Christian Rechberger

Univ.-Prof. Dipl.-Ing. Dr.techn.

1995 …2030
If you made any changes in Pure these will be visible here soon.

Research Output 2002 2019

2019

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 15 Aug 2019, (Accepted/In press) ASIACRYPT 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Polynomials
Hash functions

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 21 Jun 2019, (Accepted/In press) ESORICS 2019. 54 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Throughput

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 343-372 30 p. (Lecture Notes in Computer Science; vol. 11476).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, p. 1447-1464

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography
Substitution reactions
Data transfer
Throughput
Concretes
Bandwidth

Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems

Grassi, L., Kales, D., Khovratovich, D., Roy, A., Rechberger, C. & Schofnegger, M., 6 May 2019.

Research output: Working paperResearch

Hash functions
Concretes
2018

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, M., 2018, 291 p.

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C., 2018, Advances in Cryptology – CRYPTO 2018. Springer, p. 662-692 (Lecture Notes in Computer Science; vol. 10991).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Zero-Sum Partitions of PHOTON Permutations

Wang, Q., Grassi, L. & Rechberger, C., 2018, Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. p. 279-299 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2017

A new structural-differential property of 5-round AES

Grassi, L., Rechberger, C. & Rønjom, S., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag Wien, Vol. 10211 LNCS. p. 289-317 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Structural properties
Data storage equipment
Costs
Random Permutation
Block Cipher

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2016

Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications

Kölbl, S., Lauridsen, M., Mendel, F. & Rechberger, C., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

Albrecht, M. R., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. p. 191-219 29 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

MPC-Friendly Symmetric Key Primitives

Grassi, L., Rechberger, C., Rotaru, D., Scholl, P. & Smart, N. P., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. p. 430-443 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE

Grassi, L. & Rechberger, C., 2016, Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Dunkelman, O. & Sanadhya, S. K. (eds.). Cham: Springer International Publishing AG , p. 322-342 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Signatures on Equivalence Classes: A New Tool for Privacy-Enhancing Cryptography

Hanser, C., Feb 2016, 191 p.

Research output: ThesisDoctoral ThesisResearch

Equivalence classes
Cryptography
Data privacy
Electronic document identification systems
Communication

Subspace Trail Cryptanalysis and its Applications to AES

Grassi, L., Rechberger, C. & Rønjom, S., 2016, FSE 2017 - 24th International Conference on Fast Software Encryption. Vol. 2016. p. 592 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2010

Rebound Attacks on the Reduced Grøstl Hash Function

Mendel, F., Rechberger, C., Schläffer, M. & Thomsen, S. S., 2010, Topics in Cryptology - CT-RSA 2010. Springer, Vol. 5985. p. 350-365 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2009

Aktuelle Entwicklungen bei Hashfunktionen

Illies, G. & Rechberger, C., 14 May 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Cryptanalysis of Hash Functions

Rechberger, C., 2009

Research output: ThesisDoctoral ThesisResearch

Cryptanalysis of MDC-2

Knudsen, L. R., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Advances in Cryptology - EUROCRYPT 2009. Springer, Vol. 5479. p. 106-120 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of Twister

Mendel, F., Rechberger, C. & Schläffer, M., 2009, Applied Cryptography and Network Security. Springer, Vol. 5536. p. 342-353 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of Vortex

Aumasson, J-P., Dunkelman, O., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Progress in Cryptology - AFRICACRYPT 2009. Springer, Vol. 5580. p. 14-28 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

Mendel, F., Peyrin, T., Rechberger, C. & Schläffer, M., 2009, Selected Areas in Cryptography. Springer, Vol. 5867. p. 16-35 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

MD5 is Weaker than Weak: Attacks on Concatenated Combiners

Mendel, F., Rechberger, C. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Matsui, M. (ed.). Springer, Vol. 5912. p. 144-161 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Rebound Distinguishers: Results on the Full Whirlpool Compression Function

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Springer, Vol. 5912. p. 126-143 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

Mendel, F., Rechberger, C., Schläffer, M. & Thomsen, S. S., 2009, Fast Software Encryption. Berlin: Springer, Vol. 5665. p. 260-276 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?

