default search action
BibTeX records: Florian Mendel
@article{DBLP:journals/tches/GigerlKMMP24, author = {Barbara Gigerl and Franz Klug and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Smooth Passage with the Guards: Second-Order Hardware Masking of the {AES} with Low Randomness and Low Latency}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {309--335}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.309-335}, doi = {10.46586/TCHES.V2024.I1.309-335}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GigerlKMMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DobraunigEMS24, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Elisabeth Oswald}, title = {Ascon MAC, PRF, and Short-Input {PRF} - Lightweight, Fast, and Efficient Pseudorandom Functions}, booktitle = {Topics in Cryptology - {CT-RSA} 2024 - Cryptographers' Track at the {RSA} Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14643}, pages = {381--403}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58868-6\_15}, doi = {10.1007/978-3-031-58868-6\_15}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DobraunigEMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GigerlMSP24, author = {Barbara Gigerl and Florian Mendel and Martin Schl{\"{a}}ffer and Robert Primas}, title = {Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2024}, url = {https://eprint.iacr.org/2024/755}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GigerlMSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS24, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Preliminary Analysis of Ascon-Xof and Ascon-Hash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {908}, year = {2024}, url = {https://eprint.iacr.org/2024/908}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrasadMSN23, author = {Srinidhi Hari Prasad and Florian Mendel and Martin Schl{\"{a}}ffer and Rishub Nagpal}, title = {Efficient Low-Latency Masking of Ascon without Fresh Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1914}, year = {2023}, url = {https://eprint.iacr.org/2023/1914}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PrasadMSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ErlacherME22, author = {Johannes Erlacher and Florian Mendel and Maria Eichlseder}, title = {Bounds for the Security of Ascon against Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {64--87}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.64-87}, doi = {10.46586/TOSC.V2022.I1.64-87}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ErlacherME22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DobraunigEMS21, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Ascon v1.2: Lightweight Authenticated Encryption and Hashing}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {33}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09398-9}, doi = {10.1007/S00145-021-09398-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DobraunigEMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS21, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Ascon PRF, MAC, and Short-Input {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1574}, year = {2021}, url = {https://eprint.iacr.org/2021/1574}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangLCMD20, author = {Gaoli Wang and Fukang Liu and Binbin Cui and Florian Mendel and Christoph Dobraunig}, title = {Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced {RIPEMD-160}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {887--930}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00718-x}, doi = {10.1007/S10623-020-00718-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangLCMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DobraunigMM20, author = {Christoph Dobraunig and Florian Mendel and Bart Mennink}, title = {Practical forgeries for {ORANGE}}, journal = {Inf. Process. Lett.}, volume = {159-160}, pages = {105961}, year = {2020}, url = {https://doi.org/10.1016/j.ipl.2020.105961}, doi = {10.1016/J.IPL.2020.105961}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/DobraunigMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DaemenDEGMP20, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {508--543}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.508-543}, doi = {10.13154/TCHES.V2020.I3.508-543}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMMPU20, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Bart Mennink and Robert Primas and Thomas Unterluggauer}, title = {Isap v2.0}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {390--416}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.390-416}, doi = {10.13154/TOSC.V2020.IS1.390-416}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigMM20, author = {Christoph Dobraunig and Florian Mendel and Bart Mennink}, title = {Practical Forgeries for {ORANGE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2020}, url = {https://eprint.iacr.org/2020/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MendelS19, author = {Florian Mendel and Yu Sasaki}, title = {Preface to Volume 2019, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {1--4}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.1-4}, doi = {10.13154/TOSC.V2019.I1.1-4}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MendelS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, title = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {169--192}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.169-192}, doi = {10.13154/TOSC.V2019.I3.169-192}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Efficient Collision Attack Frameworks for {RIPEMD-160}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {117--149}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_5}, doi = {10.1007/978-3-030-26951-7\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigEMS19, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Algebraic Cryptanalysis of Variants of Frit}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {149--170}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_7}, doi = {10.1007/978-3-030-38471-5\_7}, timestamp = {Tue, 07 May 2024 20:12:23 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigEMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenDEGMP19, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2019}, url = {https://eprint.iacr.org/2019/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenDEGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, title = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2019}, url = {https://eprint.iacr.org/2019/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {547--572}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.547-572}, doi = {10.13154/TCHES.V2018.I3.547-572}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MendelN18, author = {Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Preface to Volume 2018, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.1-4}, doi = {10.13154/TOSC.V2018.I1.1-4}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MendelN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEGMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Stefan Mangard and Florian Mendel and Robert Primas}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {315--342}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_11}, doi = {10.1007/978-3-030-03329-3\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEGMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DobraunigE0LLLM18, author = {Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Rasta: {A} Cipher with Low ANDdepth and Few ANDs per Bit}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {662--692}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_22}, doi = {10.1007/978-3-319-96884-1\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DobraunigE0LLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigMMP18, author = {Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {257--277}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_12}, doi = {10.1007/978-3-030-10970-7\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2018}, url = {http://eprint.iacr.org/2018/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigE0LLLM18, author = {Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger}, title = {Rasta: {A} cipher with low ANDdepth and few ANDs per bit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2018}, url = {http://eprint.iacr.org/2018/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigE0LLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEGMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2018}, url = {https://eprint.iacr.org/2018/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS18, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger}, title = {Algebraic Cryptanalysis of Frit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2018}, url = {https://eprint.iacr.org/2018/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigMMP18, author = {Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2018}, url = {https://eprint.iacr.org/2018/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMU17, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {80--105}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.80-105}, doi = {10.13154/TOSC.V2017.I1.80-105}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AnkeleBCLMSW17, author = {Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Related-Key Impossible-Differential Attack on Reduced-Round Skinny}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {208--228}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_11}, doi = {10.1007/978-3-319-61204-1\_11}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/AnkeleBCLMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuMW17, author = {Fukang Liu and Florian Mendel and Gaoli Wang}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {158--186}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_6}, doi = {10.1007/978-3-319-70694-8\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, editor = {Wieland Fischer and Naofumi Homma}, title = {Gimli : {A} Cross-Platform Permutation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {299--320}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_15}, doi = {10.1007/978-3-319-66787-4\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DobraunigEKM17, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel}, editor = {Sylvain Guilley}, title = {Side-Channel Analysis of Keymill}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {138--152}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_9}, doi = {10.1007/978-3-319-64647-3\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/DobraunigEKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinKLMMNS17, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, title = {Gimli: a cross-platform permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2017}, url = {http://eprint.iacr.org/2017/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuMW17, author = {Fukang Liu and Florian Mendel and Gaoli Wang}, title = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {800}, year = {2017}, url = {http://eprint.iacr.org/2017/800}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalesEM17, author = {Daniel Kales and Maria Eichlseder and Florian Mendel}, title = {Note on the Robustness of {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1137}, year = {2017}, url = {http://eprint.iacr.org/2017/1137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalesEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KolblLMR16, author = {Stefan K{\"{o}}lbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger}, title = {Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {1--29}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.1-29}, doi = {10.13154/TOSC.V2016.I2.1-29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KolblLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEKM16, author = {Christoph Dobraunig and Maria Eichlseder and Daniel Kales and Florian Mendel}, title = {Practical Key-Recovery Attack on {MANTIS5}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {248--260}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.248-260}, doi = {10.13154/TOSC.V2016.I2.248-260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BagheriMS16, author = {Nasour Bagheri and Florian Mendel and Yu Sasaki}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate {PAEQ}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {301--316}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_19}, doi = {10.1007/978-3-319-40367-0\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BagheriMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Square Attack on 7-Round Kiasu-BC}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {500--517}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_27}, doi = {10.1007/978-3-319-39555-5\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEKLM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomn{\'{e}} and Florian Mendel}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {369--395}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_14}, doi = {10.1007/978-3-662-53887-6\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEKLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BagheriHJMS16, author = {Nasour Bagheri and Tao Huang and Keting Jia and Florian Mendel and Yu Sasaki}, editor = {Thomas Peyrin}, title = {Cryptanalysis of Reduced {NORX}}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {554--574}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_28}, doi = {10.1007/978-3-662-52993-5\_28}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BagheriHJMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Thomas Peyrin}, title = {Analysis of the Kupyna-256 Hash Function}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {575--590}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_29}, doi = {10.1007/978-3-662-52993-5\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Roberto