EU - ECRYPT II - European network of excellence in cryptology - Phase II

  • Schmidt, Jörn-Marc (Co-Investigator (CoI))
  • Nad, Tomislav (Co-Investigator (CoI))
  • Kirschbaum, Mario (Co-Investigator (CoI))
  • Feldhofer, Martin (Co-Investigator (CoI))
  • Schläffer, Martin (Co-Investigator (CoI))
  • Aigner, Manfred Josef (Co-Investigator (CoI))
  • Rechberger, Christian (Co-Investigator (CoI))
  • Lamberger, Mario (Co-Investigator (CoI))
  • Tillich, Stefan (Co-Investigator (CoI))
  • Medwed, Marcel (Co-Investigator (CoI))
  • Hutter, Michael (Co-Investigator (CoI))
  • Rijmen, Vincent (Co-Investigator (CoI))
  • Mendel, Florian (Co-Investigator (CoI))
  • Posch, Reinhard (Principal Investigator (PI))

Project: Research project

Filter
Conference paper

Search results

  • 2009

    Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

    Lamberger, M. & Mendel, F., 2009, Information Security: 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings. Samarati, P., Yung, M., Martinelli, F. & Ardagna, C. A. (eds.). Berlin; Heidelberg: Springer, p. 68-78 (Lecture Notes in Computer Science; vol. 5735).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

    Mendel, F., Rechberger, C., Schläffer, M. & Thomsen, S. S., 2009, Fast Software Encryption. FSE 2009. Berlin; Heidelberg: Springer, p. 260-276 (Lecture Notes in Computer Science; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Two Passes of Tiger are not One-Way

    Mendel, F., 2009, Progress in Cryptology - AFRICACRYPT 2009. Berlin; Heidelberg: Springer, p. 29-40 (Lecture Notes in Computer Science; vol. 5580).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?

    Rechberger, C., 2009, (Accepted/In press) Tagungsband 11. Deutscher IT-Sicherheitskongress. .

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2008

    Secure Hardware Implementations of Non-Linear Functions in the Presence of Glitches

    Nikova, S., Rijmen, V. & Schläffer, M., 2008, Information Security and Cryptology – ICISC 2008. Lee, P. J. & Cheon, J. H. (eds.). Berlin; Heidelberg: Springer, p. 218-234 (Lecture Notes in Computer Science,; vol. 5461).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File