No photo of Mario Lamberger

Mario Lamberger

Priv.-Doz. Dipl.-Ing. Dr.techn.

19952019
If you made any changes in Pure these will be visible here soon.

Research Output 1999 2015

2015

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2015, In : Journal of cryptology. 28, 2, p. 257-296 40 p.

Research output: Contribution to journalArticleResearchpeer-review

2013

Memoryless Near-Collisions, Revisited

Lamberger, M. & Teufl, E., 2013, In : Information Processing Letters. 113, 3, p. 60-66

Research output: Contribution to journalArticleResearchpeer-review

2012

Collision Attack on the Hamsi-256 Compression Function

Lamberger, M., Mendel, F. & Rijmen, V., 2012, Progress in Cryptology - INDOCRYPT 2012. Springer, Vol. 7668. p. 156-171 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Mathematical Analysis of Symmetric Cryptographic Primitives

Lamberger, M., 2012

Research output: ThesisHabilitationResearch

Memoryless Near-Collisions via Coding Theory

Lamberger, M., Mendel, F., Rijmen, V. & Simoens, K., 2012, In : Designs, codes and cryptography. 62, 1, p. 1-18

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2011

Second-Order Differential Collisions for Reduced SHA-256

Biryukov, A., Lamberger, M., Mendel, F. & Nikolic, I., 2011, Advances in Cryptology - ASIACRYPT 2011. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 270-287 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2010

Optimal Covering Codes for Finding Near-Collisions

Lamberger, M. & Rijmen, V., 2010, Selected Areas in Cryptography. Biryukov, A., Gong, G. & Stinson, D. R. (eds.). Springer, Vol. 6544. p. 187-197

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2009

Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers

Daemen, J., Lamberger, M., Pramstaller, N., Rijmen, V. & Vercauteren, F., 2009, In : Computing <Wien>. 85, 1-2, p. 85-104

Research output: Contribution to journalArticleResearchpeer-review

IAIK-ECC 2.19 SDK

Lamberger, M. & Bratko, D., 2009

Research output: Non-print formSoftwareResearch

Numerical solvers and cryptanalysis

Nad, T., Lamberger, M. & Rijmen, V., 2009, In : Journal of mathematical cryptology. 3, 3, p. 249-263

Research output: Contribution to journalArticleResearchpeer-review

Rebound Distinguishers: Results on the Full Whirlpool Compression Function

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Springer, Vol. 5912. p. 126-143 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

Lamberger, M. & Mendel, F., 2009, Information Security. Samarati, P., Yung, M., Martinelli, F. & Ardagna, C. A. (eds.). Springer, Vol. 5735. p. 68-78 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2008

Analysis of the Hash Function Design Strategy called SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2008, In : IEEE transactions on information theory. 54, 8, p. 3647-3655

Research output: Contribution to journalArticleResearchpeer-review

IAIK-ECC 2.17 SDK

Lamberger, M. & Bratko, D., 2008

Research output: Non-print formSoftwareResearch

IAIK-ECC 2.18 SDK

Lamberger, M. & Bratko, D., 2008

Research output: Non-print formSoftwareResearch

2007

IAIK-ECC 2.16 SDK

Lamberger, M. & Bratko, D., 2007

Research output: Non-print formSoftwareResearch

Second Preimages for Iterated Hash Functions and their Implications on MACs

Pramstaller, N., Lamberger, M. & Rijmen, V., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007. Springer, Vol. 4586. p. 68-81 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Second Preimages for SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, Cryptographers´ Track at the RSA Conference. ., Vol. 4377. p. 101-111 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

2006

On a family of singular measures related to Minkowski's ?(x) function

Lamberger, M., 2006, In : Indagationes mathematicae. 17, 1, p. 45-63

Research output: Contribution to journalArticleResearchpeer-review

POSITIF D5.1: STM specification, design and implementation

Payer, U., Kraxberger, S. & Lamberger, M., 2006, .

Research output: Book/ReportOther reportResearch

WiFi Chipset Fingerprinting

Lackner, G., Lamberger, M., Teufl, P. & Payer, U., 2006, D.A.CH Mobility. ., p. 41-53

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

Hybrid Engine for Polymorphic Code Detection

Payer, U., Teufl, P. & Lamberger, M., 2005, Detection of intrusions and malware, and vulnerability assessment. Berlin [u.a.]: Springer, Vol. 3548. p. 19-31 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Massive Data Mining for Polymorphic Code Detection

Payer, U., Teufl, P., Kraxberger, S. & Lamberger, M., 2005, Computer Network Security. Gorodeckij, V. (ed.). Berlin [u.a.]: Springer, Vol. 3685. p. 448-453 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

POSITIF D5.2: BSM definition

Payer, U., Kraxberger, S. & Lamberger, M., 2005, .

Research output: Book/ReportOther reportResearch

Traffic Classification using Self-Organizing Maps

Payer, U., Lamberger, M. & Teufl, P., 2005, Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops. ., p. 11-18

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2003

Distribution properties of digital expansions arising from linear recurrences.

Lamberger, M. & Thuswaldner, J., 2003, In : Mathematica Slovaca. 53, 1, p. 1-20

Research output: Contribution to journalArticleResearchpeer-review

2002

Probabilistic and dynamical properties of number systems

Lamberger, M., 2002

Research output: ThesisDoctoral ThesisResearch

1999

Elliptische Kurven und ihre Anwendungen

Lamberger, M., 1999

Research output: ThesisDiploma ThesisResearch