Christian Rechberger

Univ.-Prof. Dipl.-Ing. Dr.techn.

1995 …2030
If you made any changes in Pure these will be visible here soon.

Research Output 2002 2019

Filter
Conference contribution
2019

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 21 Jun 2019, (Accepted/In press) ESORICS 2019. 54 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Throughput

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 343-372 30 p. (Lecture Notes in Computer Science; vol. 11476).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, p. 1447-1464

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography
2018

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C., 2018, Advances in Cryptology – CRYPTO 2018. Springer, p. 662-692 (Lecture Notes in Computer Science; vol. 10991).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Zero-Sum Partitions of PHOTON Permutations

Wang, Q., Grassi, L. & Rechberger, C., 2018, Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. p. 279-299 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2017

A new structural-differential property of 5-round AES

Grassi, L., Rechberger, C. & Rønjom, S., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag Wien, Vol. 10211 LNCS. p. 289-317 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Structural properties
Data storage equipment
Costs
Random Permutation
Block Cipher

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2016

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

Albrecht, M. R., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. p. 191-219 29 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

MPC-Friendly Symmetric Key Primitives

Grassi, L., Rechberger, C., Rotaru, D., Scholl, P. & Smart, N. P., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. p. 430-443 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Subspace Trail Cryptanalysis and its Applications to AES

Grassi, L., Rechberger, C. & Rønjom, S., 2016, FSE 2017 - 24th International Conference on Fast Software Encryption. Vol. 2016. p. 592 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2010

Rebound Attacks on the Reduced Grøstl Hash Function

Mendel, F., Rechberger, C., Schläffer, M. & Thomsen, S. S., 2010, Topics in Cryptology - CT-RSA 2010. Springer, Vol. 5985. p. 350-365 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2009

Cryptanalysis of MDC-2

Knudsen, L. R., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Advances in Cryptology - EUROCRYPT 2009. Springer, Vol. 5479. p. 106-120 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of Twister

Mendel, F., Rechberger, C. & Schläffer, M., 2009, Applied Cryptography and Network Security. Springer, Vol. 5536. p. 342-353 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of Vortex

Aumasson, J-P., Dunkelman, O., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Progress in Cryptology - AFRICACRYPT 2009. Springer, Vol. 5580. p. 14-28 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

Mendel, F., Peyrin, T., Rechberger, C. & Schläffer, M., 2009, Selected Areas in Cryptography. Springer, Vol. 5867. p. 16-35 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

MD5 is Weaker than Weak: Attacks on Concatenated Combiners

Mendel, F., Rechberger, C. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Matsui, M. (ed.). Springer, Vol. 5912. p. 144-161 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Rebound Distinguishers: Results on the Full Whirlpool Compression Function

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Springer, Vol. 5912. p. 126-143 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

Mendel, F., Rechberger, C., Schläffer, M. & Thomsen, S. S., 2009, Fast Software Encryption. Berlin: Springer, Vol. 5665. p. 260-276 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?

Rechberger, C., 2009, (Accepted/In press) Tagungsband 11. Deutscher IT-Sicherheitskongress. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2008

A (Second) Preimage Attack on the GOST Hash Function

Mendel, F., Pramstaller, N. & Rechberger, C., 2008, Fast Software Encryption. Springer, Vol. 5086. p. 224-234 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Collisions and other Non-Random Properties for Step-Reduced SHA-256

Indesteege, S., Mendel, F., Preneel, B. & Rechberger, C., 2008, Selected Areas in Cryptography. Avanzi, R., Keliher, L. & Sica, F. (eds.). Springer, Vol. 5381. p. 276-293 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Correlated Keystreams in MOUSTIQUE

Käsper, E., Rijmen, V., Bjørstad, T. E., Rechberger, C., Robshaw, M. & Sekar, G., 2008, Progress in Cryptology – AFRICACRYPT 2008. Springer, Vol. 5023. p. 246-257 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptanalysis of the GOST Hash Function

Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M. & Szmidt, J., 2008, Advances in Cryptology - CRYPTO 2008. Lin, D. (ed.). Springer, Vol. 5157. p. 162-178 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba

Aumasson, J-P., Fischer, S., Khazaei, S., Meier, W. & Rechberger, C., 2008, Fast Software Encryption Workshop. Springer, Vol. 5084. p. 470-488

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Preimages for Reduced SHA-0 and SHA-1

De Cannière, C. & Rechberger, C., 2008, Advances in Cryptology - CRYPTO 2008. Springer, Vol. 5157. p. 179-202 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Searching for messages conforming to arbitrary sets of conditions in SHA-256

Hölbl, M., Rechberger, C. & Welzer, T., 2008, Proceedings of Western European Workshop on Research in Cryptology. Springer, Vol. 4945. p. 28-38 (Lecture notes in computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2007

