Christian Rechberger

Univ.-Prof. Dipl.-Ing. Dr.techn.

1995 …2030
If you made any changes in Pure these will be visible here soon.

Research Output 2002 2019

2002

Low-cost AES

Rechberger, C., Popp, T. & Tillich, S., 2002, Proceedings of Austrochip 2002, October 4, 2002, Graz, Austria. ., p. 131-136

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2004

Practical Template Attacks

Rechberger, C. & Oswald, M. E., 2004, Information Security Applications. Lim, C. H. & Yung, M. (eds.). Berlin: Springer, Vol. 3325. p. 440-456 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Security of IEEE 802.11 considering Power and EM Side-Channel Information

Rechberger, C. & Oswald, M. E., 2004, International Conference on Computing, Communications and Control Technologies (CCCT 2004). ., p. 129-133

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Side-Channel Analysis of Stream Ciphers

Rechberger, C., 2004

Research output: ThesisDiploma ThesisResearch

Stream Ciphers and Side-Channel Analysis

Rechberger, C. & Oswald, M. E., 2004, SASC - The State of the Art of Stream Ciphers. ., p. 320-326

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

Analysis of simplified variants of SHA-256

Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468). Deutschland: Gesellschaft für Informatik , p. 123-134

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Breaking a new Hash Function Design Strategy called SMASH

Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, (Submitted) Selected Areas in Cryptography. Preneel, B. & Tavares, S. (eds.). Springer, (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Exploiting Coding Theory for Collision Attacks on SHA-1

Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, 10th IMA International Conference on Cryptography and Coding. Smart, N. P. (ed.). ., Vol. 3796. p. 78-95 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Impact of Rotations in SHA-1 and Related Hash Functions

Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, Selected Areas in Cryptography. Preneel, B. & Tavares, S. (eds.). Springer, p. 261-275 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Interoperable Certification Authorities in the European Union - A Practical Solution

Hayat, A. & Rechberger, C., 2005, EGOV05 - International Conference on E-Government. ., p. 374-381

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Recent results on SHA-1 and SHA-256

Rechberger, C. & Rijmen, V., 2005, Proceedings of Santa's Crypto Get-together 2005. ., p. 51-58

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

2006

A Case Against Currently Used Hash Functions in RFID Protocols

Feldhofer, M. & Rechberger, C., 2006, On the Move to Meaningful Internet Systems 2006. Meersman, R., Tari, Z. & Herrero, P. (eds.). Berlin [u.a.]: Springer, Vol. 4277. p. 372-381 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Case Against Currently Used Hash Functions in RFID Protocols

Feldhofer, M. & Rechberger, C., 2006, Workshop on RFID Security 2006. Meersman, R., Tari, Z. & Herrero, P. (eds.). ., p. 109-122

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Compact FPGA Implementation of the Hash Function Whirlpool

Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. Association of Computing Machinery, p. 159-166

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analysis of Step-Reduced SHA-256

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Fast Software Encryption. Robshaw, M. (ed.). Springer, Vol. 4047. p. 126-143 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

D.VAM11 -- Suggested Algorithms for Light-Weight Cryptography

Aigner, M. J., Dominikus, S., Feldhofer, M., Rechberger, C. & Oswald, M. E., 2006, . (ECRYPT Deliverable)

Research output: Book/ReportOther reportResearch

Finding SHA-1 Characteristics: General Results and Applications

De Cannière, C. & Rechberger, C., 2006, Advances in Cryptology - Asiacrypt 2006. Springer, Vol. 4284. p. 1-20 (Lecture notes in computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Improved Collision-Attack on the Hash Function Proposed at PKC'98

Mendel, F., Pramstaller, N. & Rechberger, C., 2006, Information Security and Cryptology – ICISC 2006. Rhee, M. S. & Lee, B. (eds.). Springer, Vol. 4296. p. 8-21 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On the Collision Resistance of RIPEMD-160

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Information Security. Katsikas, S. K. (ed.). Springer, Vol. 4176. p. 101-116 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The Impact of Carries on the Complexity of Collision Attacks on SHA-1

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Fast Software Encryption. Robshaw, M. (ed.). Springer, p. 278-292 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The NIST Cryptographic Workshop on Hash Functions

Rechberger, C., Rijmen, V. & Sklavos, N., 2006, In : IEEE security & privacy. 4, 1, p. 54-56

Research output: Contribution to journalArticleResearchpeer-review

Threshold Implementations Against Side-Channel Attacks and Glitches

Nikova, S., Rechberger, C. & Rijmen, V., 2006, Information and Communications Security. Ning, P., Qing, S. & Li, N. (eds.). Springer, Vol. 4307. p. 529-545 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2007

Collisions for 70-step SHA-1: On the Full Cost of Collision Search

De Cannière, C., Mendel, F. & Rechberger, C., 2007, Selected Areas in Cryptography. Adams, C., Miri, A. & Wiener, M. (eds.). Springer, Vol. 4876. p. 56-73 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Current Status of SHA-1

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, .