Rechberger, C., 2009, (Accepted/In press) Tagungsband 11. Deutscher IT-Sicherheitskongress. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2008

A (Second) Preimage Attack on the GOST Hash Function

Mendel, F., Pramstaller, N. & Rechberger, C., 2008, Fast Software Encryption. Springer, Vol. 5086. p. 224-234 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Analysis of the Hash Function Design Strategy called SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2008, In : IEEE transactions on information theory. 54, 8, p. 3647-3655

Research output: Contribution to journalArticleResearchpeer-review

Collisions and other Non-Random Properties for Step-Reduced SHA-256

Indesteege, S., Mendel, F., Preneel, B. & Rechberger, C., 2008, Selected Areas in Cryptography. Avanzi, R., Keliher, L. & Sica, F. (eds.). Springer, Vol. 5381. p. 276-293 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Correlated Keystreams in MOUSTIQUE

Käsper, E., Rijmen, V., Bjørstad, T. E., Rechberger, C., Robshaw, M. & Sekar, G., 2008, Progress in Cryptology – AFRICACRYPT 2008. Springer, Vol. 5023. p. 246-257 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of the GOST Hash Function

Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M. & Szmidt, J., 2008, Advances in Cryptology - CRYPTO 2008. Lin, D. (ed.). Springer, Vol. 5157. p. 162-178 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

European cryptologists attack hash functions

Rechberger, C., 2008

Research output: Non-print formWebsite / Web publicationResearch

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba

Aumasson, J-P., Fischer, S., Khazaei, S., Meier, W. & Rechberger, C., 2008, Fast Software Encryption Workshop. Springer, Vol. 5084. p. 470-488

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

New Results on NMAC/HMAC when Instantiated with Popular Hash Functions

Rechberger, C. & Rijmen, V., 2008, In : Journal of Universal Computer Science . 14, 3, p. 347-376

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Ongoing Research Areas in Symmetric Cryptography (D.STVL.9)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

Österreichische Kryptologen attackieren Hash-Funktionen

Rechberger, C., 2008

Research output: Non-print formWebsite / Web publicationResearch

Preimages for Reduced SHA-0 and SHA-1

De Cannière, C. & Rechberger, C., 2008, Advances in Cryptology - CRYPTO 2008. Springer, Vol. 5157. p. 179-202 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Searching for messages conforming to arbitrary sets of conditions in SHA-256

Hölbl, M., Rechberger, C. & Welzer, T., 2008, Proceedings of Western European Workshop on Research in Cryptology. Springer, Vol. 4945. p. 28-38 (Lecture notes in computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2007

Collisions for 70-step SHA-1: On the Full Cost of Collision Search

De Cannière, C., Mendel, F. & Rechberger, C., 2007, Selected Areas in Cryptography. Adams, C., Miri, A. & Wiener, M. (eds.). Springer, Vol. 4876. p. 56-73 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Current Status of SHA-1

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, .

Research output: Book/ReportOther reportResearch

Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints

Großschädl, J., Tillich, S., Rechberger, C., Hofmann, M. & Medwed, M., 2007, Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007). Association of Computing Machinery, p. 1110-1115

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On Authentication With HMAC and Non-Rondom Properties

Rechberger, C. & Rijmen, V., 2007, Financial Cryptography 2007. Springer, Vol. 4886. p. 119-113 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Second Preimages for SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, Cryptographers´ Track at the RSA Conference. ., Vol. 4377. p. 101-111 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Secure enough? Re-assessment of the world’s most-used hash function

Mendel, F., Rechberger, C. & Rijmen, V., 2007

Research output: Non-print formWebsite / Web publicationResearch

The Grindahl hash functions

Knudsen, L. R., Rechberger, C. & Thomsen, S. S., 2007, Fast Software Encryption (FSE) 2007. Biryukov, A. (ed.). Springer, Vol. 4593. p. 39-57 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

The SHA Family of Hash Functions: Recent Results

Rechberger, C. & Rijmen, V., 2007, Proceedings of Security and Protection of Information 2007. ., p. 107-114

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

2006

A Case Against Currently Used Hash Functions in RFID Protocols

Feldhofer, M. & Rechberger, C., 2006, On the Move to Meaningful Internet Systems 2006. Meersman, R., Tari, Z. & Herrero, P. (eds.). Berlin [u.a.]: Springer, Vol. 4277. p. 372-381 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review