


Остановите войну!
for scientists:


default search action
Florian Mendel
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j16]Johannes Erlacher, Florian Mendel, Maria Eichlseder:
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2022(1): 64-87 (2022) - 2021
- [j15]Christoph Dobraunig, Maria Eichlseder
, Florian Mendel, Martin Schläffer:
Ascon v1.2: Lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3): 33 (2021) - [i45]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon PRF, MAC, and Short-Input MAC. IACR Cryptol. ePrint Arch. 2021: 1574 (2021) - 2020
- [j14]Gaoli Wang
, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig
:
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. Des. Codes Cryptogr. 88(5): 887-930 (2020) - [j13]Christoph Dobraunig
, Florian Mendel, Bart Mennink:
Practical forgeries for ORANGE. Inf. Process. Lett. 159-160: 105961 (2020) - [j12]Joan Daemen, Christoph Dobraunig
, Maria Eichlseder
, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 508-543 (2020) - [j11]Christoph Dobraunig
, Maria Eichlseder
, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer:
Isap v2.0. IACR Trans. Symmetric Cryptol. 2020(S1): 390-416 (2020) - [i44]Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical Forgeries for ORANGE. IACR Cryptol. ePrint Arch. 2020: 108 (2020)
2010 – 2019
- 2019
- [j10]Florian Mendel, Yu Sasaki:
Preface to Volume 2019, Issue 1. IACR Trans. Symmetric Cryptol. 2019(1): 1-4 (2019) - [j9]Fukang Liu, Christoph Dobraunig
, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol. 2019(3): 169-192 (2019) - [c76]Fukang Liu, Christoph Dobraunig
, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
:
Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO (2) 2019: 117-149 - [c75]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Variants of Frit. SAC 2019: 149-170 - [i43]Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Cryptol. ePrint Arch. 2019: 536 (2019) - [i42]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2019: 668 (2019) - 2018
- [j8]Christoph Dobraunig
, Maria Eichlseder
, Thomas Korak, Stefan Mangard, Florian Mendel
, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 547-572 (2018) - [j7]Florian Mendel, María Naya-Plasencia:
Preface to Volume 2018, Issue 1. IACR Trans. Symmetric Cryptol. 2018(1): 1-4 (2018) - [c74]Christoph Dobraunig
, Maria Eichlseder
, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. ASIACRYPT (2) 2018: 315-342 - [c73]Christoph Dobraunig
, Maria Eichlseder
, Lorenzo Grassi
, Virginie Lallemand, Gregor Leander
, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [c72]Christoph Dobraunig
, Stefan Mangard, Florian Mendel, Robert Primas:
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. SAC 2018: 257-277 - [i41]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2018: 71 (2018) - [i40]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i39]Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. IACR Cryptol. ePrint Arch. 2018: 357 (2018) - [i38]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Frit. IACR Cryptol. ePrint Arch. 2018: 809 (2018) - [i37]Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas:
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje. IACR Cryptol. ePrint Arch. 2018: 852 (2018) - 2017
- [j6]Christoph Dobraunig
, Maria Eichlseder
, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Towards Side-Channel Secure Authenticated Encryption. IACR Trans. Symmetric Cryptol. 2017(1): 80-105 (2017) - [c71]Ralph Ankele, Subhadeep Banik
, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim
, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round Skinny. ACNS 2017: 208-228 - [c70]Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. ASIACRYPT (1) 2017: 158-186 - [c69]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz
, Tobias Schneider, Peter Schwabe, François-Xavier Standaert
, Yosuke Todo
, Benoît Viguier:
Gimli : A Cross-Platform Permutation. CHES 2017: 299-320 - [c68]Christoph Dobraunig
, Maria Eichlseder
, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. COSADE 2017: 138-152 - [i36]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli: a cross-platform permutation. IACR Cryptol. ePrint Arch. 2017: 630 (2017) - [i35]Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2017: 800 (2017) - [i34]Daniel Kales, Maria Eichlseder, Florian Mendel:
Note on the Robustness of CAESAR Candidates. IACR Cryptol. ePrint Arch. 2017: 1137 (2017) - 2016
- [j5]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Trans. Symmetric Cryptol. 2016(2): 1-29 (2016) - [j4]Christoph Dobraunig
, Maria Eichlseder
, Daniel Kales, Florian Mendel:
Practical Key-Recovery Attack on MANTIS5. IACR Trans. Symmetric Cryptol. 2016(2): 248-260 (2016) - [c67]Nasour Bagheri
, Florian Mendel, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP (2) 2016: 301-316 - [c66]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. ACNS 2016: 500-517 - [c65]Christoph Dobraunig
