Christian Rechberger

From MaRDI portal
Person:744347

Available identifiers

zbMath Open rechberger.christianMaRDI QIDQ744347

List of research outcomes

PublicationDate of PublicationType
\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications2024-02-02Paper
Truncated differential properties of the diagonal set of inputs for 5-round AES2023-07-26Paper
An algebraic attack on ciphers with low-degree round functions: application to full MiMC2023-03-21Paper
Feistel structures for MPC, and more2022-08-25Paper
A Signature-Based Gr\"obner Basis Algorithm with Tail-Reduced Reductors (M5GB)2022-08-01Paper
Weak-key distinguishers for AES2022-03-25Paper
On a generalization of substitution-permutation networks: the HADES design strategy2022-03-23Paper
Revisiting Gilbert's known-key distinguisher2020-07-15Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC2020-02-04Paper
Zero-sum partitions of PHOTON permutations2020-01-21Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
A New Structural-Differential Property of 5-Round AES2017-06-13Paper
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity2017-02-01Paper
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE2016-12-21Paper
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows2016-03-02Paper
Improved Cryptanalysis of the Block Cipher KASUMI2015-12-04Paper
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE2015-10-01Paper
Ciphers for MPC and FHE2015-09-30Paper
Linear Distinguishers in the Key-less Setting: Application to PRESENT2015-09-18Paper
State-Recovery Analysis of Spritz2015-09-17Paper
Practical Attacks on AES-like Cryptographic Hash Functions2015-09-17Paper
The rebound attack and subspace distinguishers: application to Whirlpool2015-05-12Paper
Rotational rebound attacks on reduced Skein2014-09-25Paper
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis2013-06-04Paper
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications2013-03-19Paper
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family2013-01-08Paper
Narrow-Bicliques: Cryptanalysis of Full IDEA2012-06-29Paper
Biclique Cryptanalysis of the Full AES2011-12-02Paper
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)2011-07-07Paper
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN2011-03-15Paper
Rotational Rebound Attacks on Reduced Skein2010-12-07Paper
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-22010-12-07Paper
Second-Preimage Analysis of Reduced SHA-12010-10-25Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-5122010-05-04Paper
Rebound Attacks on the Reduced Grøstl Hash Function2010-03-16Paper
Rebound Distinguishers: Results on the Full Whirlpool Compression Function2009-12-15Paper
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners2009-12-15Paper
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher2009-12-09Paper
Collisions and Other Non-random Properties for Step-Reduced SHA-2562009-11-03Paper
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl2009-08-11Paper
Cryptanalysis of Vortex2009-07-07Paper
Cryptanalysis of MDC-22009-05-12Paper
Analysis of Step-Reduced SHA-2562009-04-02Paper
The Impact of Carries on the Complexity of Collision Attacks on SHA-12009-04-02Paper
Analysis of the Hash Function Design Strategy Called SMASH2009-02-24Paper
Cryptanalysis of the GOST Hash Function2009-02-10Paper
Preimages for Reduced SHA-0 and SHA-12009-02-10Paper
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-2562009-01-22Paper
Threshold Implementations Against Side-Channel Attacks and Glitches2008-11-11Paper
A (Second) Preimage Attack on the GOST Hash Function2008-09-18Paper
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba2008-09-18Paper
The Grindahl Hash Functions2008-09-16Paper
On the Collision Resistance of RIPEMD-1602008-06-17Paper
Correlated Keystreams in Moustique2008-06-13Paper
Improved Collision Attack on the Hash Function Proposed at PKC’982008-05-06Paper
Finding SHA-1 Characteristics: General Results and Applications2008-04-24Paper
Second Preimages for SMASH2008-04-17Paper
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search2008-03-25Paper
On Authentication with HMAC and Non-random Properties2008-03-07Paper
Breaking a New Hash Function Design Strategy Called SMASH2007-11-15Paper
Impact of Rotations in SHA-1 and Related Hash Functions2007-11-15Paper
Cryptography and Coding2006-11-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Christian Rechberger