Martin Schläffer

From MaRDI portal
Person:656516

Available identifiers

zbMath Open schlaffer.martinWikidataQ22022507 ScholiaQ22022507MaRDI QIDQ656516

List of research outcomes





PublicationDate of PublicationType
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions2024-11-12Paper
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing2021-08-10Paper
Differential Cryptanalysis of SipHash2016-04-13Paper
Malicious Hashing: Eve’s Variant of SHA-12016-04-13Paper
Cryptanalysis of Ascon2016-03-02Paper
Branching Heuristics in Differential Collision Search with Applications to SHA-5122015-09-18Paper
Collision Attack on 5 Rounds of Grøstl2015-09-18Paper
Key Recovery Attacks on Recent Authenticated Ciphers2015-09-17Paper
The rebound attack and subspace distinguishers: application to Whirlpool2015-05-12Paper
Differential Cryptanalysis of Keccak Variants2014-01-17Paper
Improved Cryptanalysis of Reduced RIPEMD-1602013-12-10Paper
Fast Software Encryption Attacks on AES2013-06-07Paper
Improving Local Collisions: New Attacks on Reduced SHA-2562013-05-31Paper
Finding Collisions for Round-Reduced SM32013-03-18Paper
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl2013-03-18Paper
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-1282013-01-08Paper
Cryptanalysis of Round-Reduced HAS-1602012-11-01Paper
Improved Analysis of ECHO-2562012-06-08Paper
Secure hardware implementation of nonlinear functions in the presence of glitches2012-01-18Paper
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions2011-12-02Paper
Cryptanalysis of Luffa v2 Components2011-03-15Paper
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function2011-03-15Paper
Distinguishers for the Compression Function and Output Transformation of Hamsi-2562010-10-25Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-5122010-05-04Paper
Rebound Attacks on the Reduced Grøstl Hash Function2010-03-16Paper
Rebound Attack on the Full Lane Compression Function2009-12-15Paper
Rebound Distinguishers: Results on the Full Whirlpool Compression Function2009-12-15Paper
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners2009-12-15Paper
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher2009-12-09Paper
Practical Collisions for SHAMATA-2562009-12-09Paper
On Free-Start Collisions and Collisions for TIB32009-09-29Paper
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl2009-08-11Paper
Searching for Differential Paths in MD42009-04-02Paper
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches2009-03-24Paper
Using Normal Bases for Compact Hardware Implementations of the AES S-Box2008-11-20Paper
Collisions for Round-Reduced LAKE2008-07-08Paper

Research outcomes over time

This page was built for person: Martin Schläffer