Maria Eichlseder

From MaRDI portal
(Redirected from Person:778913)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT2024-12-13Paper
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions2024-11-12Paper
\(L^*\)-based learning of Markov decision processes2024-03-14Paper
Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
An algebraic attack on ciphers with low-degree round functions: application to full MiMC2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Information-combining differential fault attacks on DEFAULT2022-08-30Paper
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers2022-07-06Paper
Practical key recovery attacks on FlexAEAD
Designs, Codes and Cryptography
2022-03-31Paper
PRINCEv2. More security for (almost) no overhead2022-03-25Paper
\(L^\ast\)-based learning of Markov decision processes (extended version)
Formal Aspects of Computing
2021-09-14Paper
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
Journal of Cryptology
2021-08-10Paper
Algebraic cryptanalysis of variants of \textsc{Frit}2020-07-21Paper
Forgery attacks on FlexAE and FlexAEAD2020-05-06Paper
Statistical ineffective fault attacks on masked AES with fault countermeasures2019-01-23Paper
Cryptanalysis of MORUS
Lecture Notes in Computer Science
2019-01-23Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Analysis of the Kupyna-256 Hash Function
Fast Software Encryption
2018-05-09Paper
Cryptanalysis of Simpira v12018-02-16Paper
Statistical fault attacks on nonce-based authenticated encryption schemes
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Square attack on 7-round Kiasu-BC
Applied Cryptography and Network Security
2016-10-04Paper
Higher-Order Cryptanalysis of LowMC
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Forgery Attacks on Round-Reduced ICEPOLE-128
Lecture Notes in Computer Science
2016-05-19Paper
Malicious hashing: Eve's variant of SHA-1
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Analysis of SHA-512/224 and SHA-512/256
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Cryptanalysis of Ascon
Lecture Notes in Computer Science
2016-03-02Paper
Related-Key Forgeries for Prøst-OTR
Fast Software Encryption
2015-09-18Paper
Branching heuristics in differential collision search with applications to SHA-512
Fast Software Encryption
2015-09-18Paper
Key recovery attacks on recent authenticated ciphers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper


Research outcomes over time


This page was built for person: Maria Eichlseder