Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Maria Eichlseder
@article{DBLP:journals/tosc/HadipourGSE24, author = {Hosein Hadipour and Simon Gerhalter and Sadegh Sadeghi and Maria Eichlseder}, title = {Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, {PRESENT} and QARMAv2}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {234--325}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.234-325}, doi = {10.46586/TOSC.V2024.I1.234-325}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HadipourGSE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HadipourDE24, author = {Hosein Hadipour and Patrick Derbez and Maria Eichlseder}, title = {Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and {SERPENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2024}, url = {https://eprint.iacr.org/2024/255}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HadipourDE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NagelerPE23, author = {Marcel Nageler and Felix Pallua and Maria Eichlseder}, title = {Finding Collisions for Round-Reduced Romulus-H}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {67--88}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.67-88}, doi = {10.46586/TOSC.V2023.I1.67-88}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/NagelerPE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AvanziBDEGNR23, author = {Roberto Avanzi and Subhadeep Banik and Orr Dunkelman and Maria Eichlseder and Shibam Ghosh and Marcel Nageler and Francesco Regazzoni}, title = {The QARMAv2 Family of Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {25--73}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.25-73}, doi = {10.46586/TOSC.V2023.I3.25-73}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AvanziBDEGNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HadipourSE23, author = {Hosein Hadipour and Sadegh Sadeghi and Maria Eichlseder}, editor = {Carmit Hazay and Martijn Stam}, title = {Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {128--157}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_5}, doi = {10.1007/978-3-031-30634-1\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HadipourSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JuffingerLKELG23, author = {Jonas Juffinger and Lukas Lamster and Andreas Kogler and Maria Eichlseder and Moritz Lipp and Daniel Gruss}, title = {CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1702--1718}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179390}, doi = {10.1109/SP46215.2023.10179390}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/JuffingerLKELG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GinerSPEUMG23, author = {Lukas Giner and Stefan Steinegger and Antoon Purnal and Maria Eichlseder and Thomas Unterluggauer and Stefan Mangard and Daniel Gruss}, title = {Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2273--2287}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179440}, doi = {10.1109/SP46215.2023.10179440}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GinerSPEUMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziBDEGNR23, author = {Roberto Avanzi and Subhadeep Banik and Orr Dunkelman and Maria Eichlseder and Shibam Ghosh and Marcel Nageler and Francesco Regazzoni}, title = {The tweakable block cipher family QARMAv2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2023}, url = {https://eprint.iacr.org/2023/929}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziBDEGNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HadipourGSE23, author = {Hosein Hadipour and Simon Gerhalter and Sadegh Sadeghi and Maria Eichlseder}, title = {Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, {PRESENT} and QARMAv2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1701}, year = {2023}, url = {https://eprint.iacr.org/2023/1701}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HadipourGSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanEKKLS22, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Ga{\"{e}}tan Leurent and Markus Schofnegger}, title = {Practical key recovery attacks on FlexAEAD}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {983--1007}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01023-5}, doi = {10.1007/S10623-022-01023-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VafaeiZBEPS22, author = {Navid Vafaei and Sara Zarei and Nasour Bagheri and Maria Eichlseder and Robert Primas and Hadi Soleimany}, title = {Statistical Effective Fault Attacks: The Other Side of the Coin}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1855--1867}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3172634}, doi = {10.1109/TIFS.2022.3172634}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VafaeiZBEPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ErlacherME22, author = {Johannes Erlacher and Florian Mendel and Maria Eichlseder}, title = {Bounds for the Security of Ascon against Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {64--87}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.64-87}, doi = {10.46586/TOSC.V2022.I1.64-87}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ErlacherME22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourE22, author = {Hosein Hadipour and Maria Eichlseder}, title = {Integral Cryptanalysis of {WARP} based on Monomial Prediction}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {92--112}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.92-112}, doi = {10.46586/TOSC.V2022.I2.92-112}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HadipourE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourNE22, author = {Hosein Hadipour and Marcel Nageler and Maria Eichlseder}, title = {Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and {TWINE}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {271--302}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.271-302}, doi = {10.46586/TOSC.V2022.I3.271-302}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HadipourNE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HadipourE22, author = {Hosein Hadipour and Maria Eichlseder}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Autoguess: {A} Tool for Finding Guess-and-Determine Attacks and Key Bridges}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {230--250}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_12}, doi = {10.1007/978-3-031-09234-3\_12}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/HadipourE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NagelerDE22, author = {Marcel Nageler and Christoph Dobraunig and Maria Eichlseder}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Information-Combining Differential Fault Attacks on {DEFAULT}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {168--191}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_7}, doi = {10.1007/978-3-031-07082-2\_7}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NagelerDE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederMRS22, author = {Maria Eichlseder and Ahmet Can Mert and Christian Rechberger and Markus Schofnegger}, title = {Small MACs from Small Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2022}, url = {https://eprint.iacr.org/2022/049}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederMRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VafaeiZBEPS22, author = {Navid Vafaei and Sara Zarei and Nasour Bagheri and Maria Eichlseder and Robert Primas and Hadi Soleimany}, title = {Statistical Effective Fault Attacks: The other Side of the Coin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2022}, url = {https://eprint.iacr.org/2022/642}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VafaeiZBEPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HadipourE22, author = {Hosein Hadipour and Maria Eichlseder}, title = {Integral Cryptanalysis of {WARP} based on Monomial Prediction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {729}, year = {2022}, url = {https://eprint.iacr.org/2022/729}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HadipourE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HadipourNE22, author = {Hosein Hadipour and Marcel Nageler and Maria Eichlseder}, title = {Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and {TWINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {745}, year = {2022}, url = {https://eprint.iacr.org/2022/745}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HadipourNE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HadipourSE22, author = {Hosein Hadipour and Sadegh Sadeghi and Maria Eichlseder}, title = {Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1147}, year = {2022}, url = {https://eprint.iacr.org/2022/1147}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HadipourSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NagelerPE22, author = {Marcel Nageler and Felix Pallua and Maria Eichlseder}, title = {Finding Collisions for Round-Reduced Romulus-H}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1630}, year = {2022}, url = {https://eprint.iacr.org/2022/1630}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NagelerPE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/TapplerA0EL21, author = {Martin Tappler and Bernhard K. Aichernig and Giovanni Bacci and Maria Eichlseder and Kim G. Larsen}, title = {L\({}^{\mbox{*}}\)-based learning of Markov decision processes (extended version)}, journal = {Formal Aspects Comput.}, volume = {33}, number = {4-5}, pages = {575--615}, year = {2021}, url = {https://doi.org/10.1007/s00165-021-00536-5}, doi = {10.1007/S00165-021-00536-5}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/TapplerA0EL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DobraunigEMS21, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Ascon v1.2: Lightweight Authenticated Encryption and Hashing}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {33}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09398-9}, doi = {10.1007/S00145-021-09398-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DobraunigEMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanEKKLS21, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Ga{\"{e}}tan Leurent and Markus Schofnegger}, title = {Practical Key Recovery Attacks on FlexAEAD}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2021}, url = {https://eprint.iacr.org/2021/931}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanEKKLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NagelerDE21, author = {Marcel Nageler and Christoph Dobraunig and Maria Eichlseder}, title = {Information-Combining Differential Fault Attacks on {DEFAULT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1374}, year = {2021}, url = {https://eprint.iacr.org/2021/1374}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NagelerDE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HadipourE21, author = {Hosein Hadipour and Maria Eichlseder}, title = {Autoguess: {A} Tool for Finding Guess-and-Determine Attacks and Key Bridges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1529}, year = {2021}, url = {https://eprint.iacr.org/2021/1529}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HadipourE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS21, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Ascon PRF, MAC, and Short-Input {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1574}, year = {2021}, url = {https://eprint.iacr.org/2021/1574}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DaemenDEGMP20, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {508--543}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.508-543}, doi = {10.13154/TCHES.V2020.I3.508-543}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMMPU20, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Bart Mennink and Robert Primas and Thomas Unterluggauer}, title = {Isap v2.0}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {390--416}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.390-416}, doi = {10.13154/TOSC.V2020.IS1.390-416}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Eichlseder0LORS20, author = {Maria Eichlseder and Lorenzo Grassi and Reinhard L{\"{u}}ftenegger and Morten {\O}ygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang}, editor = {Shiho Moriai and Huaxiong Wang}, title = {An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {477--506}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_16}, doi = {10.1007/978-3-030-64837-4\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Eichlseder0LORS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {299--328}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_11}, doi = {10.1007/978-3-030-56877-1\_11}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/EichlsederLR20, author = {Maria Eichlseder and Gregor Leander and Shahram Rasoolzadeh}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in {SPN} Block