BibTeX records: Maria Eichlseder

download as .bib file

@article{DBLP:journals/tosc/HadipourGSE24,
  author       = {Hosein Hadipour and
                  Simon Gerhalter and
                  Sadegh Sadeghi and
                  Maria Eichlseder},
  title        = {Improved Search for Integral, Impossible Differential and Zero-Correlation
                  Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, {PRESENT}
                  and QARMAv2},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {234--325},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.234-325},
  doi          = {10.46586/TOSC.V2024.I1.234-325},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourGSE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HadipourDE24,
  author       = {Hosein Hadipour and
                  Patrick Derbez and
                  Maria Eichlseder},
  title        = {Revisiting Differential-Linear Attacks via a Boomerang Perspective
                  with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE,
                  WARP, LBlock, Simeck, and {SERPENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/255},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HadipourDE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NagelerPE23,
  author       = {Marcel Nageler and
                  Felix Pallua and
                  Maria Eichlseder},
  title        = {Finding Collisions for Round-Reduced Romulus-H},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {67--88},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.67-88},
  doi          = {10.46586/TOSC.V2023.I1.67-88},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/NagelerPE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AvanziBDEGNR23,
  author       = {Roberto Avanzi and
                  Subhadeep Banik and
                  Orr Dunkelman and
                  Maria Eichlseder and
                  Shibam Ghosh and
                  Marcel Nageler and
                  Francesco Regazzoni},
  title        = {The QARMAv2 Family of Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {25--73},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.25-73},
  doi          = {10.46586/TOSC.V2023.I3.25-73},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AvanziBDEGNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HadipourSE23,
  author       = {Hosein Hadipour and
                  Sadegh Sadeghi and
                  Maria Eichlseder},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Finding the Impossible: Automated Search for Full Impossible-Differential,
                  Zero-Correlation, and Integral Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {128--157},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_5},
  doi          = {10.1007/978-3-031-30634-1\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HadipourSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JuffingerLKELG23,
  author       = {Jonas Juffinger and
                  Lukas Lamster and
                  Andreas Kogler and
                  Maria Eichlseder and
                  Moritz Lipp and
                  Daniel Gruss},
  title        = {CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1702--1718},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179390},
  doi          = {10.1109/SP46215.2023.10179390},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JuffingerLKELG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GinerSPEUMG23,
  author       = {Lukas Giner and
                  Stefan Steinegger and
                  Antoon Purnal and
                  Maria Eichlseder and
                  Thomas Unterluggauer and
                  Stefan Mangard and
                  Daniel Gruss},
  title        = {Scatter and Split Securely: Defeating Cache Contention and Occupancy
                  Attacks},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2273--2287},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179440},
  doi          = {10.1109/SP46215.2023.10179440},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GinerSPEUMG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziBDEGNR23,
  author       = {Roberto Avanzi and
                  Subhadeep Banik and
                  Orr Dunkelman and
                  Maria Eichlseder and
                  Shibam Ghosh and
                  Marcel Nageler and
                  Francesco Regazzoni},
  title        = {The tweakable block cipher family QARMAv2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {929},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/929},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziBDEGNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HadipourGSE23,
  author       = {Hosein Hadipour and
                  Simon Gerhalter and
                  Sadegh Sadeghi and
                  Maria Eichlseder},
  title        = {Improved Search for Integral, Impossible-Differential and Zero-Correlation
                  Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, {PRESENT}
                  and QARMAv2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1701},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1701},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HadipourGSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanEKKLS22,
  author       = {Orr Dunkelman and
                  Maria Eichlseder and
                  Daniel Kales and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Markus Schofnegger},
  title        = {Practical key recovery attacks on FlexAEAD},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {983--1007},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01023-5},
  doi          = {10.1007/S10623-022-01023-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VafaeiZBEPS22,
  author       = {Navid Vafaei and
                  Sara Zarei and
                  Nasour Bagheri and
                  Maria Eichlseder and
                  Robert Primas and
                  Hadi Soleimany},
  title        = {Statistical Effective Fault Attacks: The Other Side of the Coin},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1855--1867},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3172634},
  doi          = {10.1109/TIFS.2022.3172634},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VafaeiZBEPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ErlacherME22,
  author       = {Johannes Erlacher and
                  Florian Mendel and
                  Maria Eichlseder},
  title        = {Bounds for the Security of Ascon against Differential and Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {64--87},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.64-87},
  doi          = {10.46586/TOSC.V2022.I1.64-87},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ErlacherME22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourE22,
  author       = {Hosein Hadipour and
                  Maria Eichlseder},
  title        = {Integral Cryptanalysis of {WARP} based on Monomial Prediction},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {92--112},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.92-112},
  doi          = {10.46586/TOSC.V2022.I2.92-112},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourNE22,
  author       = {Hosein Hadipour and
                  Marcel Nageler and
                  Maria Eichlseder},
