799313\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPRR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelPR06,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Improved Collision Attack on the Hash Function Proposed at PKC'98},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {8--21},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_3},
  doi          = {10.1007/11927587\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06,
  author       = {Florian Mendel and
                  Bart Preneel and
                  Vincent Rijmen and
                  Hirotaka Yoshida and
                  Dai Watanabe},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Update on Tiger},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_6},
  doi          = {10.1007/11941378\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MendelPRR06,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {On the Collision Resistance of {RIPEMD-160}},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_8},
  doi          = {10.1007/11836810\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/MendelPRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mendel06,
  author       = {Florian Mendel},
  title        = {Colliding Message Pair for 53-Step {HAS-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mendel06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}