The following pages link to Maria Eichlseder (Q778913):
Displaying 29 items.
- Algebraic cryptanalysis of variants of \textsc{Frit} (Q778915) (← links)
- PRINCEv2. More security for (almost) no overhead (Q832374) (← links)
- Rasta: a cipher with low ANDdepth and few ANDs per bit (Q1673415) (← links)
- Cryptanalysis of Simpira v1 (Q1698642) (← links)
- Statistical ineffective fault attacks on masked AES with fault countermeasures (Q1710602) (← links)
- \(L^\ast\)-based learning of Markov decision processes (extended version) (Q1982638) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- Practical key recovery attacks on FlexAEAD (Q2119949) (← links)
- Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers (Q2152038) (← links)
- Information-combining differential fault attacks on DEFAULT (Q2170087) (← links)
- Forgery attacks on FlexAE and FlexAEAD (Q2177660) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates (Q2795987) (← links)
- Analysis of SHA-512/224 and SHA-512/256 (Q2795992) (← links)
- Malicious Hashing: Eve’s Variant of SHA-1 (Q2798600) (← links)
- Higher-Order Cryptanalysis of LowMC (Q2806764) (← links)
- Forgery Attacks on Round-Reduced ICEPOLE-128 (Q2807228) (← links)
- Square Attack on 7-Round Kiasu-BC (Q2822691) (← links)
- Key Recovery Attacks on Recent Authenticated Ciphers (Q2946480) (← links)
- Branching Heuristics in Differential Collision Search with Applications to SHA-512 (Q2946924) (← links)
- Related-Key Forgeries for Prøst-OTR (Q2946947) (← links)
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes (Q2958130) (← links)
- Analysis of the Kupyna-256 Hash Function (Q4639499) (← links)
- Cryptanalysis of MORUS (Q5915904) (← links)
- \(L^*\)-based learning of Markov decision processes (Q6535974) (← links)
- \textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions (Q6636119) (← links)
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT (Q6652909) (← links)