Maria Eichlseder

Maria Eichlseder

Ass.Prof. Dipl.-Ing. Dr.techn., BSc BSc

1995 …2024

Research activity per year

Filter
Conference paper

Search results

  • Algebraic Cryptanalysis of Variants of Frit

    Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 10 Jan 2020, Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers. Paterson, K. G. & Stebila, D. (eds.). Springer, p. 149-170 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11959 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC

    Eichlseder, M., Grassi, L., Lüftenegger, R., Øygarden, M., Rechberger, C., Schofnegger, M. & Wang, Q., 1 Jan 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part . Moriai, S. & Wang, H. (eds.). Cham: Springer, Vol. 1. p. 477-506 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12491 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Analysis of SHA-512/224 and SHA-512/256

    Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Advances in Cryptology - ASIACRYPT 2015. Springer, Vol. 9453. p. 612-630 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Analysis of the Kupyna-256 Hash Function

    Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2016, Fast Software Encryption. Peyrin, T. (ed.). Springer, (LNCS; vol. 9783).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Ascon PRF, MAC, and Short-Input MAC: Lightweight, Fast, and Efficient Pseudorandom Functions

    Dobraunig, C. E., Eichlseder, M., Mendel, F. & Schläffer, M., 2024, Topics in Cryptology - CT-RSA 2024. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges

    Hadipour, H. & Eichlseder, M., 2022, Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings. Ateniese, G. & Venturi, D. (eds.). Cham: Springer, p. 230-250 21 p. (Lecture Notes in Computer Science; vol. 13269 ).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Branching Heuristics in Differential Collision Search with Applications to SHA-512

    Eichlseder, M., Mendel, F. & Schläffer, M., 2014, Fast Software Encryption. Springer, Vol. 8540. p. 473-488 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers

    Eichlseder, M., Leander, G. & Rasoolzadeh, S., 2020, Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer, Cham, p. 345-369 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Cryptanalysis of Ascon

    Dobraunig, C. E., Eichlseder, M., Mendel, F. & Schläffer, M., 2015, Topics in Cryptology - CT-RSA 2015. Cham: Springer, p. 371-387 (Lecture Notes in Computer Science; vol. 9048).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Cryptanalysis of MORUS

    Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y. & Viguier, B., 2018, Advances in Cryptology – ASIACRYPT 2018. Springer, p. 35-64 (Lecture Notes in Computer Science; vol. 11273).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Cryptanalysis of Simpira v1

    Eichlseder, M., Dobraunig, C. E. & Mendel, F., 2017, Selected Areas in Cryptography - SAC 2016. Avanzi, R. & Heys, H. (eds.). Springer, p. 284-298 (Lecture Notes in Computer Science; vol. 10532).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer

    Juffinger, J., Lamster, L. A., Kogler, A., Eichlseder, M., Lipp, M. & Gruss, D., 2023, 44th IEEE Symposium on Security and Privacy .

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
  • Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks

    Hadipour, H., Sadeghi, S. & Eichlseder, M., 4 Sept 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 128-157 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Forgery Attacks on FlexAE and FlexAEAD

    Eichlseder, M., Kales, D. & Schofnegger, M., Nov 2019, Cryptography and Coding - IMACC 2019. Springer, Cham, p. 200-214 15 p. (Lecture Notes in Computer Science; vol. 11929).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Forgery Attacks on round-reduced ICEPOLE-128

    Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Selected Areas in Cryptography- SAC 2015. Cham: Springer, p. 479-492 (Lecture Notes in Computer Science; vol. 9566).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates

    Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Advances in Cryptology - ASIACRYPT 2015. Cham: Springer, p. 490-509 ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Higher-Order Cryptanalysis of LowMC

    Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Information Security and Cryptology - ICISC 2015. Springer, p. 87-101 (LNCS; vol. 9558).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Information-Combining Differential Fault Attacks on DEFAULT

