No photo of Mario Lamberger

Mario Lamberger

Priv.-Doz. Dipl.-Ing. Dr.techn.

19952019
If you made any changes in Pure these will be visible here soon.

Research Output 1999 2015

Filter
Conference contribution
2012

Collision Attack on the Hamsi-256 Compression Function

Lamberger, M., Mendel, F. & Rijmen, V., 2012, Progress in Cryptology - INDOCRYPT 2012. Springer, Vol. 7668. p. 156-171 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2011

Second-Order Differential Collisions for Reduced SHA-256

Biryukov, A., Lamberger, M., Mendel, F. & Nikolic, I., 2011, Advances in Cryptology - ASIACRYPT 2011. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 270-287 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2010

Optimal Covering Codes for Finding Near-Collisions

Lamberger, M. & Rijmen, V., 2010, Selected Areas in Cryptography. Biryukov, A., Gong, G. & Stinson, D. R. (eds.). Springer, Vol. 6544. p. 187-197

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2009

Rebound Distinguishers: Results on the Full Whirlpool Compression Function

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2009, Advances in Cryptology - ASIACRYPT 2009. Springer, Vol. 5912. p. 126-143 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

Lamberger, M. & Mendel, F., 2009, Information Security. Samarati, P., Yung, M., Martinelli, F. & Ardagna, C. A. (eds.). Springer, Vol. 5735. p. 68-78 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2007

Second Preimages for Iterated Hash Functions and their Implications on MACs

Pramstaller, N., Lamberger, M. & Rijmen, V., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007. Springer, Vol. 4586. p. 68-81 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Second Preimages for SMASH

Lamberger, M., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, Cryptographers´ Track at the RSA Conference. ., Vol. 4377. p. 101-111 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

2006

WiFi Chipset Fingerprinting

Lackner, G., Lamberger, M., Teufl, P. & Payer, U., 2006, D.A.CH Mobility. ., p. 41-53

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

Hybrid Engine for Polymorphic Code Detection

Payer, U., Teufl, P. & Lamberger, M., 2005, Detection of intrusions and malware, and vulnerability assessment. Berlin [u.a.]: Springer, Vol. 3548. p. 19-31 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Massive Data Mining for Polymorphic Code Detection

Payer, U., Teufl, P., Kraxberger, S. & Lamberger, M., 2005, Computer Network Security. Gorodeckij, V. (ed.). Berlin [u.a.]: Springer, Vol. 3685. p. 448-453 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Traffic Classification using Self-Organizing Maps

Payer, U., Lamberger, M. & Teufl, P., 2005, Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops. ., p. 11-18

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review