  title        = {Throwing Boomerangs into Feistel Structures Application to CLEFIA,
                  WARP, LBlock, LBlock-s and {TWINE}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {271--302},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.271-302},
  doi          = {10.46586/TOSC.V2022.I3.271-302},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourNE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HadipourE22,
  author       = {Hosein Hadipour and
                  Maria Eichlseder},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Autoguess: {A} Tool for Finding Guess-and-Determine Attacks and Key
                  Bridges},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {230--250},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_12},
  doi          = {10.1007/978-3-031-09234-3\_12},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HadipourE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NagelerDE22,
  author       = {Marcel Nageler and
                  Christoph Dobraunig and
                  Maria Eichlseder},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Information-Combining Differential Fault Attacks on {DEFAULT}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {168--191},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_7},
  doi          = {10.1007/978-3-031-07082-2\_7},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NagelerDE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederMRS22,
  author       = {Maria Eichlseder and
                  Ahmet Can Mert and
                  Christian Rechberger and
                  Markus Schofnegger},
  title        = {Small MACs from Small Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/049},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederMRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VafaeiZBEPS22,
  author       = {Navid Vafaei and
                  Sara Zarei and
                  Nasour Bagheri and
                  Maria Eichlseder and
                  Robert Primas and
                  Hadi Soleimany},
  title        = {Statistical Effective Fault Attacks: The other Side of the Coin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/642},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VafaeiZBEPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HadipourE22,
  author       = {Hosein Hadipour and
                  Maria Eichlseder},
  title        = {Integral Cryptanalysis of {WARP} based on Monomial Prediction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {729},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/729},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HadipourE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HadipourNE22,
  author       = {Hosein Hadipour and
                  Marcel Nageler and
                  Maria Eichlseder},
  title        = {Throwing Boomerangs into Feistel Structures: Application to CLEFIA,
                  WARP, LBlock, LBlock-s and {TWINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {745},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/745},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HadipourNE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HadipourSE22,
  author       = {Hosein Hadipour and
                  Sadegh Sadeghi and
                  Maria Eichlseder},
  title        = {Finding the Impossible: Automated Search for Full Impossible Differential,
                  Zero-Correlation, and Integral Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1147},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1147},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HadipourSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NagelerPE22,
  author       = {Marcel Nageler and
                  Felix Pallua and
                  Maria Eichlseder},
  title        = {Finding Collisions for Round-Reduced Romulus-H},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1630},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1630},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NagelerPE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/TapplerA0EL21,
  author       = {Martin Tappler and
                  Bernhard K. Aichernig and
                  Giovanni Bacci and
                  Maria Eichlseder and
                  Kim G. Larsen},
  title        = {L\({}^{\mbox{*}}\)-based learning of Markov decision processes (extended
                  version)},
  journal      = {Formal Aspects Comput.},
  volume       = {33},
  number       = {4-5},
  pages        = {575--615},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00165-021-00536-5},
  doi          = {10.1007/S00165-021-00536-5},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/TapplerA0EL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DobraunigEMS21,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Ascon v1.2: Lightweight Authenticated Encryption and Hashing},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {33},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09398-9},
  doi          = {10.1007/S00145-021-09398-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DobraunigEMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanEKKLS21,
  author       = {Orr Dunkelman and
                  Maria Eichlseder and
                  Daniel Kales and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Markus Schofnegger},
  title        = {Practical Key Recovery Attacks on FlexAEAD},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/931},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanEKKLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NagelerDE21,
  author       = {Marcel Nageler and
                  Christoph Dobraunig and
                  Maria Eichlseder},
  title        = {Information-Combining Differential Fault Attacks on {DEFAULT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1374},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1374},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NagelerDE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HadipourE21,
  author       = {Hosein Hadipour and
                  Maria Eichlseder},
  title        = {Autoguess: {A} Tool for Finding Guess-and-Determine Attacks and Key
                  Bridges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1529},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1529},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HadipourE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS21,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Ascon PRF, MAC, and Short-Input {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1574},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1574},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DaemenDEGMP20,
  author       = {Joan Daemen and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Florian Mendel and
                  Robert Primas},
  title        = {Protecting against Statistical Ineffective Fault Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {508--543},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.508-543},
  doi          = {10.13154/TCHES.V2020.I3.508-543},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMMPU20,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Bart Mennink and
                  Robert Primas and
                  Thomas Unterluggauer},
  title        = {Isap v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {390--416},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.390-416},