Ciphers}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {345--369}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_16}, doi = {10.1007/978-3-030-65277-7\_16}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/EichlsederLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BozilovEKLLMNRT20, author = {Dusan Bozilov and Maria Eichlseder and Miroslav Knezevic and Baptiste Lambin and Gregor Leander and Thorben Moos and Ventzislav Nikov and Shahram Rasoolzadeh and Yosuke Todo and Friedrich Wiemer}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {PRINCEv2 - More Security for (Almost) No Overhead}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {483--511}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_19}, doi = {10.1007/978-3-030-81652-0\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BozilovEKLLMNRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederGLORS20, author = {Maria Eichlseder and Lorenzo Grassi and Reinhard L{\"{u}}ftenegger and Morten {\O}ygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang}, title = {An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2020}, url = {https://eprint.iacr.org/2020/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederGLORS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeyneCDELLNPSTW20, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, title = {Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2020}, url = {https://eprint.iacr.org/2020/188}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BeyneCDELLNPSTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BozilovEKLLMNRT20, author = {Dusan Bozilov and Maria Eichlseder and Miroslav Knezevic and Baptiste Lambin and Gregor Leander and Thorben Moos and Ventzislav Nikov and Shahram Rasoolzadeh and Yosuke Todo and Friedrich Wiemer}, title = {PRINCEv2 - More Security for (Almost) No Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1269}, year = {2020}, url = {https://eprint.iacr.org/2020/1269}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BozilovEKLLMNRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederLR20, author = {Maria Eichlseder and Gregor Leander and Shahram Rasoolzadeh}, title = {Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in {SPN} Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1356}, year = {2020}, url = {https://eprint.iacr.org/2020/1356}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/EichlsederNP19, author = {Maria Eichlseder and Marcel Nageler and Robert Primas}, title = {Analyzing the Linear Keystream Biases in {AEGIS}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {348--368}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.348-368}, doi = {10.13154/TOSC.V2019.I4.348-368}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/EichlsederNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/TapplerA0EL19, author = {Martin Tappler and Bernhard K. Aichernig and Giovanni Bacci and Maria Eichlseder and Kim G. Larsen}, editor = {Maurice H. ter Beek and Annabelle McIver and Jos{\'{e}} N. Oliveira}, title = {L\({}^{\mbox{*}}\)-Based Learning of Markov Decision Processes}, booktitle = {Formal Methods - The Next 30 Years - Third World Congress, {FM} 2019, Porto, Portugal, October 7-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11800}, pages = {651--669}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30942-8\_38}, doi = {10.1007/978-3-030-30942-8\_38}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fm/TapplerA0EL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/EichlsederKS19, author = {Maria Eichlseder and Daniel Kales and Markus Schofnegger}, editor = {Martin Albrecht}, title = {Forgery Attacks on FlexAE and FlexAEAD}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {200--214}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_10}, doi = {10.1007/978-3-030-35199-1\_10}, timestamp = {Fri, 15 Dec 2023 20:21:14 +0100}, biburl = {https://dblp.org/rec/conf/ima/EichlsederKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigEMS19, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Algebraic Cryptanalysis of Variants of Frit}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {149--170}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_7}, doi = {10.1007/978-3-030-38471-5\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigEMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-12239, author = {Martin Tappler and Bernhard K. Aichernig and Giovanni Bacci and Maria Eichlseder and Kim G. Larsen}, title = {L*-Based Learning of Markov Decision Processes (Extended Version)}, journal = {CoRR}, volume = {abs/1906.12239}, year = {2019}, url = {http://arxiv.org/abs/1906.12239}, eprinttype = {arXiv}, eprint = {1906.12239}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-12239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenDEGMP19, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2019}, url = {https://eprint.iacr.org/2019/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenDEGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederKS19, author = {Maria Eichlseder and Daniel Kales and Markus Schofnegger}, title = {Forgery Attacks on FlexAE and FlexAEAD}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2019}, url = {https://eprint.iacr.org/2019/679}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederNP19, author = {Maria Eichlseder and Marcel Nageler and Robert Primas}, title = {Analyzing the Linear Keystream Biases in {AEGIS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1372}, year = {2019}, url = {https://eprint.iacr.org/2019/1372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {547--572}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.547-572}, doi = {10.13154/TCHES.V2018.I3.547-572}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/EichlsederK18, author = {Maria Eichlseder and Daniel Kales}, title = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {111--132}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.111-132}, doi = {10.13154/TOSC.V2018.I2.111-132}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/EichlsederK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AshurELLMRSV18, author = {Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Ga{\"{e}}tan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Beno{\^{\i}}t Viguier}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Cryptanalysis of {MORUS}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {35--64}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_2}, doi = {10.1007/978-3-030-03329-3\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AshurELLMRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEGMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Stefan Mangard and Florian Mendel and Robert Primas}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {315--342}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_11}, doi = {10.1007/978-3-030-03329-3\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEGMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DobraunigE0LLLM18, author = {Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Rasta: {A} Cipher with Low ANDdepth and Few ANDs per Bit}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {662--692}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_22}, doi = {10.1007/978-3-319-96884-1\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DobraunigE0LLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/gidiss/Eichlseder18, author = {Maria Eichlseder}, editor = {Sven Apel and Abraham Bernstein and Felix C. Freiling and Steffen H{\"{o}}lldobler and Hans{-}Peter Lenhof and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Bj{\"{o}}rn Scheuermann and Nicole Schweikardt and Myra Spiliopoulou and Sabine S{\"{u}}sstrunk and Klaus Wehrle}, title = {Differential Cryptanalysis of Symmetric Primitives}, booktitle = {Ausgezeichnete Informatikdissertationen 2018}, series = {{LNI}}, volume = {{D-19}}, pages = {91--100}, publisher = {{GI}}, year = {2018}, url = {https://dl.gi.de/handle/20.500.12116/36752}, timestamp = {Tue, 04 Jul 2023 17:44:50 +0200}, biburl = {https://dblp.org/rec/series/gidiss/Eichlseder18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2018}, url = {http://eprint.iacr.org/2018/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigE0LLLM18, author = {Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger}, title = {Rasta: {A} cipher with low ANDdepth and few ANDs per bit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2018}, url = {http://eprint.iacr.org/2018/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigE0LLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEGMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2018}, url = {https://eprint.iacr.org/2018/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurELLMRSV18, author = {Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Ga{\"{e}}tan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Beno{\^{\i}}t Viguier}, title = {Cryptanalysis of {MORUS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2018}, url = {https://eprint.iacr.org/2018/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurELLMRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS18, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger}, title = {Algebraic Cryptanalysis of Frit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2018}, url = {https://eprint.iacr.org/2018/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMU17, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {80--105}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.80-105}, doi = {10.13154/TOSC.V2017.I1.80-105}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DobraunigEKM17, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel}, editor = {Sylvain Guilley}, title = {Side-Channel Analysis of Keymill}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {138--152}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_9}, doi = {10.1007/978-3-319-64647-3\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/DobraunigEKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederK17, author = {Maria Eichlseder and Daniel Kales}, title = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2017}, url = {http://eprint.iacr.org/2017/1136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalesEM17, author = {Daniel Kales and Maria Eichlseder and Florian Mendel}, title = {Note on the Robustness of {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1137}, year = {2017}, url = {http://eprint.iacr.org/2017/1137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalesEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEKM16, author = {Christoph Dobraunig and Maria Eichlseder and Daniel Kales and Florian Mendel}, title = {Practical Key-Recovery Attack on {MANTIS5}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {248--260}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.248-260}, doi = {10.13154/TOSC.V2016.I2.248-260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Square Attack on 7-Round Kiasu-BC}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {500--517}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_27}, doi = {10.1007/978-3-319-39555-5\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEKLM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomn{\'{e}} and Florian Mendel}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {369--395}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_14}, doi = {10.1007/978-3-662-53887-6\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEKLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Thomas Peyrin}, title = {Analysis of the Kupyna-256 Hash Function}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {575--590}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_29}, doi = {10.1007/978-3-662-52993-5\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Roberto Avanzi and Howard M. Heys}, title = {Cryptanalysis of Simpira v1}, booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10532}, pages = {284--298}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69453-5\_16}, doi = {10.1007/978-3-319-69453-5\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Cryptanalysis of Simpira}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2016}, url = {http://eprint.iacr.org/2016/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Square Attack on 7-Round Kiasu-BC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2016}, url = {http://eprint.iacr.org/2016/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16b, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of {SHA-512/224} and {SHA-512/256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2016}, url = {http://eprint.iacr.org/2016/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKLM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomn{\'{e}} and Florian Mendel}, title = {Practical Fault Attacks on Authenticated Encryption Modes for {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2016}, url = {http://eprint.iacr.org/2016/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16c, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Key Recovery for {MANTIS-5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2016}, url = {http://eprint.iacr.org/2016/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel}, title = {Side-Channel Analysis of Keymill}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2016}, url = {http://eprint.iacr.org/2016/793}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMMU16, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2016}, url = {http://eprint.iacr.org/2016/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR} Candidates}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {490--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_20}, doi = {10.1007/978-3-662-48800-3\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEM15a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Analysis of {SHA-512/224} and {SHA-512/256}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {612--630}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_25}, doi = {10.1007/978-3-662-48800-3\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DobraunigEMS15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of Ascon}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {371--387}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_20}, doi = {10.1007/978-3-319-16715-2\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/DobraunigEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Gregor Leander}, title = {Related-Key Forgeries for Pr{\o}st-OTR}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {282--296}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_14}, doi = {10.1007/978-3-662-48116-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Soonhak Kwon and Aaram Yun}, title = {Higher-Order Cryptanalysis of LowMC}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {87--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_6}, doi = {10.1007/978-3-319-30840-1\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Orr Dunkelman and Liam Keliher}, title = {Forgery Attacks on Round-Reduced {ICEPOLE-128}}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {479--492}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_27}, doi = {10.1007/978-3-319-31301-6\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Cryptanalysis of Ascon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2015}, url = {http://eprint.iacr.org/2015/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMM15, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2015}, url = {http://eprint.iacr.org/2015/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Related-Key Forgeries for Pr{\o}st-OTR}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2015}, url = {http://eprint.iacr.org/2015/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Forgery Attacks on round-reduced {ICEPOLE-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2015}, url = {http://eprint.iacr.org/2015/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15b, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Higher-order cryptanalysis of LowMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2015}, url = {http://eprint.iacr.org/2015/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15c, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of the Kupyna-256 Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2015}, url = {http://eprint.iacr.org/2015/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15d, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1200}, year = {2015}, url = {http://eprint.iacr.org/2015/1200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DobraunigEMM14, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, editor = {Marc Joye and Amir Moradi}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, booktitle = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, pages = {233--244}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16763-3\_14}, doi = {10.1007/978-3-319-16763-3\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/DobraunigEMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EichlsederMS14, author = {Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Carlos Cid and Christian Rechberger}, title = {Branching Heuristics in Differential Collision Search with Applications to {SHA-512}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {473--488}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_24}, doi = {10.1007/978-3-662-46706-0\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EichlsederMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BogdanovDELMST14, author = {Andrey Bogdanov and Christoph Dobraunig and Maria Eichlseder and Martin M. Lauridsen and Florian Mendel and Martin Schl{\"{a}}ffer and Elmar Tischhauser}, editor = {Diego F. Aranha and Alfred Menezes}, title = {Key Recovery Attacks on Recent Authenticated Ciphers}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {274--287}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_15}, doi = {10.1007/978-3-319-16295-9\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/BogdanovDELMST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AlbertiniAEMS14, author = {Ange Albertini and Jean{-}Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Antoine Joux and Amr M. Youssef}, title = {Malicious Hashing: Eve's Variant of {SHA-1}}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {1--19}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_1}, doi = {10.1007/978-3-319-13051-4\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/AlbertiniAEMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederMS14, author = {Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Branching Heuristics in Differential Collision Search with Applications to {SHA-512}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2014}, url = {http://eprint.iacr.org/2014/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbertiniAEMS14a, author = {Ange Albertini and Jean{-}Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Malicious Hashing: Eve's Variant of {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2014}, url = {http://eprint.iacr.org/2014/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbertiniAEMS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.