51 results on '"Rechberger, Christian"'
Search Results
2. Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
3. Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
4. Privacy-Preserving Machine Learning Using Cryptography
5. Weak-Key Distinguishers for AES
6. On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
7. Efficient FPGA Implementations of LowMC and Picnic
8. An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
9. Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
10. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
11. Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
12. Linear Distinguishers in the Key-less Setting: Application to PRESENT
13. State-Recovery Analysis of Spritz
14. Ciphers for MPC and FHE
15. Practical Attacks on AES-like Cryptographic Hash Functions
16. The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
17. Improved Cryptanalysis of the Block Cipher KASUMI
18. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
19. Narrow-Bicliques: Cryptanalysis of Full IDEA
20. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
21. Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
22. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
23. Rebound Attacks on the Reduced Grøstl Hash Function
24. Second-Preimage Analysis of Reduced SHA-1
25. Rotational Rebound Attacks on Reduced Skein
26. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
27. Cryptanalysis of MDC-2
28. Cryptanalysis of Twister
29. MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
30. Cryptanalysis of Vortex
31. Rebound Distinguishers: Results on the Full Whirlpool Compression Function
32. Collisions and Other Non-random Properties for Step-Reduced SHA-256
33. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
34. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
35. Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
36. On Authentication with HMAC and Non-random Properties
37. Finding SHA-1 Characteristics: General Results and Applications
38. Impact of Rotations in SHA-1 and Related Hash Functions
39. A Case Against Currently Used Hash Functions in RFID Protocols
40. Analysis of Step-Reduced SHA-256
41. Improved Collision Attack on the Hash Function Proposed at PKC’98
42. The Impact of Carries on the Complexity of Collision Attacks on SHA-1
43. Breaking a New Hash Function Design Strategy Called SMASH
44. Threshold Implementations Against Side-Channel Attacks and Glitches
45. Exploiting Coding Theory for Collision Attacks on SHA-1
46. Practical Template Attacks
47. New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
48. The Grindahl Hash Functions
49. Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256
50. A (Second) Preimage Attack on the GOST Hash Function
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.