Available identifiers
zbMath Open eichlseder.maria MaRDI QID Q778913
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv . We are working on additional sources - please check back here soon!
Publication Date of Publication Type Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT 2024-12-13 Paper \textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions 2024-11-12 Paper \(L^*\)-based learning of Markov decision processes 2024-03-14 Paper Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks 2023-12-08 Paper An algebraic attack on ciphers with low-degree round functions: application to full MiMC 2023-03-21 Paper Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems 2022-12-07 Paper Information-combining differential fault attacks on DEFAULT 2022-08-30 Paper Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers 2022-07-06 Paper Practical key recovery attacks on FlexAEAD 2022-03-31 Paper PRINCEv2. More security for (almost) no overhead 2022-03-25 Paper \(L^\ast\)-based learning of Markov decision processes (extended version) 2021-09-14 Paper \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing 2021-08-10 Paper Algebraic cryptanalysis of variants of \textsc{Frit} 2020-07-21 Paper Forgery attacks on FlexAE and FlexAEAD 2020-05-06 Paper Statistical ineffective fault attacks on masked AES with fault countermeasures 2019-01-23 Paper Cryptanalysis of MORUS 2019-01-23 Paper Rasta: a cipher with low ANDdepth and few ANDs per bit 2018-09-12 Paper Analysis of the Kupyna-256 Hash Function 2018-05-09 Paper Cryptanalysis of Simpira v1 2018-02-16 Paper Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes 2017-02-01 Paper Square Attack on 7-Round Kiasu-BC 2016-10-04 Paper Higher-Order Cryptanalysis of LowMC 2016-05-19 Paper Forgery Attacks on Round-Reduced ICEPOLE-128 2016-05-19 Paper Malicious Hashing: Eve’s Variant of SHA-1 2016-04-13 Paper Analysis of SHA-512/224 and SHA-512/256 2016-03-23 Paper Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates 2016-03-23 Paper Cryptanalysis of Ascon 2016-03-02 Paper Related-Key Forgeries for Prøst-OTR 2015-09-18 Paper Branching Heuristics in Differential Collision Search with Applications to SHA-512 2015-09-18 Paper Key Recovery Attacks on Recent Authenticated Ciphers 2015-09-17 Paper
Research outcomes over time
This page was built for person: Maria Eichlseder