Maria Eichlseder

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT2024-12-13Paper
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions2024-11-12Paper
\(L^*\)-based learning of Markov decision processes2024-03-14Paper
Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
An algebraic attack on ciphers with low-degree round functions: application to full MiMC2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Information-combining differential fault attacks on DEFAULT2022-08-30Paper
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers2022-07-06Paper
Practical key recovery attacks on FlexAEAD
Designs, Codes and Cryptography
2022-03-31Paper
PRINCEv2. More security for (almost) no overhead2022-03-25Paper
\(L^\ast\)-based learning of Markov decision processes (extended version)
Formal Aspects of Computing
2021-09-14Paper
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
Journal of Cryptology
2021-08-10Paper
Algebraic cryptanalysis of variants of \textsc{Frit}2020-07-21Paper
Forgery attacks on FlexAE and FlexAEAD2020-05-06Paper
Statistical ineffective fault attacks on masked AES with fault countermeasures2019-01-23Paper
Cryptanalysis of MORUS
Lecture Notes in Computer Science
2019-01-23Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Analysis of the Kupyna-256 Hash Function
Fast Software Encryption
2018-05-09Paper
Cryptanalysis of Simpira v12018-02-16Paper
Statistical fault attacks on nonce-based authenticated encryption schemes
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Square attack on 7-round Kiasu-BC
Applied Cryptography and Network Security
2016-10-04Paper
Higher-Order Cryptanalysis of LowMC
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Forgery Attacks on Round-Reduced ICEPOLE-128
Lecture Notes in Computer Science
2016-05-19Paper
Malicious hashing: Eve's variant of SHA-1
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Analysis of SHA-512/224 and SHA-512/256
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Cryptanalysis of Ascon
Lecture Notes in Computer Science
2016-03-02Paper
Related-Key Forgeries for Prøst-OTR
Fast Software Encryption
2015-09-18Paper
Branching heuristics in differential collision search with applications to SHA-512
Fast Software Encryption
2015-09-18Paper
Key recovery attacks on recent authenticated ciphers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper


Research outcomes over time


This page was built for person: Maria Eichlseder