Ascon v1.2 C Dobraunig, M Eichlseder, F Mendel, M Schläffer Submission to the CAESAR Competition, 2016 | 533* | 2016 |
Secure hardware implementation of nonlinear functions in the presence of glitches S Nikova, V Rijmen, M Schläffer Journal of cryptology 24 (2), 292-321, 2011 | 407 | 2011 |
Grøstl–a SHA-3 candidate P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ... Submission to NIST, 2008 | 376* | 2008 |
The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl F Mendel, C Rechberger, M Schläffer, S Thomsen Fast Software Encryption, 260-276, 2009 | 284 | 2009 |
Rebound distinguishers: Results on the full Whirlpool compression function M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 157 | 2009 |
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher F Mendel, T Peyrin, C Rechberger, M Schläffer Selected Areas in Cryptography, 16-35, 2009 | 101 | 2009 |
Cryptanalysis of Ascon C Dobraunig, M Eichlseder, F Mendel, M Schläffer Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015 | 100 | 2015 |
Finding SHA-2 characteristics: searching through a minefield of contradictions F Mendel, T Nad, M Schläffer Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 96 | 2011 |
Improving local collisions: new attacks on reduced SHA-256 F Mendel, T Nad, M Schläffer Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 95 | 2013 |
The rebound attack and subspace distinguishers: Application to Whirlpool M Lamberger, F Mendel, M Schläffer, C Rechberger, V Rijmen Journal of Cryptology 28, 257-296, 2015 | 72 | 2015 |
Rebound Attack on the Full Lane Compression Function K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer International Conference on the Theory and Application of Cryptology and …, 2009 | 70 | 2009 |
Ascon v1. 2. submission to the CAESAR competition C Dobraunig, M Eichlseder, F Mendel, M Schläffer Institute for Applied Information Processing and Communications, Graz, 2016 | 65 | 2016 |
Rebound Attacks on the Reduced Grøstl Hash Function F Mendel, C Rechberger, M Schläffer, SS Thomsen Cryptographers’ Track at the RSA Conference, 350-365, 2010 | 57 | 2010 |
Searching for differential paths in MD4 M Schläffer, E Oswald Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006 | 52 | 2006 |
Differential side channel analysis attacks on FPGA implementations of ARIA CK Kim, M Schläffer, SJ Moon ETRI journal 30 (2), 315-325, 2008 | 45 | 2008 |
Malicious hashing: Eve’s variant of SHA-1 A Albertini, JP Aumasson, M Eichlseder, F Mendel, M Schläffer Selected Areas in Cryptography--SAC 2014: 21st International Conference …, 2014 | 42 | 2014 |
Using normal bases for compact hardware implementations of the AES S-Box S Nikova, V Rijmen, M Schläffer Security and Cryptography for Networks: 6th International Conference, SCN …, 2008 | 36 | 2008 |
Branching heuristics in differential collision search with applications to SHA-512 M Eichlseder, F Mendel, M Schläffer International Workshop on Fast Software Encryption, 473-488, 2014 | 34 | 2014 |
Differential attacks on reduced RIPEMD-160 F Mendel, T Nad, S Scherz, M Schläffer Information Security: 15th International Conference, ISC 2012, Passau …, 2012 | 33 | 2012 |
Distinguishers for the compression function and output transformation of hamsi-256 JP Aumasson, E Käsper, L Knudsen, K Matusiewicz, R Ødegård, T Peyrin, ... Information Security and Privacy, 87-103, 2010 | 30 | 2010 |