If you made any changes in Pure these will be visible here soon.

Research Output 2013 2018

  • 19 Conference contribution
  • 4 Article
  • 1 Doctoral Thesis
  • 1 Master's Thesis
2018
Open Access

Cryptanalysis of MORUS

Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y. & Viguier, B. 2018 Advances in Cryptology – ASIACRYPT 2018. Springer, p. 35-64 (Lecture Notes in Computer Science; vol. 11273)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, M. 2018 291 p.

Research output: ThesisDoctoral Thesis

Open Access
File

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C. 2018 Advances in Cryptology – CRYPTO 2018. Springer, p. 662-692 (Lecture Notes in Computer Science; vol. 10991)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Dobraunig, C. E., Eichlseder, M., Korak, T., Mangard, S., Mendel, F. & Primas, R. 2018 In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 547-572

Research output: Contribution to journalArticle

Open Access

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

Dobraunig, C. E., Eichlseder, M., Groß, H., Mangard, S., Mendel, F. & Primas, R. 2018 Advances in Cryptology – ASIACRYPT 2018. Springer, p. 315-342 (Lecture Notes in Computer Science; vol. 11273)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Cryptanalysis of Simpira v1

Eichlseder, M., Dobraunig, C. E. & Mendel, F. 2017 Selected Areas in Cryptography - SAC 2016. Avanzi, R. & Heys, H. (eds.). Springer, p. 284-298 (Lecture Notes in Computer Science; vol. 10532)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T. 2017 In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticle

Open Access

Side-Channel Analysis of Keymill

Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F. 2017 Constructive Side-Channel Analysis and Secure Design: COSADE 2017. p. 138-152 (Lecture Notes in Computer Science; vol. 10348)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Analysis of the Kupyna-256 Hash Function

Dobraunig, C. E., Eichlseder, M. & Mendel, F. 2016 Fast Software Encryption. Peyrin, T. (ed.). Springer, (LNCS; vol. 9783)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Practical Key Recovery Attack on MANTIS-5

Dobraunig, C. E., Eichlseder, M., Kales, D. & Mendel, F. 2016 In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticle

Square Attack on 7-Round Kiasu-BC

Dobraunig, C. E., Eichlseder, M. & Mendel, F. 2016 ACNS 2016. Manulis, M. & Sadeghi, A-R. (eds.). Springer, (LNCS; vol. 9696)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes

Dobraunig, C. E., Eichlseder, M., Korak, T., Lomné, V. & Mendel, F. 2016 Advances in Cryptology - ASIACRYPT 2016. Cheon, J. H. & Takagi, T. (eds.). Springer, Vol. 1, p. 369-395 (Lecture Notes in Computer Science; vol. 10031)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2015

Analysis of SHA-512/224 and SHA-512/256

Dobraunig, C. E., Eichlseder, M. & Mendel, F. 2015 Advances in Cryptology - ASIACRYPT 2015. Springer, Vol. 9453, p. 612-630 (LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptanalysis of Ascon

Dobraunig, C. E., Eichlseder, M., Mendel, F. & Schläffer, M. 2015 Topics in Cryptology - CT-RSA 2015. Springer, (LNCS; vol. 9048)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Forgery Attacks on round-reduced ICEPOLE-128

Dobraunig, C. E., Eichlseder, M. & Mendel, F. 2015 Selected Areas in Cryptography. Springer, p. 479-492 (LNCS; vol. 9566)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates

Dobraunig, C. E., Eichlseder, M. & Mendel, F. 2015 Advances in Cryptology - ASIACRYPT 2015. Springer, (LNCS; vol. 9453)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Higher-Order Cryptanalysis of LowMC

Dobraunig, C. E., Eichlseder, M. & Mendel, F. 2015 Information Security and Cryptology - ICISC 2015. Springer, p. 87-101 (LNCS; vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Related-Key Forgeries for Proest-OTR

Dobraunig, C. E., Eichlseder, M. & Mendel, F. 2015 Fast Software Encryption. Springer, p. 282-296 (LNCS; vol. 9054)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2014

Branching Heuristics in Differential Collision Search with Applications to SHA-512

Eichlseder, M., Mendel, F. & Schläffer, M. 2014 Fast Software Encryption. Springer, Vol. 8540, p. 473-488 (LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Key Recovery Attacks on Recent Authenticated Ciphers

Bogdanov, A., Dobraunig, C. E., Eichlseder, M., Lauridsen, M., Mendel, F., Schläffer, M. & Tischhauser, E. 2014 Progress in Cryptology - LATINCRYPT 2014. Springer, Vol. 8895, p. 274-287 (LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malicious Hashing: Eve's Variant of SHA-1

Albertini, A., Aumasson, J-P., Eichlseder, M., Mendel, F. & Schläffer, M. 2014 Selected Areas in Cryptography. Joux, A. (ed.). Springer, Vol. 8781, p. 1-19 (LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks

Dobraunig, C. E., Eichlseder, M., Mangard, S. & Mendel, F. 2014 Smart Card Research and Advanced Applications. Springer, Vol. 8968, p. 233-244 (LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2013

Linear Propagation in Efficient Guess-and-Determine Attacks

Eichlseder, M., Mendel, F., Nad, T., Rijmen, V. & Schläffer, M. 2013 International Workshop on Coding and Cryptography. ., p. 193-202

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Open Access
File