  doi          = {10.13154/TOSC.V2020.IS1.390-416},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Eichlseder0LORS20,
  author       = {Maria Eichlseder and
                  Lorenzo Grassi and
                  Reinhard L{\"{u}}ftenegger and
                  Morten {\O}ygarden and
                  Christian Rechberger and
                  Markus Schofnegger and
                  Qingju Wang},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application
                  to Full MiMC},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {477--506},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_16},
  doi          = {10.1007/978-3-030-64837-4\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Eichlseder0LORS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Itai Dinur and
                  Maria Eichlseder and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Yu Sasaki and
                  Yosuke Todo and
                  Friedrich Wiemer},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives
                  Optimized for Integrity Proof Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {299--328},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_11},
  doi          = {10.1007/978-3-030-56877-1\_11},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/EichlsederLR20,
  author       = {Maria Eichlseder and
                  Gregor Leander and
                  Shahram Rasoolzadeh},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Computing Expected Differential Probability of (Truncated) Differentials
                  and Expected Linear Potential of (Multidimensional) Linear Hulls in
                  {SPN} Block Ciphers},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {345--369},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_16},
  doi          = {10.1007/978-3-030-65277-7\_16},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/EichlsederLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BozilovEKLLMNRT20,
  author       = {Dusan Bozilov and
                  Maria Eichlseder and
                  Miroslav Knezevic and
                  Baptiste Lambin and
                  Gregor Leander and
                  Thorben Moos and
                  Ventzislav Nikov and
                  Shahram Rasoolzadeh and
                  Yosuke Todo and
                  Friedrich Wiemer},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {PRINCEv2 - More Security for (Almost) No Overhead},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {483--511},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_19},
  doi          = {10.1007/978-3-030-81652-0\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BozilovEKLLMNRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederGLORS20,
  author       = {Maria Eichlseder and
                  Lorenzo Grassi and
                  Reinhard L{\"{u}}ftenegger and
                  Morten {\O}ygarden and
                  Christian Rechberger and
                  Markus Schofnegger and
                  Qingju Wang},
  title        = {An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application
                  to Full MiMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederGLORS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeyneCDELLNPSTW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Itai Dinur and
                  Maria Eichlseder and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Yu Sasaki and
                  Yosuke Todo and
                  Friedrich Wiemer},
  title        = {Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives
                  Optimized for Integrity Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/188},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BeyneCDELLNPSTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BozilovEKLLMNRT20,
  author       = {Dusan Bozilov and
                  Maria Eichlseder and
                  Miroslav Knezevic and
                  Baptiste Lambin and
                  Gregor Leander and
                  Thorben Moos and
                  Ventzislav Nikov and
                  Shahram Rasoolzadeh and
                  Yosuke Todo and
                  Friedrich Wiemer},
  title        = {PRINCEv2 - More Security for (Almost) No Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1269},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1269},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BozilovEKLLMNRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederLR20,
  author       = {Maria Eichlseder and
                  Gregor Leander and
                  Shahram Rasoolzadeh},
  title        = {Computing Expected Differential Probability of (Truncated) Differentials
                  and Expected Linear Potential of (Multidimensional) Linear Hulls in
                  {SPN} Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1356},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1356},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/EichlsederNP19,
  author       = {Maria Eichlseder and
                  Marcel Nageler and
                  Robert Primas},
  title        = {Analyzing the Linear Keystream Biases in {AEGIS}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {348--368},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.348-368},
  doi          = {10.13154/TOSC.V2019.I4.348-368},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/EichlsederNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/TapplerA0EL19,
  author       = {Martin Tappler and
                  Bernhard K. Aichernig and
                  Giovanni Bacci and
                  Maria Eichlseder and
                  Kim G. Larsen},
  editor       = {Maurice H. ter Beek and
                  Annabelle McIver and
                  Jos{\'{e}} N. Oliveira},
  title        = {L\({}^{\mbox{*}}\)-Based Learning of Markov Decision Processes},
  booktitle    = {Formal Methods - The Next 30 Years - Third World Congress, {FM} 2019,
                  Porto, Portugal, October 7-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11800},
  pages        = {651--669},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30942-8\_38},
  doi          = {10.1007/978-3-030-30942-8\_38},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fm/TapplerA0EL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/EichlsederKS19,
  author       = {Maria Eichlseder and
                  Daniel Kales and
                  Markus Schofnegger},
  editor       = {Martin Albrecht},
  title        = {Forgery Attacks on FlexAE and FlexAEAD},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {200--214},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_10},
  doi          = {10.1007/978-3-030-35199-1\_10},
  timestamp    = {Fri, 15 Dec 2023 20:21:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/EichlsederKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigEMS19,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Markus Schofnegger},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Algebraic Cryptanalysis of Variants of Frit},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {149--170},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_7},
  doi          = {10.1007/978-3-030-38471-5\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigEMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-12239,