Avanzi and Howard M. Heys}, title = {Cryptanalysis of Simpira v1}, booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10532}, pages = {284--298}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69453-5\_16}, doi = {10.1007/978-3-319-69453-5\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolblLMR16, author = {Stefan K{\"{o}}lbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger}, title = {Haraka - Efficient Short-Input Hashing for Post-Quantum Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2016}, url = {http://eprint.iacr.org/2016/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolblLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Cryptanalysis of Simpira}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2016}, url = {http://eprint.iacr.org/2016/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Square Attack on 7-Round Kiasu-BC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2016}, url = {http://eprint.iacr.org/2016/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16b, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of {SHA-512/224} and {SHA-512/256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2016}, url = {http://eprint.iacr.org/2016/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheriHJMS16, author = {Nasour Bagheri and Tao Huang and Keting Jia and Florian Mendel and Yu Sasaki}, title = {Cryptanalysis of Reduced {NORX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2016}, url = {http://eprint.iacr.org/2016/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagheriHJMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKLM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomn{\'{e}} and Florian Mendel}, title = {Practical Fault Attacks on Authenticated Encryption Modes for {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2016}, url = {http://eprint.iacr.org/2016/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16c, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Key Recovery for {MANTIS-5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2016}, url = {http://eprint.iacr.org/2016/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel}, title = {Side-Channel Analysis of Keymill}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2016}, url = {http://eprint.iacr.org/2016/793}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMMU16, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2016}, url = {http://eprint.iacr.org/2016/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleBCLMSW16, author = {Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang}, title = {Related-Key Impossible-Differential Attack on Reduced-Round {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2016}, url = {http://eprint.iacr.org/2016/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleBCLMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LambergerMSRR15, author = {Mario Lamberger and Florian Mendel and Martin Schl{\"{a}}ffer and Christian Rechberger and Vincent Rijmen}, title = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {257--296}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9166-5}, doi = {10.1007/S00145-013-9166-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/LambergerMSRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR} Candidates}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {490--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_20}, doi = {10.1007/978-3-662-48800-3\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Analysis of {SHA-512/224} and {SHA-512/256}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {612--630}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_25}, doi = {10.1007/978-3-662-48800-3\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DobraunigKMMS15, author = {Christoph Dobraunig and Fran{\c{c}}ois Koeune and Stefan Mangard and Florian Mendel and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Naofumi Homma and Marcel Medwed}, title = {Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {225--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_14}, doi = {10.1007/978-3-319-31271-2\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/DobraunigKMMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DobraunigEMS15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of Ascon}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {371--387}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_20}, doi = {10.1007/978-3-319-16715-2\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/DobraunigEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Gregor Leander}, title = {Related-Key Forgeries for Pr{\o}st-OTR}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {282--296}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_14}, doi = {10.1007/978-3-662-48116-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Soonhak Kwon and Aaram Yun}, title = {Higher-Order Cryptanalysis of LowMC}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {87--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_6}, doi = {10.1007/978-3-319-30840-1\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Orr Dunkelman and Liam Keliher}, title = {Forgery Attacks on Round-Reduced {ICEPOLE-128}}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {479--492}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_27}, doi = {10.1007/978-3-319-31301-6\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Cryptanalysis of Ascon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2015}, url = {http://eprint.iacr.org/2015/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMM15, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2015}, url = {http://eprint.iacr.org/2015/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Related-Key Forgeries for Pr{\o}st-OTR}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2015}, url = {http://eprint.iacr.org/2015/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelNS15, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, title = {Improving Local Collisions: New Attacks on Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2015}, url = {http://eprint.iacr.org/2015/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Forgery Attacks on round-reduced {ICEPOLE-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2015}, url = {http://eprint.iacr.org/2015/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15b, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Higher-order cryptanalysis of LowMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2015}, url = {http://eprint.iacr.org/2015/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginBKMW15, author = {Beg{\"{u}}l Bilgin and Andrey Bogdanov and Miroslav Knezevic and Florian Mendel and Qingju Wang}, title = {{FIDES:} Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2015}, url = {http://eprint.iacr.org/2015/424}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginBKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15c, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of