Research output: Book/ReportOther reportResearch

Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints

Großschädl, J., Tillich, S., Rechberger, C., Hofmann, M. & Medwed, M., 2007, Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007). Association of Computing Machinery, p. 1110-1115

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On Authentication With HMAC and Non-Rondom Properties

Rechberger, C. & Rijmen, V., 2007, Financial Cryptography 2007. Springer, Vol. 4886. p. 119-113 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Second Preimages for SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, Cryptographers´ Track at the RSA Conference. ., Vol. 4377. p. 101-111 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Secure enough? Re-assessment of the world’s most-used hash function

Mendel, F., Rechberger, C. & Rijmen, V., 2007

Research output: Non-print formWebsite / Web publicationResearch

The Grindahl hash functions

Knudsen, L. R., Rechberger, C. & Thomsen, S. S., 2007, Fast Software Encryption (FSE) 2007. Biryukov, A. (ed.). Springer, Vol. 4593. p. 39-57 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

The SHA Family of Hash Functions: Recent Results

Rechberger, C. & Rijmen, V., 2007, Proceedings of Security and Protection of Information 2007. ., p. 107-114

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

2008

A (Second) Preimage Attack on the GOST Hash Function

Mendel, F., Pramstaller, N. & Rechberger, C., 2008, Fast Software Encryption. Springer, Vol. 5086. p. 224-234 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Analysis of the Hash Function Design Strategy called SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2008, In : IEEE transactions on information theory. 54, 8, p. 3647-3655

Research output: Contribution to journalArticleResearchpeer-review

Collisions and other Non-Random Properties for Step-Reduced SHA-256

Indesteege, S., Mendel, F., Preneel, B. & Rechberger, C., 2008, Selected Areas in Cryptography. Avanzi, R., Keliher, L. & Sica, F. (eds.). Springer, Vol. 5381. p. 276-293 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Correlated Keystreams in MOUSTIQUE

Käsper, E., Rijmen, V., Bjørstad, T. E., Rechberger, C., Robshaw, M. & Sekar, G., 2008, Progress in Cryptology – AFRICACRYPT 2008. Springer, Vol. 5023. p. 246-257 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of the GOST Hash Function

Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M. & Szmidt, J., 2008, Advances in Cryptology - CRYPTO 2008. Lin, D. (ed.). Springer, Vol. 5157. p. 162-178 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

European cryptologists attack hash functions

Rechberger, C., 2008

Research output: Non-print formWebsite / Web publicationResearch

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba

Aumasson, J-P., Fischer, S., Khazaei, S., Meier, W. & Rechberger, C., 2008, Fast Software Encryption Workshop. Springer, Vol. 5084. p. 470-488

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

New Results on NMAC/HMAC when Instantiated with Popular Hash Functions

Rechberger, C. & Rijmen, V., 2008, In : Journal of Universal Computer Science . 14, 3, p. 347-376

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Ongoing Research Areas in Symmetric Cryptography (D.STVL.9)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

Österreichische Kryptologen attackieren Hash-Funktionen

Rechberger, C., 2008

Research output: Non-print formWebsite / Web publicationResearch

Preimages for Reduced SHA-0 and SHA-1

De Cannière, C. & Rechberger, C., 2008, Advances in Cryptology - CRYPTO 2008. Springer, Vol. 5157. p. 179-202 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Searching for messages conforming to arbitrary sets of conditions in SHA-256

Hölbl, M., Rechberger, C. & Welzer, T., 2008, Proceedings of Western European Workshop on Research in Cryptology. Springer, Vol. 4945. p. 28-38 (Lecture notes in computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2009

Aktuelle Entwicklungen bei Hashfunktionen

Illies, G. & Rechberger, C., 14 May 2009.

Research output: Contribution to conference(Old data) Lecture or PresentationResearch

Cryptanalysis of Hash Functions

Rechberger, C., 2009

Research output: ThesisDoctoral ThesisResearch

Cryptanalysis of MDC-2

Knudsen, L. R., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Advances in Cryptology - EUROCRYPT 2009. Springer, Vol. 5479. p. 106-120 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of Twister

Mendel, F., Rechberger, C. & Schläffer, M., 2009, Applied Cryptography and Network Security. Springer, Vol. 5536. p. 342-353 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of Vortex

Aumasson, J-P., Dunkelman, O., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Progress in Cryptology - AFRICACRYPT 2009. Springer, Vol. 5580. p. 14-28 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

Mendel, F., Peyrin, T., Rechberger, C. & Schläffer, M., 2009, Selected Areas in Cryptography. Springer, Vol. 5867. p. 16-35 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

MD5 is Weaker than Weak: Attacks on Concatenated Combiners

Mendel, F., Rechberger, C. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Matsui, M. (ed.). Springer, Vol. 5912. p. 144-161 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File