Collisions for 70-step SHA-1: On the Full Cost of Collision Search

De Cannière, C., Mendel, F. & Rechberger, C., 2007, Selected Areas in Cryptography. Adams, C., Miri, A. & Wiener, M. (eds.). Springer, Vol. 4876. p. 56-73 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints

Großschädl, J., Tillich, S., Rechberger, C., Hofmann, M. & Medwed, M., 2007, Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007). Association of Computing Machinery, p. 1110-1115

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On Authentication With HMAC and Non-Rondom Properties

Rechberger, C. & Rijmen, V., 2007, Financial Cryptography 2007. Springer, Vol. 4886. p. 119-113 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Second Preimages for SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, Cryptographers´ Track at the RSA Conference. ., Vol. 4377. p. 101-111 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

The Grindahl hash functions

Knudsen, L. R., Rechberger, C. & Thomsen, S. S., 2007, Fast Software Encryption (FSE) 2007. Biryukov, A. (ed.). Springer, Vol. 4593. p. 39-57 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

The SHA Family of Hash Functions: Recent Results

Rechberger, C. & Rijmen, V., 2007, Proceedings of Security and Protection of Information 2007. ., p. 107-114

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

2006

A Case Against Currently Used Hash Functions in RFID Protocols

Feldhofer, M. & Rechberger, C., 2006, Workshop on RFID Security 2006. Meersman, R., Tari, Z. & Herrero, P. (eds.). ., p. 109-122

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Case Against Currently Used Hash Functions in RFID Protocols

Feldhofer, M. & Rechberger, C., 2006, On the Move to Meaningful Internet Systems 2006. Meersman, R., Tari, Z. & Herrero, P. (eds.). Berlin [u.a.]: Springer, Vol. 4277. p. 372-381 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Compact FPGA Implementation of the Hash Function Whirlpool

Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. Association of Computing Machinery, p. 159-166

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analysis of Step-Reduced SHA-256

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Fast Software Encryption. Robshaw, M. (ed.). Springer, Vol. 4047. p. 126-143 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Finding SHA-1 Characteristics: General Results and Applications

De Cannière, C. & Rechberger, C., 2006, Advances in Cryptology - Asiacrypt 2006. Springer, Vol. 4284. p. 1-20 (Lecture notes in computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Improved Collision-Attack on the Hash Function Proposed at PKC'98

Mendel, F., Pramstaller, N. & Rechberger, C., 2006, Information Security and Cryptology – ICISC 2006. Rhee, M. S. & Lee, B. (eds.). Springer, Vol. 4296. p. 8-21 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On the Collision Resistance of RIPEMD-160

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Information Security. Katsikas, S. K. (ed.). Springer, Vol. 4176. p. 101-116 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The Impact of Carries on the Complexity of Collision Attacks on SHA-1

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2006, Fast Software Encryption. Robshaw, M. (ed.). Springer, p. 278-292 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Threshold Implementations Against Side-Channel Attacks and Glitches

Nikova, S., Rechberger, C. & Rijmen, V., 2006, Information and Communications Security. Ning, P., Qing, S. & Li, N. (eds.). Springer, Vol. 4307. p. 529-545 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

Analysis of simplified variants of SHA-256

Matusiewicz, K., Pieprzyk, J., Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468). Deutschland: Gesellschaft für Informatik , p. 123-134

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Breaking a new Hash Function Design Strategy called SMASH

Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, (Submitted) Selected Areas in Cryptography. Preneel, B. & Tavares, S. (eds.). Springer, (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Exploiting Coding Theory for Collision Attacks on SHA-1

Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, 10th IMA International Conference on Cryptography and Coding. Smart, N. P. (ed.). ., Vol. 3796. p. 78-95 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Impact of Rotations in SHA-1 and Related Hash Functions

Pramstaller, N., Rechberger, C. & Rijmen, V., 2005, Selected Areas in Cryptography. Preneel, B. & Tavares, S. (eds.). Springer, p. 261-275 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Interoperable Certification Authorities in the European Union - A Practical Solution

Hayat, A. & Rechberger, C., 2005, EGOV05 - International Conference on E-Government. ., p. 374-381

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Recent results on SHA-1 and SHA-256

Rechberger, C. & Rijmen, V., 2005, Proceedings of Santa's Crypto Get-together 2005. ., p. 51-58

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

2004

Practical Template Attacks

Rechberger, C. & Oswald, M. E., 2004, Information Security Applications. Lim, C. H. & Yung, M. (eds.). Berlin: Springer, Vol. 3325. p. 440-456 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Security of IEEE 802.11 considering Power and EM Side-Channel Information

Rechberger, C. & Oswald, M. E., 2004, International Conference on Computing, Communications and Control Technologies (CCCT 2004). ., p. 129-133

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Stream Ciphers and Side-Channel Analysis

Rechberger, C. & Oswald, M. E., 2004, SASC - The State of the Art of Stream Ciphers. ., p. 320-326

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review