EU - ECRYPT II - European network of excellence in cryptology - Phase II

  • Schmidt, Jörn-Marc (Co-Investigator (CoI))
  • Nad, Tomislav (Co-Investigator (CoI))
  • Kirschbaum, Mario (Co-Investigator (CoI))
  • Feldhofer, Martin (Co-Investigator (CoI))
  • Schläffer, Martin (Co-Investigator (CoI))
  • Aigner, Manfred Josef (Co-Investigator (CoI))
  • Rechberger, Christian (Co-Investigator (CoI))
  • Lamberger, Mario (Co-Investigator (CoI))
  • Tillich, Stefan (Co-Investigator (CoI))
  • Medwed, Marcel (Co-Investigator (CoI))
  • Hutter, Michael (Co-Investigator (CoI))
  • Rijmen, Vincent (Co-Investigator (CoI))
  • Mendel, Florian (Co-Investigator (CoI))
  • Posch, Reinhard (Principal Investigator (PI))

Project: Research project

Search results

  • 2009

    MD5 is Weaker than Weak: Attacks on Concatenated Combiners

    Mendel, F., Rechberger, C. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Matsui, M. (ed.). Berlin; Heidelberg: Springer, p. 144-161 (Lecture Notes in Computer Science; vol. 5912).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • On Free-Start Collisions and Collisions for TIB3

    Mendel, F. & Schläffer, M., 2009, Information Security. ISC 2009. Samarati, P., Yung, M., Martinelli, F. & Ardagna, C. A. (eds.). Berlin; Heidelberg: Springer, p. 95-106 (Lecture Notes in Computer Science; vol. 5735).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Practical Collisions for SHAMATA-256

    Indesteege, S., Mendel, F., Preneel, B. & Schläffer, M., 2009, Selected Areas in Cryptography. Jacobson, M. J., Rijmen, V. & Safavi-Naini, R. (eds.). Springer, p. 1-15 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5867 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
  • Rebound Attack on the Full LANE Compression Function

    Matusiewicz, K., Naya-Plasencia, M., Ivica, N., Sasaki, Y. & Schläffer, M., 2009, Advances in Cryptology – ASIACRYPT 2009. Berlin; Heidelberg: Springer, p. 106-125 (Lecture Notes in Computer Science; vol. 5912).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Rebound Distinguishers: Results on the Full Whirlpool Compression Function

    Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings. Berlin; Heidelberg: Springer, p. 126-143 (Lecture Notes in Computer Science; vol. 5912).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

    Lamberger, M. & Mendel, F., 2009, Information Security: 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings. Samarati, P., Yung, M., Martinelli, F. & Ardagna, C. A. (eds.). Berlin; Heidelberg: Springer, p. 68-78 (Lecture Notes in Computer Science; vol. 5735).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

    Mendel, F., Rechberger, C., Schläffer, M. & Thomsen, S. S., 2009, Fast Software Encryption. FSE 2009. Berlin; Heidelberg: Springer, p. 260-276 (Lecture Notes in Computer Science; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Two Passes of Tiger are not One-Way

    Mendel, F., 2009, Progress in Cryptology - AFRICACRYPT 2009. Berlin; Heidelberg: Springer, p. 29-40 (Lecture Notes in Computer Science; vol. 5580).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?

    Rechberger, C., 2009, (Accepted/In press) Tagungsband 11. Deutscher IT-Sicherheitskongress. .

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2008

    Secure Hardware Implementations of Non-Linear Functions in the Presence of Glitches

    Nikova, S., Rijmen, V. & Schläffer, M., 2008, Information Security and Cryptology – ICISC 2008. Lee, P. J. & Cheon, J. H. (eds.). Berlin; Heidelberg: Springer, p. 218-234 (Lecture Notes in Computer Science,; vol. 5461).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File