Grøstl–a SHA-3 candidate P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Submission to NIST, 2008 | 421* | 2008 |
Ascon v1.2 -- Lightweight Authenticated Encryption and Hashing C Dobraunig, M Eichlseder, F Mendel, M Schläffer Journal of Cryptology, 2020 | 408 | 2020 |
The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl F Mendel, C Rechberger, M Schläffer, S Thomsen Fast Software Encryption, 260-276, 2009 | 284 | 2009 |
Ascon v1.2 C Dobraunig, M Eichlseder, F Mendel, M Schläffer Submission to the CAESAR Competition, 2014 | 232* | 2014 |
SPHINCS+ JP Aumasson, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ... Submission to the NIST post-quantum project, 2017 | 217* | 2017 |
SIFA: exploiting ineffective fault inductions on symmetric cryptography C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018 | 196 | 2018 |
ALE: AES-based lightweight authenticated encryption A Bogdanov, F Mendel, F Regazzoni, V Rijmen, E Tischhauser Fast Software Encryption, 447-466, 2013 | 162 | 2013 |
Rebound distinguishers: Results on the full Whirlpool compression function M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 157 | 2009 |
Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang Cryptographic Hardware and Embedded Systems, 142-158, 2013 | 153 | 2013 |
Gimli: a cross-platform permutation DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ... Cryptographic Hardware and Embedded Systems, 2017 | 135 | 2017 |
Rasta: A cipher with low ANDdepth and few ANDs per bit C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ... | 129 | 2018 |
Collisions for 70-step SHA-1: on the full cost of collision search C De Canniere, F Mendel, C Rechberger Selected Areas in Cryptography, 56-73, 2007 | 112 | 2007 |
ISAP v2.0 C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas Submission to the NIST Lightweight Cryptography Standardization Process, 2019 | 111* | 2019 |
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher F Mendel, T Peyrin, C Rechberger, M Schläffer Selected Areas in Cryptography, 16-35, 2009 | 101 | 2009 |
Analysis of step-reduced SHA-256 F Mendel, N Pramstaller, C Rechberger, V Rijmen Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006 | 101 | 2006 |
Cryptanalysis of Ascon C Dobraunig, M Eichlseder, F Mendel, M Schläffer Topics in Cryptology – CT-RSA 2015, 2015 | 100 | 2015 |
PRIMATEs E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... Submission to the CAESAR Competition, 2014 | 97* | 2014 |
Finding SHA-2 characteristics: searching through a minefield of contradictions F Mendel, T Nad, M Schläffer Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 96 | 2011 |
Improving Local Collisions: New Attacks on Reduced SHA-256 F Mendel, T Nad, M Schläffer EUROCRYPT, 262-278, 2013 | 95 | 2013 |
Haraka v2–efficient short-input hashing for post-quantum applications S Kölbl, MM Lauridsen, F Mendel, C Rechberger IACR Transactions on Symmetric Cryptology, 1-29, 2016 | 93 | 2016 |