FWF - Kryptoanalyse - Cryptanalysis by means of numerical methods

  • Mendel, Florian (Co-Investigator (CoI))
  • Nad, Tomislav (Co-Investigator (CoI))
  • Lamberger, Mario (Co-Investigator (CoI))
  • Rechberger, Christian (Co-Investigator (CoI))
  • Schläffer, Martin (Co-Investigator (CoI))
  • Rijmen, Vincent (Principal Investigator (PI))

Project: Research project

Search results

  • 2009

    A Distinguisher for the Compression Function of SIMD-512

    Nad, T. & Mendel, F., 2009, Progress in Cryptology - INDOCRYPT 2009. Roy, B. & Sendrier, N. (eds.). Springer, Vol. 5922. p. 219-232 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Collision Attack on Boole

    Nad, T., Mendel, F. & Schläffer, M., 2009, Applied Cryptography and Network Security. Springer, Vol. 5536. p. 369-381 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Numerical solvers and cryptanalysis

    Nad, T., Lamberger, M. & Rijmen, V., 2009, In: Journal of Mathematical Cryptology. 3, 3, p. 249-263

    Research output: Contribution to journalArticlepeer-review

  • 2008

    A (Second) Preimage Attack on the GOST Hash Function

    Mendel, F., Pramstaller, N. & Rechberger, C., 2008, Fast Software Encryption. Springer, Vol. 5086. p. 224-234 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Collisions and other Non-Random Properties for Step-Reduced SHA-256

    Indesteege, S., Mendel, F., Preneel, B. & Rechberger, C., 2008, Selected Areas in Cryptography. Avanzi, R., Keliher, L. & Sica, F. (eds.). Springer, Vol. 5381. p. 276-293 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Collisions for Round-Reduced LAKE

    Mendel, F. & Schläffer, M., 2008, Information Security and Privacy. Mu, Y. (ed.). Berlin: Springer, Vol. 5107. p. 267-281 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Cryptanalysis of the GOST Hash Function

    Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M. & Szmidt, J., 2008, Advances in Cryptology - Proceedings CRYPTO 2008. Lin, D. (ed.). Springer, p. 162-178 (Lecture Notes in Computer Science; vol. 5157).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5

    Aumasson, J-P., Meier, W. & Mendel, F., 2008, Selected Areas in Cryptography. Avanzi, R., Keliher, L. & Sica, F. (eds.). Springer, p. 120-135 (Lecture Notes in Computer Science; vol. 5381).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
  • Preimages for Reduced SHA-0 and SHA-1

    De Cannière, C. & Rechberger, C., 2008, Advances in Cryptology - Proceedings CRYPTO 2008. Wagner, D. (ed.). Springer, p. 179-202 (Lecture Notes in Computer Science; vol. 5157).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Using Normal Bases for Compact Hardware Implementations of the AES S-box

    Nikova, S., Rijmen, V. & Schläffer, M., 2008, SCN. Hutchison, D., Kanade, T., Kittler, J., Kleinberg, J. M., Mattern, F., Mitchell, J. C., Naor, M., Nierstrasz, O., Ostrovsky, R., Pandu Rangan, C. & Prisco, R. (eds.). Berlin: Springer, Vol. 5229. p. 236-245 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File