Maria Eichlseder

From MaRDI portal
Person:778913

Available identifiers

zbMath Open eichlseder.mariaMaRDI QIDQ778913

List of research outcomes





PublicationDate of PublicationType
Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT2024-12-13Paper
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions2024-11-12Paper
\(L^*\)-based learning of Markov decision processes2024-03-14Paper
Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks2023-12-08Paper
An algebraic attack on ciphers with low-degree round functions: application to full MiMC2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Information-combining differential fault attacks on DEFAULT2022-08-30Paper
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers2022-07-06Paper
Practical key recovery attacks on FlexAEAD2022-03-31Paper
PRINCEv2. More security for (almost) no overhead2022-03-25Paper
\(L^\ast\)-based learning of Markov decision processes (extended version)2021-09-14Paper
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing2021-08-10Paper
Algebraic cryptanalysis of variants of \textsc{Frit}2020-07-21Paper
Forgery attacks on FlexAE and FlexAEAD2020-05-06Paper
Statistical ineffective fault attacks on masked AES with fault countermeasures2019-01-23Paper
Cryptanalysis of MORUS2019-01-23Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Analysis of the Kupyna-256 Hash Function2018-05-09Paper
Cryptanalysis of Simpira v12018-02-16Paper
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes2017-02-01Paper
Square Attack on 7-Round Kiasu-BC2016-10-04Paper
Higher-Order Cryptanalysis of LowMC2016-05-19Paper
Forgery Attacks on Round-Reduced ICEPOLE-1282016-05-19Paper
Malicious Hashing: Eve’s Variant of SHA-12016-04-13Paper
Analysis of SHA-512/224 and SHA-512/2562016-03-23Paper
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates2016-03-23Paper
Cryptanalysis of Ascon2016-03-02Paper
Related-Key Forgeries for Prøst-OTR2015-09-18Paper
Branching Heuristics in Differential Collision Search with Applications to SHA-5122015-09-18Paper
Key Recovery Attacks on Recent Authenticated Ciphers2015-09-17Paper

Research outcomes over time

This page was built for person: Maria Eichlseder