Search

Your search keyword '"Rechberger, Christian"' showing total 304 results

Search Constraints

Start Over You searched for: Author "Rechberger, Christian" Remove constraint Author: "Rechberger, Christian"
304 results on '"Rechberger, Christian"'

Search Results

1. Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System

2. Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption : Opportunities and Limitations

3. A Signature-Based Gr\'obner Basis Algorithm with Tail-Reduced Reductors (M5GB)

5. CryptoTL: Private, Efficient and Secure Transfer Learning

6. Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

7. Tillage Quality and Draught Force of a Novel Plough Concept with Cambered Disc

8. Privately Connecting Mobility to Infectious Diseases via Applied Cryptography

10. Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES

12. Privacy-Preserving Machine Learning Using Cryptography

14. Weak-Key Distinguishers for AES

15. An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC

16. On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy

17. Efficient FPGA Implementations of LowMC and Picnic

20. Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

21. Feistel Structures for MPC, and More

22. Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

24. Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

25. Zero-Sum Partitions of PHOTON Permutations

26. Weak-Key Distinguishers for AES

30. A New Structural-Differential Property of 5-Round AES

31. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

32. Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE

34. Linear Distinguishers in the Key-less Setting: Application to PRESENT

35. Ciphers for MPC and FHE

36. State-Recovery Analysis of Spritz

37. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

38. Practical Attacks on AES-like Cryptographic Hash Functions

39. The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE

40. On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis

41. Improved Cryptanalysis of the Block Cipher KASUMI

42. PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications : Extended Abstract

43. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

44. Narrow-Bicliques: Cryptanalysis of Full IDEA

45. Biclique Cryptanalysis of the Full AES

46. Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)

47. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN

49. Reinforced Concrete

Catalog

Books, media, physical & digital resources