Volgen
Martin Schläffer
Martin Schläffer
Geverifieerd e-mailadres voor infineon.com
Titel
Geciteerd door
Geciteerd door
Jaar
Grøstl–a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST, 2008
351*2008
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR Competition, 2016
328*2016
Secure hardware implementation of nonlinear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Journal of cryptology 24 (2), 292-321, 2011
3062011
The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl
F Mendel, C Rechberger, M Schläffer, S Thomsen
Fast Software Encryption, 260-276, 2009
2692009
Rebound distinguishers: Results on the full Whirlpool compression function
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
1472009
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
1102009
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
F Mendel, T Peyrin, C Rechberger, M Schläffer
Selected Areas in Cryptography, 16-35, 2009
962009
Finding SHA-2 characteristics: searching through a minefield of contradictions
F Mendel, T Nad, M Schläffer
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
912011
Improving local collisions: new attacks on reduced SHA-256
F Mendel, T Nad, M Schläffer
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
842013
Rebound Attack on the Full Lane Compression Function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
692009
The rebound attack and subspace distinguishers: Application to Whirlpool
M Lamberger, F Mendel, M Schläffer, C Rechberger, V Rijmen
Journal of Cryptology 28, 257-296, 2015
682015
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
662015
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Journal of Cryptology 34, 1-42, 2021
622021
Rebound attacks on the reduced Grøstl hash function
F Mendel, C Rechberger, M Schläffer, SS Thomsen
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
562010
Searching for differential paths in MD4
M Schläffer, E Oswald
FSE 4047, 242-261, 2006
512006
Differential side channel analysis attacks on FPGA implementations of ARIA
CK Kim, M Schläffer, SJ Moon
ETRI journal 30 (2), 315-325, 2008
452008
Malicious hashing: Eve’s variant of SHA-1
A Albertini, JP Aumasson, M Eichlseder, F Mendel, M Schläffer
Selected Areas in Cryptography--SAC 2014: 21st International Conference …, 2014
392014
Using normal bases for compact hardware implementations of the AES S-Box
S Nikova, V Rijmen, M Schläffer
Security and Cryptography for Networks: 6th International Conference, SCN …, 2008
342008
Differential attacks on reduced RIPEMD-160
F Mendel, T Nad, S Scherz, M Schläffer
Information Security: 15th International Conference, ISC 2012, Passau …, 2012
302012
Distinguishers for the compression function and output transformation of hamsi-256
JP Aumasson, E Käsper, L Knudsen, K Matusiewicz, R Ødegård, T Peyrin, ...
Information Security and Privacy, 87-103, 2010
302010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20