, Maria Eichlseder
, Thomas Korak, Victor Lomné, Florian Mendel:
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. ASIACRYPT (1) 2016: 369-395 - [c64]Nasour Bagheri
, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. FSE 2016: 554-574 - [c63]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. FSE 2016: 575-590 - [c62]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Cryptanalysis of Simpira v1. SAC 2016: 284-298 - [i33]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Cryptol. ePrint Arch. 2016: 98 (2016) - [i32]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira. IACR Cryptol. ePrint Arch. 2016: 244 (2016) - [i31]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. IACR Cryptol. ePrint Arch. 2016: 326 (2016) - [i30]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. IACR Cryptol. ePrint Arch. 2016: 374 (2016) - [i29]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. IACR Cryptol. ePrint Arch. 2016: 436 (2016) - [i28]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Practical Fault Attacks on Authenticated Encryption Modes for AES. IACR Cryptol. ePrint Arch. 2016: 616 (2016) - [i27]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Key Recovery for MANTIS-5. IACR Cryptol. ePrint Arch. 2016: 754 (2016) - [i26]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. IACR Cryptol. ePrint Arch. 2016: 793 (2016) - [i25]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2016: 952 (2016) - [i24]Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. IACR Cryptol. ePrint Arch. 2016: 1127 (2016) - 2015
- [j3]Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen
:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. J. Cryptol. 28(2): 257-296 (2015) - [c61]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. ASIACRYPT (2) 2015: 490-509 - [c60]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. ASIACRYPT (2) 2015: 612-630 - [c59]Christoph Dobraunig
, François Koeune, Stefan Mangard, Florian Mendel, François-Xavier Standaert
:
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. CARDIS 2015: 225-241 - [c58]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. CT-RSA 2015: 371-387 - [c57]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. FSE 2015: 282-296 - [c56]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Higher-Order Cryptanalysis of LowMC. ICISC 2015: 87-101 - [c55]Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel:
Forgery Attacks on Round-Reduced ICEPOLE-128. SAC 2015: 479-492 - [i23]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. IACR Cryptol. ePrint Arch. 2015: 30 (2015) - [i22]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. IACR Cryptol. ePrint Arch. 2015: 33 (2015) - [i21]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. IACR Cryptol. ePrint Arch. 2015: 91 (2015) - [i20]Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. IACR Cryptol. ePrint Arch. 2015: 350 (2015) - [i19]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. IACR Cryptol. ePrint Arch. 2015: 392 (2015) - [i18]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. IACR Cryptol. ePrint Arch. 2015: 407 (2015) - [i17]Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. IACR Cryptol. ePrint Arch. 2015: 424 (2015) - [i16]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. IACR Cryptol. ePrint Arch. 2015: 956 (2015) - [i15]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. IACR Cryptol. ePrint Arch. 2015: 1200 (2015) - 2014
- [c54]Christoph Dobraunig
, Maria Eichlseder
, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. CARDIS 2014: 233-244 - [c53]Maria Eichlseder
, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. FSE 2014: 473-488 - [c52]Florian Mendel, Vincent Rijmen
, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. FSE 2014: 509-521 - [c51]Andrey Bogdanov, Christoph Dobraunig
, Maria Eichlseder
, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014: 274-287 - [c50]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder
, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. Selected Areas in Cryptography 2014: 1-19 - [c49]Christoph Dobraunig
, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. Selected Areas in Cryptography 2014: 165-182 - [i14]Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. IACR Cryptol. ePrint Arch. 2014: 302 (2014) - [i13]Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. IACR Cryptol. ePrint Arch. 2014: 305 (2014) - [i12]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. IACR Cryptol. ePrint Arch. 2014: 694 (2014) - [i11]Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. IACR Cryptol. ePrint Arch. 2014: 722 (2014) - 2013
- [c48]Florian Mendel, Thomas Peyrin
, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c47]Begül Bilgin, Andrey Bogdanov
, Miroslav Knezevic, Florian Mendel, Qingju Wang
:
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES 2013: 142-158 - [c46]Florian Mendel, Vincent Rijmen
, Deniz Toz, Kerem Varici:
