Martin Schläffer

From MaRDI portal
(Redirected from Person:656516)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions
 
2024-11-12Paper
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
Journal of Cryptology
2021-08-10Paper
Differential cryptanalysis of SipHash
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Malicious hashing: Eve's variant of SHA-1
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Cryptanalysis of Ascon
Lecture Notes in Computer Science
2016-03-02Paper
Branching heuristics in differential collision search with applications to SHA-512
Fast Software Encryption
2015-09-18Paper
Collision attack on 5 rounds of Grøstl
Fast Software Encryption
2015-09-18Paper
Key recovery attacks on recent authenticated ciphers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
The rebound attack and subspace distinguishers: application to Whirlpool
Journal of Cryptology
2015-05-12Paper
Differential Cryptanalysis of Keccak Variants
Cryptography and Coding
2014-01-17Paper
Improved Cryptanalysis of Reduced RIPEMD-160
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Fast software encryption attacks on AES
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Improving local collisions: new attacks on reduced SHA-256
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Finding collisions for round-reduced SM3
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Collision attacks on the reduced dual-stream hash function RIPEMD-128
Fast Software Encryption
2013-01-08Paper
Cryptanalysis of round-reduced HAS-160
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Improved analysis of ECHO-256
Selected Areas in Cryptography
2012-06-08Paper
Secure hardware implementation of nonlinear functions in the presence of glitches
Journal of Cryptology
2012-01-18Paper
Finding SHA-2 characteristics: searching through a minefield of contradictions
Lecture Notes in Computer Science
2011-12-02Paper
Cryptanalysis of Luffa v2 components
Selected Areas in Cryptography
2011-03-15Paper
Subspace distinguisher for 5/8 rounds of the ECHO-256 hash function
Selected Areas in Cryptography
2011-03-15Paper
Distinguishers for the compression function and output transformation of Hamsi-256
Information Security and Privacy
2010-10-25Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Rebound Attacks on the Reduced Grøstl Hash Function
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Rebound attack on the full Lane compression function
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Rebound distinguishers: results on the full Whirlpool compression function
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
MD5 is weaker than weak: attacks on concatenated combiners
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
Selected Areas in Cryptography
2009-12-09Paper
Practical collisions for SHAMATA-256
Selected Areas in Cryptography
2009-12-09Paper
On Free-Start Collisions and Collisions for TIB3
Lecture Notes in Computer Science
2009-09-29Paper
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Fast Software Encryption
2009-08-11Paper
Searching for Differential Paths in MD4
Fast Software Encryption
2009-04-02Paper
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Information Security and Cryptology – ICISC 2008
2009-03-24Paper
Using Normal Bases for Compact Hardware Implementations of the AES S-Box
Lecture Notes in Computer Science
2008-11-20Paper
Collisions for Round-Reduced LAKE
Information Security and Privacy
2008-07-08Paper


Research outcomes over time


This page was built for person: Martin Schläffer