Florian Mendel

From MaRDI portal
Person:663462

Available identifiers

zbMath Open mendel.florianWikidataQ22036631 ScholiaQ22036631MaRDI QIDQ663462

List of research outcomes

PublicationDate of PublicationType
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing2021-08-10Paper
Practical forgeries for ORANGE2020-08-04Paper
Algebraic cryptanalysis of variants of \textsc{Frit}2020-07-21Paper
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-1602020-05-21Paper
Efficient collision attack frameworks for RIPEMD-1602020-03-09Paper
Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje2019-02-20Paper
Statistical ineffective fault attacks on masked AES with fault countermeasures2019-01-23Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Cryptanalysis of Reduced NORX2018-05-09Paper
Analysis of the Kupyna-256 Hash Function2018-05-09Paper
Collisions and semi-free-start collisions for round-reduced RIPEMD-1602018-04-06Paper
Cryptanalysis of Simpira v12018-02-16Paper
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes2017-02-01Paper
Square Attack on 7-Round Kiasu-BC2016-10-04Paper
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ2016-09-02Paper
Higher-Order Cryptanalysis of LowMC2016-05-19Paper
Forgery Attacks on Round-Reduced ICEPOLE-1282016-05-19Paper
Malicious Hashing: Eve’s Variant of SHA-12016-04-13Paper
Differential Cryptanalysis of SipHash2016-04-13Paper
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates2016-03-23Paper
Analysis of SHA-512/224 and SHA-512/2562016-03-23Paper
Cryptanalysis of Ascon2016-03-02Paper
ALE: AES-Based Lightweight Authenticated Encryption2015-09-18Paper
Branching Heuristics in Differential Collision Search with Applications to SHA-5122015-09-18Paper
Collision Attack on 5 Rounds of Grøstl2015-09-18Paper
Related-Key Forgeries for Prøst-OTR2015-09-18Paper
Key Recovery Attacks on Recent Authenticated Ciphers2015-09-17Paper
The rebound attack and subspace distinguishers: application to Whirlpool2015-05-12Paper
Collision Attack on the Hamsi-256 Compression Function2014-08-20Paper
Differential Cryptanalysis of Keccak Variants2014-01-17Paper
Improved Cryptanalysis of Reduced RIPEMD-1602013-12-10Paper
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware2013-10-10Paper
Improving Local Collisions: New Attacks on Reduced SHA-2562013-05-31Paper
Differential Analysis of the LED Block Cipher2013-03-19Paper
Collisions for the WIDEA-8 Compression Function2013-03-18Paper
Finding Collisions for Round-Reduced SM32013-03-18Paper
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-1282013-01-08Paper
Cryptanalysis of Round-Reduced HAS-1602012-11-01Paper
Memoryless near-collisions via coding theory2012-02-15Paper
Boomerang Distinguisher for the SIMD-512 Compression Function2011-12-16Paper
Second-Order Differential Collisions for Reduced SHA-2562011-12-02Paper
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions2011-12-02Paper
Preimage Attacks against PKC98-Hash and HAS-V2011-10-27Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-5122010-05-04Paper
Rebound Attacks on the Reduced Grøstl Hash Function2010-03-16Paper
A Distinguisher for the Compression Function of SIMD-5122009-12-17Paper
Rebound Distinguishers: Results on the Full Whirlpool Compression Function2009-12-15Paper
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners2009-12-15Paper
Practical Collisions for SHAMATA-2562009-12-09Paper
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher2009-12-09Paper
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD52009-11-03Paper
Collisions and Other Non-random Properties for Step-Reduced SHA-2562009-11-03Paper
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n2009-09-29Paper
On Free-Start Collisions and Collisions for TIB32009-09-29Paper
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl2009-08-11Paper
Cryptanalysis of Vortex2009-07-07Paper
Two Passes of Tiger Are Not One-Way2009-07-07Paper
Cryptanalysis of MDC-22009-05-12Paper
Analysis of Step-Reduced SHA-2562009-04-02Paper
The Impact of Carries on the Complexity of Collision Attacks on SHA-12009-04-02Paper
Cryptanalysis of the GOST Hash Function2009-02-10Paper
A (Second) Preimage Attack on the GOST Hash Function2008-09-18Paper
Collisions for Round-Reduced LAKE2008-07-08Paper
On the Collision Resistance of RIPEMD-1602008-06-17Paper
Cryptanalysis of the Tiger Hash Function2008-05-15Paper
Colliding Message Pair for 53-Step HAS-1602008-05-06Paper
Weaknesses in the HAS-V Compression Function2008-05-06Paper
Improved Collision Attack on the Hash Function Proposed at PKC’982008-05-06Paper
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function2008-04-17Paper
Update on Tiger2008-04-11Paper
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search2008-03-25Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Florian Mendel