Christian Rechberger

From MaRDI portal
Revision as of 10:04, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:744347

Available identifiers

zbMath Open rechberger.christianMaRDI QIDQ744347

List of research outcomes





PublicationDate of PublicationType
Towards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitations2024-10-31Paper
\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications2024-02-02Paper
Truncated differential properties of the diagonal set of inputs for 5-round AES2023-07-26Paper
An algebraic attack on ciphers with low-degree round functions: application to full MiMC2023-03-21Paper
Feistel structures for MPC, and more2022-08-25Paper
A Signature-Based Gr\"obner Basis Algorithm with Tail-Reduced Reductors (M5GB)2022-08-01Paper
Weak-key distinguishers for AES2022-03-25Paper
On a generalization of substitution-permutation networks: the HADES design strategy2022-03-23Paper
Revisiting Gilbert's known-key distinguisher2020-07-15Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC2020-02-04Paper
Zero-sum partitions of PHOTON permutations2020-01-21Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
A New Structural-Differential Property of 5-Round AES2017-06-13Paper
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity2017-02-01Paper
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE2016-12-21Paper
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows2016-03-02Paper
Improved Cryptanalysis of the Block Cipher KASUMI2015-12-04Paper
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE2015-10-01Paper
Ciphers for MPC and FHE2015-09-30Paper
Linear Distinguishers in the Key-less Setting: Application to PRESENT2015-09-18Paper
State-Recovery Analysis of Spritz2015-09-17Paper
Practical Attacks on AES-like Cryptographic Hash Functions2015-09-17Paper
The rebound attack and subspace distinguishers: application to Whirlpool2015-05-12Paper
Rotational rebound attacks on reduced Skein2014-09-25Paper
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis2013-06-04Paper
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications2013-03-19Paper
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family2013-01-08Paper
Narrow-Bicliques: Cryptanalysis of Full IDEA2012-06-29Paper
Biclique Cryptanalysis of the Full AES2011-12-02Paper
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)2011-07-07Paper
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN2011-03-15Paper
Rotational Rebound Attacks on Reduced Skein2010-12-07Paper
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-22010-12-07Paper
Second-Preimage Analysis of Reduced SHA-12010-10-25Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-5122010-05-04Paper
Rebound Attacks on the Reduced Grøstl Hash Function2010-03-16Paper
Rebound Distinguishers: Results on the Full Whirlpool Compression Function2009-12-15Paper
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners2009-12-15Paper
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher2009-12-09Paper
Collisions and Other Non-random Properties for Step-Reduced SHA-2562009-11-03Paper
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl2009-08-11Paper
Cryptanalysis of Vortex2009-07-07Paper
Cryptanalysis of MDC-22009-05-12Paper
Analysis of Step-Reduced SHA-2562009-04-02Paper
The Impact of Carries on the Complexity of Collision Attacks on SHA-12009-04-02Paper
Analysis of the Hash Function Design Strategy Called SMASH2009-02-24Paper
Cryptanalysis of the GOST Hash Function2009-02-10Paper
Preimages for Reduced SHA-0 and SHA-12009-02-10Paper
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-2562009-01-22Paper
Threshold Implementations Against Side-Channel Attacks and Glitches2008-11-11Paper
A (Second) Preimage Attack on the GOST Hash Function2008-09-18Paper
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba2008-09-18Paper
The Grindahl Hash Functions2008-09-16Paper
On the Collision Resistance of RIPEMD-1602008-06-17Paper
Correlated Keystreams in Moustique2008-06-13Paper
Improved Collision Attack on the Hash Function Proposed at PKC’982008-05-06Paper
Finding SHA-1 Characteristics: General Results and Applications2008-04-24Paper
Second Preimages for SMASH2008-04-17Paper
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search2008-03-25Paper
On Authentication with HMAC and Non-random Properties2008-03-07Paper
Breaking a New Hash Function Design Strategy Called SMASH2007-11-15Paper
Impact of Rotations in SHA-1 and Related Hash Functions2007-11-15Paper
Cryptography and Coding2006-11-01Paper

Research outcomes over time

This page was built for person: Christian Rechberger