the Kupyna-256 Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2015}, url = {http://eprint.iacr.org/2015/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15d, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1200}, year = {2015}, url = {http://eprint.iacr.org/2015/1200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DobraunigEMM14, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, editor = {Marc Joye and Amir Moradi}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, booktitle = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, pages = {233--244}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16763-3\_14}, doi = {10.1007/978-3-319-16763-3\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/DobraunigEMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EichlsederMS14, author = {Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Carlos Cid and Christian Rechberger}, title = {Branching Heuristics in Differential Collision Search with Applications to {SHA-512}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {473--488}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_24}, doi = {10.1007/978-3-662-46706-0\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EichlsederMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelRS14, author = {Florian Mendel and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Carlos Cid and Christian Rechberger}, title = {Collision Attack on 5 Rounds of Gr{\o}stl}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {509--521}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_26}, doi = {10.1007/978-3-662-46706-0\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BogdanovDELMST14, author = {Andrey Bogdanov and Christoph Dobraunig and Maria Eichlseder and Martin M. Lauridsen and Florian Mendel and Martin Schl{\"{a}}ffer and Elmar Tischhauser}, editor = {Diego F. Aranha and Alfred Menezes}, title = {Key Recovery Attacks on Recent Authenticated Ciphers}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {274--287}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_15}, doi = {10.1007/978-3-319-16295-9\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/BogdanovDELMST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AlbertiniAEMS14, author = {Ange Albertini and Jean{-}Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Antoine Joux and Amr M. Youssef}, title = {Malicious Hashing: Eve's Variant of {SHA-1}}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {1--19}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_1}, doi = {10.1007/978-3-319-13051-4\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/AlbertiniAEMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigMS14, author = {Christoph Dobraunig and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Antoine Joux and Amr M. Youssef}, title = {Differential Cryptanalysis of SipHash}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {165--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_10}, doi = {10.1007/978-3-319-13051-4\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederMS14, author = {Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Branching Heuristics in Differential Collision Search with Applications to {SHA-512}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2014}, url = {http://eprint.iacr.org/2014/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelRS14, author = {Florian Mendel and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {Collision Attack on 5 Rounds of Gr{\o}stl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2014}, url = {http://eprint.iacr.org/2014/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbertiniAEMS14a, author = {Ange Albertini and Jean{-}Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Malicious Hashing: Eve's Variant of {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2014}, url = {http://eprint.iacr.org/2014/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbertiniAEMS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigMS14, author = {Christoph Dobraunig and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Differential Cryptanalysis of SipHash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2014}, url = {http://eprint.iacr.org/2014/722}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MendelPSWW13, author = {Florian Mendel and Thomas Peyrin and Martin Schl{\"{a}}ffer and Lei Wang and Shuang Wu}, editor = {Kazue Sako and Palash Sarkar}, title = {Improved Cryptanalysis of Reduced {RIPEMD-160}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {484--503}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_25}, doi = {10.1007/978-3-642-42045-0\_25}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MendelPSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BilginBKMW13, author = {Beg{\"{u}}l Bilgin and Andrey Bogdanov and Miroslav Knezevic and Florian Mendel and Qingju Wang}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {142--158}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_9}, doi = {10.1007/978-3-642-40349-1\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BilginBKMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MendelRTV13, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, editor = {Ed Dawson}, title = {Collisions for the {WIDEA-8} Compression Function}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {162--173}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_11}, doi = {10.1007/978-3-642-36095-4\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MendelRTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MendelNS13, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Ed Dawson}, title = {Finding Collisions for Round-Reduced {SM3}}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {174--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_12}, doi = {10.1007/978-3-642-36095-4\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MendelNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MendelNS13, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Improving Local Collisions: New Attacks on Reduced {SHA-256}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {262--278}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_16}, doi = {10.1007/978-3-642-38348-9\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MendelNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BogdanovMRRT13, author = {Andrey Bogdanov and Florian Mendel and Francesco Regazzoni and Vincent Rijmen and Elmar Tischhauser}, editor = {Shiho Moriai}, title = {{ALE:} AES-Based Lightweight Authenticated Encryption}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {447--466}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_23}, doi = {10.1007/978-3-662-43933-3\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BogdanovMRRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KolblMNS13, author = {Stefan K{\"{o}}lbl and Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Martijn Stam}, title = {Differential Cryptanalysis of Keccak Variants}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {141--157}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_9}, doi = {10.1007/978-3-642-45239-0\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/KolblMNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelPSWW13, author = {Florian Mendel and Thomas Peyrin and Martin Schl{\"{a}}ffer and Lei Wang and Shuang Wu}, title = {Improved Cryptanalysis of Reduced {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2013}, url = {http://eprint.iacr.org/2013/600}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelPSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LambergerMRS12, author = {Mario Lamberger and Florian Mendel and Vincent Rijmen and Koen Simoens}, title = {Memoryless near-collisions via coding theory}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9484-2}, doi = {10.1007/S10623-011-9484-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LambergerMRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiMA12, author = {Yu Sasaki and Florian Mendel and Kazumaro Aoki}, title = {Preimage Attacks against PKC98-Hash and {HAS-V}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {111--124}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.111}, doi = {10.1587/TRANSFUN.E95.A.111}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiMA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MendelRTV12, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Differential Analysis of the {LED} Block Cipher}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {190--207}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_13}, doi = {10.1007/978-3-642-34961-4\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/MendelRTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MendelMRT12, author = {Florian Mendel and Bart Mennink and Vincent Rijmen and Elmar Tischhauser}, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {A Simple Key-Recovery Attack on McOE-X}, booktitle = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, pages = {23--31}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5\_3}, doi = {10.1007/978-3-642-35404-5\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/MendelMRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelNS12, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Anne Canteaut}, title = {Collision Attacks on the Reduced Dual-Stream Hash Function {RIPEMD-128}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {226--243}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_14}, doi = {10.1007/978-3-642-34047-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LambergerMR12, author = {Mario Lamberger and Florian Mendel and Vincent Rijmen}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Collision Attack on the Hamsi-256 Compression Function}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {156--171}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_10}, doi = {10.1007/978-3-642-34931-7\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/LambergerMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MendelNSS12, author = {Florian Mendel and Tomislav Nad and Stefan Scherz and Martin Schl{\"{a}}ffer}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Differential Attacks on Reduced {RIPEMD-160}}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {23--38}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_2}, doi = {10.1007/978-3-642-33383-5\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/MendelNSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelRTV12, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, title = {Differential Analysis of the {LED} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2012}, url = {http://eprint.iacr.org/2012/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelRTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KolblM11, author = {Stefan K{\"{o}}lbl and Florian Mendel}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Practical Attacks on the Maelstrom-0 Compression Function}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {449--461}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_26}, doi = {10.1007/978-3-642-21554-4\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/KolblM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BiryukovLMN11, author = {Alex Biryukov and Mario Lamberger and Florian Mendel and Ivica Nikolic}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Second-Order Differential Collisions for Reduced {SHA-256}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {270--287}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_15}, doi = {10.1007/978-3-642-25385-0\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BiryukovLMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MendelNS11, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Finding {SHA-2} Characteristics: Searching through a Minefield of Contradictions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {288--307}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_16}, doi = {10.1007/978-3-642-25385-0\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/MendelNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelNS11, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Howon Kim}, title = {Cryptanalysis of Round-Reduced {HAS-160}}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {33--47}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_3}, doi = {10.1007/978-3-642-31912-9\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MendelN11, author = {Florian Mendel and Tomislav Nad}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Boomerang Distinguisher for the {SIMD-512} Compression Function}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {255--269}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_19}, doi = {10.1007/978-3-642-25578-6\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MendelN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LambergerM11, author = {Mario Lamberger and Florian Mendel}, title = {Higher-Order Differential Attack on Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2011}, url = {http://eprint.iacr.org/2011/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LambergerM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10, author = {Praveen Gauravaram and Ga{\"{e}}tan Leurent and Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin and Christian Rechberger and Martin Schl{\"{a}}ffer}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {419--436}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_25}, doi = {10.1007/978-3-642-12678-9\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MendelRST10, author = {Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer and S{\o}ren S. Thomsen}, editor = {Josef Pieprzyk}, title = {Rebound Attacks on the Reduced Gr{\o}stl Hash Function}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {350--365}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_24}, doi = {10.1007/978-3-642-11925-5\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MendelRST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SasakiMA10, author = {Yu Sasaki and Florian Mendel and Kazumaro Aoki}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {Preimage Attacks against PKC98-Hash and {HAS-V}}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {68--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_5}, doi = {10.1007/978-3-642-24209-0\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/SasakiMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LambergerMRRS10, author = {Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2010}, url = {http://eprint.iacr.org/2010/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LambergerMRRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MendelRS09, author = {Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Cryptanalysis of Twister}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {342--353}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_21}, doi = {10.1007/978-3-642-01957-9\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/MendelRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MendelNS09, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Collision Attack on Boole}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {369--381}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_23}, doi = {10.1007/978-3-642-01957-9\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/MendelNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AumassonDMRT09, author = {Jean{-}Philippe Aumasson and Orr Dunkelman and Florian Mendel and Christian Rechberger and S{\o}ren S. Thomsen}, editor = {Bart Preneel}, title = {Cryptanalysis of Vortex}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {14--28}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_2}, doi = {10.1007/978-3-642-02384-2\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AumassonDMRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Mendel09, author = {Florian Mendel}, editor = {Bart Preneel}, title = {Two Passes of Tiger Are Not One-Way}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {29--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_3}, doi = {10.1007/978-3-642-02384-2\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/Mendel09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LambergerMRRS09, author = {Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Mitsuru Matsui}, title = {Rebound Distinguishers: Results on the Full Whirlpool Compression Function}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {126--143}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_8}, doi = {10.1007/978-3-642-10366-7\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LambergerMRRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MendelRS09, author = {Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer}, editor = {Mitsuru Matsui}, title = {{MD5} Is Weaker Than Weak: Attacks on Concatenated Combiners}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {144--161}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_9}, doi = {10.1007/978-3-642-10366-7\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/MendelRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenMRT09, author = {Lars R. Knudsen and Florian Mendel and Christian Rechberger and S{\o}ren S. Thomsen}, editor = {Antoine Joux}, title = {Cryptanalysis of {MDC-2}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {106--120}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_6}, doi = {10.1007/978-3-642-01001-9\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenMRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelRST09, author = {Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer and S{\o}ren S. Thomsen}, editor = {Orr Dunkelman}, title = {The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr{\o}stl}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {260--276}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_16}, doi = {10.1007/978-3-642-03317-9\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelRST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MendelN09, author = {Florian Mendel and Tomislav Nad}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {A Distinguisher for the Compression Function of {SIMD-512}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {219--232}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_15}, doi = {10.1007/978-3-642-10628-6\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MendelN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LambergerM09, author = {Mario Lamberger and Florian Mendel}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Structural Attacks on Two {SHA-3} Candidates: Blender-n and DCH-n}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {68--78}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_6}, doi = {10.1007/978-3-642-04474-8\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/LambergerM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MendelS09, author = {Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {On Free-Start Collisions and Collisions for {TIB3}}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {95--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_8}, doi = {10.1007/978-3-642-04474-8\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/MendelS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPS09, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Martin Schl{\"{a}}ffer}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Practical Collisions for {SHAMATA-256}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {1--15}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_1}, doi = {10.1007/978-3-642-05445-7\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MendelPRS09, author = {Florian Mendel and Thomas Peyrin and Christian Rechberger and Martin Schl{\"{a}}ffer}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Improved Cryptanalysis of the Reduced Gr{\o}stl Compression Function, {ECHO} Permutation and {AES} Block Cipher}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {16--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_2}, doi = {10.1007/978-3-642-05445-7\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/MendelPRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/GauravaramKMMRS09, author = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer and S{\o}ren S. Thomsen}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Gr{\o}stl - a {SHA-3} candidate}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1955/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/GauravaramKMMRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MendelS08, author = {Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Collisions for Round-Reduced {LAKE}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {267--281}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_20}, doi = {10.1007/978-3-540-70500-0\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MendelS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MendelPRKS08, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Marcin Kontak and Janusz Szmidt}, editor = {David A. Wagner}, title = {Cryptanalysis of the {GOST} Hash Function}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {162--178}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_10}, doi = {10.1007/978-3-540-85174-5\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MendelPRKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPR08, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger}, editor = {Kaisa Nyberg}, title = {A (Second) Preimage Attack on the {GOST} Hash Function}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {224--234}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_14}, doi = {10.1007/978-3-540-71039-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AumassonMM08, author = {Jean{-}Philippe Aumasson and Willi Meier and Florian Mendel}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {120--135}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_8}, doi = {10.1007/978-3-642-04159-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/AumassonMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPR08, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Collisions and Other Non-random Properties for Step-Reduced {SHA-256}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {276--293}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_18}, doi = {10.1007/978-3-642-04159-4\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelS08, author = {Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Collisions for Round-Reduced {LAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2008}, url = {http://eprint.iacr.org/2008/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelPRR08, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, title = {Analysis of Step-Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2008}, url = {http://eprint.iacr.org/2008/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelPRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IndesteegeMPR08, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger}, title = {Collisions and other Non-Random Properties for Step-Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2008}, url = {http://eprint.iacr.org/2008/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IndesteegeMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonMM08, author = {Jean{-}Philippe Aumasson and Willi Meier and Florian Mendel}, title = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2008}, url = {http://eprint.iacr.org/2008/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MendelR07, author = {Florian Mendel and Vincent Rijmen}, editor = {Kaoru Kurosawa}, title = {Cryptanalysis of the Tiger Hash Function}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {536--550}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_33}, doi = {10.1007/978-3-540-76900-2\_33}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/MendelR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MendelLP07, author = {Florian Mendel and Joseph Lano and Bart Preneel}, editor = {Masayuki Abe}, title = {Cryptanalysis of Reduced Variants of the {FORK-256} Hash Function}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {85--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_6}, doi = {10.1007/11967668\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MendelLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelR07, author = {Florian Mendel and Vincent Rijmen}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Colliding Message Pair for 53-Step {HAS-160}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {324--334}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_26}, doi = {10.1007/978-3-540-76788-6\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelR07a, author = {Florian Mendel and Vincent Rijmen}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Weaknesses in the {HAS-V} Compression Function}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {335--345}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_27}, doi = {10.1007/978-3-540-76788-6\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CanniereMR07, author = {Christophe De Canni{\`{e}}re and Florian Mendel and Christian Rechberger}, editor = {Carlisle M. Adams and Ali Miri and Michael J. Wiener}, title = {Collisions for 70-Step {SHA-1:} On the Full Cost of Collision Search}, booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4876}, pages = {56--73}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77360-3\_4}, doi = {10.1007/978-3-540-77360-3\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/CanniereMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPRR06, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Matthew J. B. Robshaw}, title = {Analysis of Step-Reduced {SHA-256}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {126--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_9}, doi = {10.1007/11799313\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPRR06a, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Matthew J. B. Robshaw}, title = {The Impact of Carries on the Complexity of Collision Attacks on {SHA-1}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {278--292}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_18}, doi = {10.1007/11799313\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPRR06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelPR06, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Improved Collision Attack on the Hash Function Proposed at PKC'98}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {8--21}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_3}, doi = {10.1007/11927587\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06, author = {Florian Mendel and Bart Preneel and Vincent Rijmen and Hirotaka Yoshida and Dai Watanabe}, editor = {Rana Barua and Tanja Lange}, title = {Update on Tiger}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {63--79}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_6}, doi = {10.1007/11941378\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MendelPRR06, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {On the Collision Resistance of {RIPEMD-160}}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {101--116}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_8}, doi = {10.1007/11836810\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/MendelPRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mendel06, author = {Florian Mendel}, title = {Colliding Message Pair for 53-Step {HAS-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2006}, url = {http://eprint.iacr.org/2006/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mendel06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.