  author       = {Martin Tappler and
                  Bernhard K. Aichernig and
                  Giovanni Bacci and
                  Maria Eichlseder and
                  Kim G. Larsen},
  title        = {L*-Based Learning of Markov Decision Processes (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1906.12239},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.12239},
  eprinttype    = {arXiv},
  eprint       = {1906.12239},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-12239.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenDEGMP19,
  author       = {Joan Daemen and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Florian Mendel and
                  Robert Primas},
  title        = {Protecting against Statistical Ineffective Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenDEGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederKS19,
  author       = {Maria Eichlseder and
                  Daniel Kales and
                  Markus Schofnegger},
  title        = {Forgery Attacks on FlexAE and FlexAEAD},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/679},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederNP19,
  author       = {Maria Eichlseder and
                  Marcel Nageler and
                  Robert Primas},
  title        = {Analyzing the Linear Keystream Biases in {AEGIS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1372},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {547--572},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.547-572},
  doi          = {10.13154/TCHES.V2018.I3.547-572},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/EichlsederK18,
  author       = {Maria Eichlseder and
                  Daniel Kales},
  title        = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {111--132},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.111-132},
  doi          = {10.13154/TOSC.V2018.I2.111-132},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/EichlsederK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AshurELLMRSV18,
  author       = {Tomer Ashur and
                  Maria Eichlseder and
                  Martin M. Lauridsen and
                  Ga{\"{e}}tan Leurent and
                  Brice Minaud and
                  Yann Rotella and
                  Yu Sasaki and
                  Beno{\^{\i}}t Viguier},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Cryptanalysis of {MORUS}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {35--64},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_2},
  doi          = {10.1007/978-3-030-03329-3\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AshurELLMRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEGMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {315--342},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_11},
  doi          = {10.1007/978-3-030-03329-3\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEGMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DobraunigE0LLLM18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Lorenzo Grassi and
                  Virginie Lallemand and
                  Gregor Leander and
                  Eik List and
                  Florian Mendel and
                  Christian Rechberger},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Rasta: {A} Cipher with Low ANDdepth and Few ANDs per Bit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {662--692},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_22},
  doi          = {10.1007/978-3-319-96884-1\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DobraunigE0LLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/gidiss/Eichlseder18,
  author       = {Maria Eichlseder},
  editor       = {Sven Apel and
                  Abraham Bernstein and
                  Felix C. Freiling and
                  Steffen H{\"{o}}lldobler and
                  Hans{-}Peter Lenhof and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Bj{\"{o}}rn Scheuermann and
                  Nicole Schweikardt and
                  Myra Spiliopoulou and
                  Sabine S{\"{u}}sstrunk and
                  Klaus Wehrle},
  title        = {Differential Cryptanalysis of Symmetric Primitives},
  booktitle    = {Ausgezeichnete Informatikdissertationen 2018},
  series       = {{LNI}},
  volume       = {{D-19}},
  pages        = {91--100},
  publisher    = {{GI}},
  year         = {2018},
  url          = {https://dl.gi.de/handle/20.500.12116/36752},
  timestamp    = {Tue, 04 Jul 2023 17:44:50 +0200},
  biburl       = {https://dblp.org/rec/series/gidiss/Eichlseder18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigE0LLLM18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Lorenzo Grassi and
                  Virginie Lallemand and
                  Gregor Leander and
                  Eik List and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Rasta: {A} cipher with low ANDdepth and few ANDs per bit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigE0LLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEGMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurELLMRSV18,
  author       = {Tomer Ashur and
                  Maria Eichlseder and
                  Martin M. Lauridsen and
                  Ga{\"{e}}tan Leurent and
                  Brice Minaud and
                  Yann Rotella and
                  Yu Sasaki and
                  Beno{\^{\i}}t Viguier},
  title        = {Cryptanalysis of {MORUS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurELLMRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Markus Schofnegger},
  title        = {Algebraic Cryptanalysis of Frit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMU17,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {80--105},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.80-105},
  doi          = {10.13154/TOSC.V2017.I1.80-105},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DobraunigEKM17,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Florian Mendel},
  editor       = {Sylvain Guilley},
  title        = {Side-Channel Analysis of Keymill},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {138--152},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_9},
  doi          = {10.1007/978-3-319-64647-3\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/DobraunigEKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederK17,
  author       = {Maria Eichlseder and
                  Daniel Kales},
  title        = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalesEM17,
  author       = {Daniel Kales and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Note on the Robustness of {CAESAR} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1137},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalesEM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEKM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Daniel Kales and
                  Florian Mendel},
  title        = {Practical Key-Recovery Attack on {MANTIS5}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {248--260},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.248-260},
  doi          = {10.13154/TOSC.V2016.I2.248-260},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Square Attack on 7-Round Kiasu-BC},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {500--517},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_27},
