The following pages link to Florian Mendel (Q663462):
Displaying 50 items.
- Memoryless near-collisions via coding theory (Q663464) (← links)
- Algebraic cryptanalysis of variants of \textsc{Frit} (Q778915) (← links)
- Practical forgeries for ORANGE (Q783690) (← links)
- Rasta: a cipher with low ANDdepth and few ANDs per bit (Q1673415) (← links)
- Cryptanalysis of Simpira v1 (Q1698642) (← links)
- Statistical ineffective fault attacks on masked AES with fault countermeasures (Q1710602) (← links)
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje (Q1726679) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 (Q2182064) (← links)
- Efficient collision attack frameworks for RIPEMD-160 (Q2304980) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Collisions and semi-free-start collisions for round-reduced RIPEMD-160 (Q2412871) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates (Q2795987) (← links)
- Analysis of SHA-512/224 and SHA-512/256 (Q2795992) (← links)
- Malicious Hashing: Eve’s Variant of SHA-1 (Q2798600) (← links)
- Differential Cryptanalysis of SipHash (Q2798612) (← links)
- Higher-Order Cryptanalysis of LowMC (Q2806764) (← links)
- Forgery Attacks on Round-Reduced ICEPOLE-128 (Q2807228) (← links)
- Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ (Q2817820) (← links)
- Square Attack on 7-Round Kiasu-BC (Q2822691) (← links)
- Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware (Q2851416) (← links)
- Improved Cryptanalysis of Reduced RIPEMD-160 (Q2867171) (← links)
- Differential Cryptanalysis of Keccak Variants (Q2870091) (← links)
- Collision Attack on the Hamsi-256 Compression Function (Q2876931) (← links)
- Key Recovery Attacks on Recent Authenticated Ciphers (Q2946480) (← links)
- ALE: AES-Based Lightweight Authenticated Encryption (Q2946890) (← links)
- Branching Heuristics in Differential Collision Search with Applications to SHA-512 (Q2946924) (← links)
- Collision Attack on 5 Rounds of Grøstl (Q2946926) (← links)
- Related-Key Forgeries for Prøst-OTR (Q2946947) (← links)
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes (Q2958130) (← links)
- Preimage Attacks against PKC98-Hash and HAS-V (Q3094985) (← links)
- Second-Order Differential Collisions for Reduced SHA-256 (Q3102192) (← links)
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions (Q3102193) (← links)
- Boomerang Distinguisher for the SIMD-512 Compression Function (Q3104738) (← links)
- Cryptanalysis of Round-Reduced HAS-160 (Q3168615) (← links)
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl (Q3391575) (← links)
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n (Q3399201) (← links)
- On Free-Start Collisions and Collisions for TIB3 (Q3399203) (← links)
- Cryptanalysis of the Tiger Hash Function (Q3498398) (← links)
- On the Collision Resistance of RIPEMD-160 (Q3506882) (← links)
- Collisions for Round-Reduced LAKE (Q3511169) (← links)
- A (Second) Preimage Attack on the GOST Hash Function (Q3525675) (← links)
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 (Q3558326) (← links)
- Cryptanalysis of the GOST Hash Function (Q3600219) (← links)
- Analysis of Step-Reduced SHA-256 (Q3618648) (← links)
- The Impact of Carries on the Complexity of Collision Attacks on SHA-1 (Q3618660) (← links)
- Cryptanalysis of MDC-2 (Q3627430) (← links)
- Cryptanalysis of Vortex (Q3637129) (← links)
- Two Passes of Tiger Are Not One-Way (Q3637130) (← links)