Collisions for the WIDEA-8 Compression Function. CT-RSA 2013: 162-173 - [c45]Florian Mendel, Tomislav Nad, Martin Schläffer:
Finding Collisions for Round-Reduced SM3. CT-RSA 2013: 174-188 - [c44]Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. EUROCRYPT 2013: 262-278 - [c43]Andrey Bogdanov
, Florian Mendel, Francesco Regazzoni
, Vincent Rijmen
, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. FSE 2013: 447-466 - [c42]Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer:
Differential Cryptanalysis of Keccak Variants. IMACC 2013: 141-157 - [i10]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2013: 600 (2013) - 2012
- [j2]Mario Lamberger, Florian Mendel, Vincent Rijmen
, Koen Simoens:
Memoryless near-collisions via coding theory. Des. Codes Cryptogr. 62(1): 1-18 (2012) - [j1]Yu Sasaki, Florian Mendel, Kazumaro Aoki:
Preimage Attacks against PKC98-Hash and HAS-V. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 111-124 (2012) - [c41]Florian Mendel, Vincent Rijmen
, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. ASIACRYPT 2012: 190-207 - [c40]Florian Mendel, Bart Mennink, Vincent Rijmen
, Elmar Tischhauser:
A Simple Key-Recovery Attack on McOE-X. CANS 2012: 23-31 - [c39]Florian Mendel, Tomislav Nad, Martin Schläffer:
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. FSE 2012: 226-243 - [c38]Mario Lamberger, Florian Mendel, Vincent Rijmen
:
Collision Attack on the Hamsi-256 Compression Function. INDOCRYPT 2012: 156-171 - [c37]Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer:
Differential Attacks on Reduced RIPEMD-160. ISC 2012: 23-38 - [i9]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. IACR Cryptol. ePrint Arch. 2012: 544 (2012) - 2011
- [c36]Stefan Kölbl, Florian Mendel:
Practical Attacks on the Maelstrom-0 Compression Function. ACNS 2011: 449-461 - [c35]Alex Biryukov
, Mario Lamberger, Florian Mendel, Ivica Nikolic:
Second-Order Differential Collisions for Reduced SHA-256. ASIACRYPT 2011: 270-287 - [c34]Florian Mendel, Tomislav Nad, Martin Schläffer:
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. ASIACRYPT 2011: 288-307 - [c33]Florian Mendel, Tomislav Nad, Martin Schläffer:
Cryptanalysis of Round-Reduced HAS-160. ICISC 2011: 33-47 - [c32]Florian Mendel, Tomislav Nad:
Boomerang Distinguisher for the SIMD-512 Compression Function. INDOCRYPT 2011: 255-269 - [i8]Mario Lamberger, Florian Mendel:
Higher-Order Differential Attack on Reduced SHA-256. IACR Cryptol. ePrint Arch. 2011: 37 (2011) - 2010
- [c31]Praveen Gauravaram, Gaëtan Leurent
, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010: 419-436 - [c30]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Rebound Attacks on the Reduced Grøstl Hash Function. CT-RSA 2010: 350-365 - [c29]Yu Sasaki, Florian Mendel, Kazumaro Aoki:
Preimage Attacks against PKC98-Hash and HAS-V. ICISC 2010: 68-91 - [i7]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. IACR Cryptol. ePrint Arch. 2010: 198 (2010)
2000 – 2009
- 2009
- [c28]Florian Mendel, Christian Rechberger, Martin Schläffer:
Cryptanalysis of Twister. ACNS 2009: 342-353 - [c27]Florian Mendel, Tomislav Nad, Martin Schläffer:
Collision Attack on Boole. ACNS 2009: 369-381 - [c26]Jean-Philippe Aumasson, Orr Dunkelman
, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of Vortex. AFRICACRYPT 2009: 14-28 - [c25]Florian Mendel:
Two Passes of Tiger Are Not One-Way. AFRICACRYPT 2009: 29-40 - [c24]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen
, Martin Schläffer:
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 - [c23]Florian Mendel, Christian Rechberger, Martin Schläffer:
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. ASIACRYPT 2009: 144-161 - [c22]Lars R. Knudsen
, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120 - [c21]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. FSE 2009: 260-276 - [c20]Florian Mendel, Tomislav Nad:
A Distinguisher for the Compression Function of SIMD-512. INDOCRYPT 2009: 219-232 - [c19]Mario Lamberger, Florian Mendel:
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. ISC 2009: 68-78 - [c18]Florian Mendel, Martin Schläffer:
On Free-Start Collisions and Collisions for TIB3. ISC 2009: 95-106 - [c17]Sebastiaan Indesteege, Florian Mendel, Bart Preneel
, Martin Schläffer:
Practical Collisions for SHAMATA-256. Selected Areas in Cryptography 2009: 1-15 - [c16]Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Selected Areas in Cryptography 2009: 16-35 - [i6]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - 2008
- [c15]Florian Mendel, Martin Schläffer:
Collisions for Round-Reduced LAKE. ACISP 2008: 267-281 - [c14]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt:
Cryptanalysis of the GOST Hash Function. CRYPTO 2008: 162-178 - [c13]Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function. FSE 2008: 224-234 - [c12]Jean-Philippe Aumasson, Willi Meier, Florian Mendel:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Selected Areas in Cryptography 2008: 120-135 - [c11]