    Nageler, M., Dobraunig, C. E. & Eichlseder, M., May 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 168-191 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Key Recovery Attacks on Recent Authenticated Ciphers

    Bogdanov, A., Dobraunig, C. E., Eichlseder, M., Lauridsen, M., Mendel, F., Schläffer, M. & Tischhauser, E., 2014, Progress in Cryptology - LATINCRYPT 2014. Springer, Vol. 8895. p. 274-287 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • L*-Based Learning of Markov Decision Processes

    Tappler, M., Aichernig, B., Bacci, G., Eichlseder, M. & Larsen, K. G., 2019, Formal Methods - The Next 30 Years . ter Beek, M. H., McIver, A. & Oliveria, J. N. (eds.). Cham: Springer, p. 651 - 669 19 p. (Lecture Notes in Computer Science; vol. 11800).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Linear Propagation in Efficient Guess-and-Determine Attacks

    Eichlseder, M., Mendel, F., Nad, T., Rijmen, V. & Schläffer, M., 2013, International Workshop on Coding and Cryptography. ., p. 193-202

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Malicious Hashing: Eve's Variant of SHA-1

    Albertini, A., Aumasson, J-P., Eichlseder, M., Mendel, F. & Schläffer, M., 2014, Selected Areas in Cryptography. Joux, A. (ed.). Springer, Vol. 8781. p. 1-19 (Lecture Notes in Computer Science; vol. 8781).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks

    Dobraunig, C. E., Eichlseder, M., Mangard, S. & Mendel, F., 2014, Smart Card Research and Advanced Applications - CARDIS 2014. Cham: Springer, p. 233-244 ( Lecture Notes in Computer Science; vol. 8968).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

    Beyne, T., Canteaut, A., Dinur, I., Eichlseder, M., Leander, G., Leurent, G., Naya-Plasencia, M., Sasaki, Y., Todo, Y. & Wiemer, F., 1 Jan 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 299-328 30 p. (Lecture Notes in Computer Science; vol. 12172).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • PRINCEv2 - More Security for (Almost) No Overhead

    Božilov, D., Eichlseder, M., Knezevic, M., Lambin, B., Leander, G., Moos, T., Nikov, V., Rasoolzadeh, S., Todo, Y. & Wiemer, F., 2021, Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O'Flynn, C. (eds.). Cham: Springer, p. 483-511 29 p. (Lecture Notes in Computer Science; vol. 12804).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

    Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C., 2018, Advances in Cryptology – CRYPTO 2018. Springer, p. 662-692 (Lecture Notes in Computer Science; vol. 10991).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Related-Key Forgeries for Proest-OTR

    Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2015, Fast Software Encryption - FSE 2015. Cham: Springer, p. 282-296 (Lecture Notes in Computer Science(; vol. 9054).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks

    Giner, L., Steinegger, S., Purnal, A., Eichlseder, M., Unterluggauer, T., Mangard, S. & Gruss, D., Jul 2023, 2023 IEEE Symposium on Security and Privacy (SP). p. 2273-2287 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Side-Channel Analysis of Keymill

    Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F., 2017, Constructive Side-Channel Analysis and Secure Design: COSADE 2017. p. 138-152 (Lecture Notes in Computer Science; vol. 10348).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Square Attack on 7-Round Kiasu-BC

    Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2016, ACNS 2016. Manulis, M. & Sadeghi, A-R. (eds.). Springer, (LNCS; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes

    Dobraunig, C. E., Eichlseder, M., Korak, T., Lomné, V. & Mendel, F., 2016, Advances in Cryptology - ASIACRYPT 2016. Cheon, J. H. & Takagi, T. (eds.). Springer, Vol. 1. p. 369-395 (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
  • Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

    Dobraunig, C. E., Eichlseder, M., Groß, H., Mangard, S., Mendel, F. & Primas, R., 2018, Advances in Cryptology – ASIACRYPT 2018. Springer, p. 315-342 (Lecture Notes in Computer Science; vol. 11273).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access