  doi          = {10.1007/978-3-319-39555-5\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEKLM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Victor Lomn{\'{e}} and
                  Florian Mendel},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Statistical Fault Attacks on Nonce-Based Authenticated Encryption
                  Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {369--395},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_14},
  doi          = {10.1007/978-3-662-53887-6\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEKLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Thomas Peyrin},
  title        = {Analysis of the Kupyna-256 Hash Function},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {575--590},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_29},
  doi          = {10.1007/978-3-662-52993-5\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Roberto Avanzi and
                  Howard M. Heys},
  title        = {Cryptanalysis of Simpira v1},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
                  St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10532},
  pages        = {284--298},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69453-5\_16},
  doi          = {10.1007/978-3-319-69453-5\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Cryptanalysis of Simpira},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Square Attack on 7-Round Kiasu-BC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16b,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Analysis of {SHA-512/224} and {SHA-512/256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKLM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Victor Lomn{\'{e}} and
                  Florian Mendel},
  title        = {Practical Fault Attacks on Authenticated Encryption Modes for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16c,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Key Recovery for {MANTIS-5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Florian Mendel},
  title        = {Side-Channel Analysis of Keymill},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/793},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMMU16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive
                  Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR}
                  Candidates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {490--509},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_20},
  doi          = {10.1007/978-3-662-48800-3\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Analysis of {SHA-512/224} and {SHA-512/256}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {612--630},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_25},
  doi          = {10.1007/978-3-662-48800-3\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DobraunigEMS15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of Ascon},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {371--387},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_20},
  doi          = {10.1007/978-3-319-16715-2\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DobraunigEMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Gregor Leander},
  title        = {Related-Key Forgeries for Pr{\o}st-OTR},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_14},
  doi          = {10.1007/978-3-662-48116-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Higher-Order Cryptanalysis of LowMC},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_6},
  doi          = {10.1007/978-3-319-30840-1\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Forgery Attacks on Round-Reduced {ICEPOLE-128}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {479--492},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_27},
  doi          = {10.1007/978-3-319-31301-6\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Cryptanalysis of Ascon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel},
  title        = {On the Security of Fresh Re-keying to Counteract Side-Channel and
                  Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Related-Key Forgeries for Pr{\o}st-OTR},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Forgery Attacks on round-reduced {ICEPOLE-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15b,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Higher-order cryptanalysis of LowMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15c,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Analysis of the Kupyna-256 Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/956},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15d,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR}
                  Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1200},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DobraunigEMM14,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel},
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {On the Security of Fresh Re-keying to Counteract Side-Channel and
                  Fault Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  pages        = {233--244},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16763-3\_14},
  doi          = {10.1007/978-3-319-16763-3\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/DobraunigEMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EichlsederMS14,
  author       = {Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Branching Heuristics in Differential Collision Search with Applications
                  to {SHA-512}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {473--488},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_24},
  doi          = {10.1007/978-3-662-46706-0\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EichlsederMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BogdanovDELMST14,
  author       = {Andrey Bogdanov and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Martin M. Lauridsen and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer and
                  Elmar Tischhauser},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {Key Recovery Attacks on Recent Authenticated Ciphers},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {274--287},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_15},
  doi          = {10.1007/978-3-319-16295-9\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BogdanovDELMST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AlbertiniAEMS14,
  author       = {Ange Albertini and
                  Jean{-}Philippe Aumasson and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Malicious Hashing: Eve's Variant of {SHA-1}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_1},
  doi          = {10.1007/978-3-319-13051-4\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AlbertiniAEMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederMS14,
  author       = {Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Branching Heuristics in Differential Collision Search with Applications
                  to {SHA-512}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbertiniAEMS14a,
  author       = {Ange Albertini and
                  Jean{-}Philippe Aumasson and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Malicious Hashing: Eve's Variant of {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbertiniAEMS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics