default search action
Christian Rechberger
Person information
- affiliation: Technical University of Denmark, DTU
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations. IACR Trans. Symmetric Cryptol. 2024(3): 44-83 (2024) - 2023
- [j15]Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Pasta: A Case for Hybrid Homomorphic Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 30-73 (2023) - 2022
- [j14]Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography. Proc. Priv. Enhancing Technol. 2022(4): 768-788 (2022) - [j13]Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Influence of the Linear Layer on the Algebraic Degree in SP-Networks. IACR Trans. Symmetric Cryptol. 2022(1): 110-137 (2022) - 2021
- [j12]Lorenzo Grassi, Christian Rechberger, Markus Schofnegger:
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer. IACR Trans. Symmetric Cryptol. 2021(2): 314-352 (2021) - 2020
- [j11]Lorenzo Grassi, Christian Rechberger:
Revisiting Gilbert's known-key distinguisher. Des. Codes Cryptogr. 88(7): 1401-1445 (2020) - [j10]Christoph Dobraunig, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany:
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta. IET Inf. Secur. 14(2): 202-209 (2020) - 2018
- [j9]Christian Rechberger, Hadi Soleimany, Tyge Tiessen:
Cryptanalysis of Low-Data Instances of Full LowMCv2. IACR Trans. Symmetric Cryptol. 2018(3): 163-181 (2018) - 2016
- [j8]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Trans. Symmetric Cryptol. 2016(2): 1-29 (2016) - [j7]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
Subspace Trail Cryptanalysis and its Applications to AES. IACR Trans. Symmetric Cryptol. 2016(2): 192-225 (2016) - 2015
- [j6]Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. J. Cryptol. 28(2): 257-296 (2015) - 2014
- [j5]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. J. Cryptol. 27(3): 452-479 (2014) - 2012
- [j4]Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On security arguments of the second round SHA-3 candidates. Int. J. Inf. Sec. 11(2): 103-120 (2012) - 2008
- [j3]Christian Rechberger, Vincent Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. J. Univers. Comput. Sci. 14(3): 347-376 (2008) - [j2]Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of the Hash Function Design Strategy Called SMASH. IEEE Trans. Inf. Theory 54(8): 3647-3655 (2008) - 2006
- [j1]Christian Rechberger, Vincent Rijmen, Nicolas Sklavos:
The NIST Cryptographic Workshop on Hash Functions. IEEE Secur. Priv. 4(1): 54-56 (2006)
Conference and Workshop Papers
- 2024
- [c76]Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, Christian Rechberger:
OPRFs from Isogenies: Designs and Analysis. AsiaCCS 2024 - [c75]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. COSADE 2024: 133-154 - [c74]Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger:
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. SEC 2024: 353-366 - 2023
- [c73]Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. CRYPTO (3) 2023: 573-606 - 2022
- [c72]Lorenzo Grassi, Christian Rechberger:
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES. ACISP 2022: 24-45 - [c71]Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. CCS 2022: 843-857 - [c70]Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Reinforced Concrete: A Fast Hash Function for Verifiable Computation. CCS 2022: 1323-1335 - 2021
- [c69]Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger:
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. USENIX Security Symposium 2021: 519-535 - 2020
- [c68]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. ASIACRYPT (1) 2020: 477-506 - [c67]Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner:
Efficient FPGA Implementations of LowMC and Picnic. CT-RSA 2020: 417-441 - [c66]Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger:
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy. EUROCRYPT (2) 2020: 674-704 - [c65]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Distinguishers for AES. SAC 2020: 141-170 - 2019
- [c64]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. ASIACRYPT (3) 2019: 371-397 - [c63]Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. ESORICS (2) 2019: 151-171 - [c62]Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger:
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC. EUROCRYPT (1) 2019: 343-372 - [c61]Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. USENIX Security Symposium 2019: 1447-1464 - 2018
- [c60]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [c59]Qingju Wang, Lorenzo Grassi, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. CT-RSA 2018: 279-299 - 2017
- [c58]Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha:
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. CCS 2017: 1825-1842 - [c57]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. EUROCRYPT (2) 2017: 289-317 - 2016
- [c56]Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen:
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. ASIACRYPT (1) 2016: 191-219 - [c55]Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart:
MPC-Friendly Symmetric Key Primitives. CCS 2016: 430-443 - [c54]Lorenzo Grassi, Christian Rechberger:
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE. INDOCRYPT 2016: 322-342 - 2015
- [c53]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [c52]Muhammad Hassan, Ayesha Khalid, Anupam Chattopadhyay, Christian Rechberger, Tim Güneysu, Christof Paar:
New ASIC/FPGA Cost Estimates for SHA-1 Collisions. DSD 2015: 669-676 - [c51]Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner:
Ciphers for MPC and FHE. EUROCRYPT (1) 2015: 430-454 - [c50]Martin M. Lauridsen, Christian Rechberger:
Linear Distinguishers in the Key-less Setting: Application to PRESENT. FSE 2015: 217-240 - [c49]Ralph Ankele, Stefan Kölbl, Christian Rechberger:
State-Recovery Analysis of Spritz. LATINCRYPT 2015: 204-221 - 2014
- [c48]Stefan Kölbl, Christian Rechberger:
Practical Attacks on AES-like Cryptographic Hash Functions. LATINCRYPT 2014: 259-273 - 2013
- [c47]Dmitry Khovratovich, Christian Rechberger:
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE. Selected Areas in Cryptography 2013: 174-184 - 2012
- [c46]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c45]Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger:
Narrow-Bicliques: Cryptanalysis of Full IDEA. EUROCRYPT 2012: 392-410 - [c44]Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. FSE 2012: 244-263 - [c43]Christian Rechberger:
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. ICISC 2012: 33-36 - [c42]Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. Selected Areas in Cryptography 2012: 222-233 - 2011
- [c41]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ACISP 2011: 433-438 - [c40]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. ASIACRYPT 2011: 344-371 - 2010
- [c39]Christian Rechberger:
Second-Preimage Analysis of Reduced SHA-1. ACISP 2010: 104-116 - [c38]Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010: 419-436 - [c37]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. ASIACRYPT 2010: 1-19 - [c36]Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. ASIACRYPT 2010: 56-75 - [c35]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Rebound Attacks on the Reduced Grøstl Hash Function. CT-RSA 2010: 350-365 - [c34]Andrey Bogdanov, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. Selected Areas in Cryptography 2010: 229-240 - 2009
- [c33]Florian Mendel, Christian Rechberger, Martin Schläffer:
Cryptanalysis of Twister. ACNS 2009: 342-353 - [c32]Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of Vortex. AFRICACRYPT 2009: 14-28 - [c31]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 - [c30]Florian Mendel, Christian Rechberger, Martin Schläffer:
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. ASIACRYPT 2009: 144-161 - [c29]Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120 - [c28]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. FSE 2009: 260-276 - [c27]Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Selected Areas in Cryptography 2009: 16-35 - 2008
- [c26]Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar:
Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257 - [c25]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt:
Cryptanalysis of the GOST Hash Function. CRYPTO 2008: 162-178 - [c24]Christophe De Cannière, Christian Rechberger:
Preimages for Reduced SHA-0 and SHA-1. CRYPTO 2008: 179-202 - [c23]Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function. FSE 2008: 224-234 - [c22]Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. FSE 2008: 470-488 - [c21]Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger:
Collisions and Other Non-random Properties for Step-Reduced SHA-256. Selected Areas in Cryptography 2008: 276-293 - 2007
- [c20]Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Second Preimages for SMASH. CT-RSA 2007: 101-111 - [c19]Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann, Marcel Medwed:
Energy evaluation of software implementations of block ciphers under memory constraints. DATE 2007: 1110-1115 - [c18]Christian Rechberger, Vincent Rijmen:
On Authentication with HMAC and Non-random Properties. Financial Cryptography 2007: 119-133 - [c17]Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen:
The Grindahl Hash Functions. FSE 2007: 39-57 - [c16]Christophe De Cannière, Florian Mendel, Christian Rechberger:
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. Selected Areas in Cryptography 2007: 56-73 - [c15]Marko Hölbl, Christian Rechberger, Tatjana Welzer:
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. WEWoRC 2007: 28-38 - 2006
- [c14]Christophe De Cannière, Christian Rechberger:
Finding SHA-1 Characteristics: General Results and Applications. ASIACRYPT 2006: 1-20 - [c13]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
A compact FPGA implementation of the hash function whirlpool. FPGA 2006: 159-166 - [c12]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of Step-Reduced SHA-256. FSE 2006: 126-143 - [c11]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292 - [c10]Svetla Nikova, Christian Rechberger, Vincent Rijmen:
Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545 - [c9]Florian Mendel, Norbert Pramstaller, Christian Rechberger:
Improved Collision Attack on the Hash Function Proposed at PKC'98. ICISC 2006: 8-21 - [c8]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116 - [c7]Martin Feldhofer, Christian Rechberger:
A Case Against Currently Used Hash Functions in RFID Protocols. OTM Workshops (1) 2006: 372-381 - 2005
- [c6]Amir Hayat, Christian Rechberger:
Interoperable Certification Authorities In The European Union: A Practical Solution. EGOV (Workshops and Posters) 2005: 374-381 - [c5]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Exploiting Coding Theory for Collision Attacks on SHA-1. IMACC 2005: 78-95 - [c4]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Breaking a New Hash Function Design Strategy Called SMASH. Selected Areas in Cryptography 2005: 233-244 - [c3]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Impact of Rotations in SHA-1 and Related Hash Functions. Selected Areas in Cryptography 2005: 261-275 - [c2]Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134 - 2004
- [c1]Christian Rechberger, Elisabeth Oswald:
Practical Template Attacks. WISA 2004: 440-456
Parts in Books or Collections
- 2022
- [p1]Christian Rechberger, Roman Walch:
Privacy-Preserving Machine Learning Using Cryptography. Security and Artificial Intelligence 2022: 109-129
Editorship
- 2015
- [e1]Carlos Cid, Christian Rechberger:
Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8540, Springer 2015, ISBN 978-3-662-46705-3 [contents]
Informal and Other Publications
- 2024
- [i64]Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger:
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. CoRR abs/2405.20483 (2024) - [i63]Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Practical Two-party Computational Differential Privacy with Active Security. IACR Cryptol. ePrint Arch. 2024: 4 (2024) - [i62]Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger:
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi. IACR Cryptol. ePrint Arch. 2024: 250 (2024) - [i61]Lena Heimberger, Florian Lugstein, Christian Rechberger:
Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern. IACR Cryptol. ePrint Arch. 2024: 457 (2024) - [i60]Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl:
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. IACR Cryptol. ePrint Arch. 2024: 490 (2024) - [i59]Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang:
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? IACR Cryptol. ePrint Arch. 2024: 791 (2024) - [i58]Fredrik Meisingseth, Christian Rechberger:
SoK: Computational and Distributed Differential Privacy for MPC. IACR Cryptol. ePrint Arch. 2024: 1290 (2024) - [i57]Shibam Mukherjee, Christian Rechberger, Markus Schofnegger:
Cache Timing Leakages in Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 2024: 1390 (2024) - 2023
- [i56]Lena Heimberger, Fredrik Meisingseth, Christian Rechberger:
OPRFs from Isogenies: Designs and Analysis. IACR Cryptol. ePrint Arch. 2023: 639 (2023) - [i55]Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You. IACR Cryptol. ePrint Arch. 2023: 1025 (2023) - [i54]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1252 (2023) - 2022
- [i53]Roman Walch, Samuel Sousa, Lukas Helminger, Stefanie N. Lindstaedt, Christian Rechberger, Andreas Trügler:
CryptoTL: Private, efficient and secure transfer learning. CoRR abs/2205.11935 (2022) - [i52]Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger:
Small MACs from Small Permutations. IACR Cryptol. ePrint Arch. 2022: 49 (2022) - [i51]Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. IACR Cryptol. ePrint Arch. 2022: 403 (2022) - [i50]Lukas Helminger, Christian Rechberger:
Multi-Party Computation in the GDPR. IACR Cryptol. ePrint Arch. 2022: 491 (2022) - [i49]Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger:
A Signature-Based Gröbner Basis Algorithm with Tail-Reduced Reductors (M5GB). IACR Cryptol. ePrint Arch. 2022: 987 (2022) - 2021
- [i48]Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. IACR Cryptol. ePrint Arch. 2021: 692 (2021) - [i47]Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Pasta: A Case for Hybrid Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2021: 731 (2021) - [i46]Mario Barbara, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation. IACR Cryptol. ePrint Arch. 2021: 1038 (2021) - 2020
- [i45]Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics. CoRR abs/2005.02061 (2020) - [i44]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. IACR Cryptol. ePrint Arch. 2020: 182 (2020) - [i43]Lorenzo Grassi, Christian Rechberger, Markus Schofnegger:
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers. IACR Cryptol. ePrint Arch. 2020: 500 (2020) - [i42]Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics. IACR Cryptol. ePrint Arch. 2020: 522 (2020) - [i41]Carlos Cid, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Higher-Order Differentials of Ciphers with Low-Degree S-Boxes. IACR Cryptol. ePrint Arch. 2020: 536 (2020) - 2019
- [i40]Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. IACR Cryptol. ePrint Arch. 2019: 397 (2019) - [i39]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. IACR Cryptol. ePrint Arch. 2019: 419 (2019) - [i38]Lorenzo Grassi, Daniel Kales, Dmitry Khovratovich, Arnab Roy, Christian Rechberger, Markus Schofnegger:
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems. IACR Cryptol. ePrint Arch. 2019: 458 (2019) - [i37]Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. IACR Cryptol. ePrint Arch. 2019: 517 (2019) - [i36]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Subspace Trails and Applications to AES. IACR Cryptol. ePrint Arch. 2019: 852 (2019) - [i35]Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger:
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy. IACR Cryptol. ePrint Arch. 2019: 1107 (2019) - [i34]Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner:
Efficient FPGA Implementations of LowMC and Picnic. IACR Cryptol. ePrint Arch. 2019: 1368 (2019) - 2018
- [i33]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i32]Lorenzo Grassi, Christian Rechberger:
New Rigorous Analysis of Truncated Differentials for 5-round AES. IACR Cryptol. ePrint Arch. 2018: 182 (2018) - [i31]Christian Rechberger, Hadi Soleimany, Tyge Tiessen:
Cryptanalysis of Low-Data Instances of Full LowMCv2. IACR Cryptol. ePrint Arch. 2018: 859 (2018) - 2017
- [i30]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. IACR Cryptol. ePrint Arch. 2017: 118 (2017) - [i29]Lorenzo Grassi, Christian Rechberger:
New Limits for AES Known-Key Distinguishers. IACR Cryptol. ePrint Arch. 2017: 255 (2017) - [i28]Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha:
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2017: 279 (2017) - [i27]Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger:
Improvements to the Linear Layer of LowMC: A Faster Picnic. IACR Cryptol. ePrint Arch. 2017: 1148 (2017) - [i26]Qingju Wang, Lorenzo Grassi, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. IACR Cryptol. ePrint Arch. 2017: 1211 (2017) - 2016
- [i25]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Cryptol. ePrint Arch. 2016: 98 (2016) - [i24]Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen:
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. IACR Cryptol. ePrint Arch. 2016: 492 (2016) - [i23]Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart:
MPC-Friendly Symmetric Key Primitives. IACR Cryptol. ePrint Arch. 2016: 542 (2016) - [i22]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
Subspace Trail Cryptanalysis and its Applications to AES. IACR Cryptol. ePrint Arch. 2016: 592 (2016) - [i21]Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner:
Ciphers for MPC and FHE. IACR Cryptol. ePrint Arch. 2016: 687 (2016) - [i20]Lorenzo Grassi, Christian Rechberger:
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE. IACR Cryptol. ePrint Arch. 2016: 964 (2016) - [i19]David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig:
Digital Signatures from Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2016: 1085 (2016) - 2015
- [i18]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptol. ePrint Arch. 2015: 212 (2015) - [i17]Ralph Ankele, Stefan Kölbl, Christian Rechberger:
State-recovery analysis of Spritz. IACR Cryptol. ePrint Arch. 2015: 828 (2015) - [i16]Martin M. Lauridsen, Christian Rechberger:
Linear Distinguishers in the Key-less Setting: Application to PRESENT. IACR Cryptol. ePrint Arch. 2015: 908 (2015) - 2013
- [i15]Dmitry Khovratovich, Christian Rechberger:
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE. IACR Cryptol. ePrint Arch. 2013: 357 (2013) - 2012
- [i14]Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On Security Arguments of the Second Round SHA-3 Candidates. IACR Cryptol. ePrint Arch. 2012: 147 (2012) - [i13]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). IACR Cryptol. ePrint Arch. 2012: 529 (2012) - 2011
- [i12]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. IACR Cryptol. ePrint Arch. 2011: 201 (2011) - [i11]Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family. IACR Cryptol. ePrint Arch. 2011: 286 (2011) - [i10]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. IACR Cryptol. ePrint Arch. 2011: 449 (2011) - 2010
- [i9]Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. IACR Cryptol. ePrint Arch. 2010: 16 (2010) - [i8]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. IACR Cryptol. ePrint Arch. 2010: 198 (2010) - [i7]Andrey Bogdanov, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. IACR Cryptol. ePrint Arch. 2010: 532 (2010) - [i6]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. IACR Cryptol. ePrint Arch. 2010: 538 (2010) - 2009
- [i5]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - 2008
- [i4]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of Step-Reduced SHA-256. IACR Cryptol. ePrint Arch. 2008: 130 (2008) - [i3]Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger:
Collisions and other Non-Random Properties for Step-Reduced SHA-256. IACR Cryptol. ePrint Arch. 2008: 131 (2008) - 2007
- [i2]Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. IACR Cryptol. ePrint Arch. 2007: 472 (2007) - 2006
- [i1]Christian Rechberger, Vincent Rijmen:
On Authentication with HMAC and Non-Random Properties. IACR Cryptol. ePrint Arch. 2006: 290 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint