default search action
Florian Mendel
Person information
- affiliation: Infineon Technologies AG, Munich, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas:
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 309-335 (2024) - [c77]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. CT-RSA 2024: 381-403 - [i48]Barbara Gigerl, Florian Mendel, Martin Schläffer, Robert Primas:
Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice. IACR Cryptol. ePrint Arch. 2024: 755 (2024) - [i47]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Preliminary Analysis of Ascon-Xof and Ascon-Hash. IACR Cryptol. ePrint Arch. 2024: 908 (2024) - 2023
- [i46]Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, Rishub Nagpal:
Efficient Low-Latency Masking of Ascon without Fresh Randomness. IACR Cryptol. ePrint Arch. 2023: 1914 (2023) - 2022
- [j16]Johannes Erlacher, Florian Mendel, Maria Eichlseder:
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2022(1): 64-87 (2022) - 2021
- [j15]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon v1.2: Lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3): 33 (2021) - [i45]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon PRF, MAC, and Short-Input MAC. IACR Cryptol. ePrint Arch. 2021: 1574 (2021) - 2020
- [j14]Gaoli Wang, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig:
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. Des. Codes Cryptogr. 88(5): 887-930 (2020) - [j13]Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical forgeries for ORANGE. Inf. Process. Lett. 159-160: 105961 (2020) - [j12]Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 508-543 (2020) - [j11]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer:
Isap v2.0. IACR Trans. Symmetric Cryptol. 2020(S1): 390-416 (2020) - [i44]Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical Forgeries for ORANGE. IACR Cryptol. ePrint Arch. 2020: 108 (2020)
2010 – 2019
- 2019
- [j10]Florian Mendel, Yu Sasaki:
Preface to Volume 2019, Issue 1. IACR Trans. Symmetric Cryptol. 2019(1): 1-4 (2019) - [j9]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol. 2019(3): 169-192 (2019) - [c76]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO (2) 2019: 117-149 - [c75]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Variants of Frit. SAC 2019: 149-170 - [i43]Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Cryptol. ePrint Arch. 2019: 536 (2019) - [i42]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2019: 668 (2019) - 2018
- [j8]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 547-572 (2018) - [j7]Florian Mendel, María Naya-Plasencia:
Preface to Volume 2018, Issue 1. IACR Trans. Symmetric Cryptol. 2018(1): 1-4 (2018) - [c74]Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. ASIACRYPT (2) 2018: 315-342 - [c73]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [c72]Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas:
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. SAC 2018: 257-277 - [i41]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2018: 71 (2018) - [i40]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i39]Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. IACR Cryptol. ePrint Arch. 2018: 357 (2018) - [i38]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Frit. IACR Cryptol. ePrint Arch. 2018: 809 (2018) - [i37]Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas:
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje. IACR Cryptol. ePrint Arch. 2018: 852 (2018) - 2017
- [j6]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Towards Side-Channel Secure Authenticated Encryption. IACR Trans. Symmetric Cryptol. 2017(1): 80-105 (2017) - [c71]Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round Skinny. ACNS 2017: 208-228 - [c70]Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. ASIACRYPT (1) 2017: 158-186 - [c69]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli : A Cross-Platform Permutation. CHES 2017: 299-320 - [c68]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. COSADE 2017: 138-152 - [i36]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli: a cross-platform permutation. IACR Cryptol. ePrint Arch. 2017: 630 (2017) - [i35]Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2017: 800 (2017) - [i34]Daniel Kales, Maria Eichlseder, Florian Mendel:
Note on the Robustness of CAESAR Candidates. IACR Cryptol. ePrint Arch. 2017: 1137 (2017) - 2016
- [j5]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Trans. Symmetric Cryptol. 2016(2): 1-29 (2016) - [j4]Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel:
Practical Key-Recovery Attack on MANTIS5. IACR Trans. Symmetric Cryptol. 2016(2): 248-260 (2016) - [c67]Nasour Bagheri, Florian Mendel, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP (2) 2016: 301-316 - [c66]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. ACNS 2016: 500-517 - [c65]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. ASIACRYPT (1) 2016: 369-395 - [c64]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. FSE 2016: 554-574 - [c63]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. FSE 2016: 575-590 - [c62]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira v1. SAC 2016: 284-298 - [i33]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Cryptol. ePrint Arch. 2016: 98 (2016) - [i32]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira. IACR Cryptol. ePrint Arch. 2016: 244 (2016) - [i31]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. IACR Cryptol. ePrint Arch. 2016: 326 (2016) - [i30]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. IACR Cryptol. ePrint Arch. 2016: 374 (2016) - [i29]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. IACR Cryptol. ePrint Arch. 2016: 436 (2016) - [i28]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Practical Fault Attacks on Authenticated Encryption Modes for AES. IACR Cryptol. ePrint Arch. 2016: 616 (2016) - [i27]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Key Recovery for MANTIS-5. IACR Cryptol. ePrint Arch. 2016: 754 (2016) - [i26]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. IACR Cryptol. ePrint Arch. 2016: 793 (2016) - [i25]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2016: 952 (2016) - [i24]Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. IACR Cryptol. ePrint Arch. 2016: 1127 (2016) - 2015
- [j3]Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. J. Cryptol. 28(2): 257-296 (2015) - [c61]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. ASIACRYPT (2) 2015: 490-509 - [c60]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. ASIACRYPT (2) 2015: 612-630 - [c59]Christoph Dobraunig, François Koeune, Stefan Mangard, Florian Mendel, François-Xavier Standaert:
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. CARDIS 2015: 225-241 - [c58]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. CT-RSA 2015: 371-387 - [c57]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. FSE 2015: 282-296 - [c56]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-Order Cryptanalysis of LowMC. ICISC 2015: 87-101 - [c55]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on Round-Reduced ICEPOLE-128. SAC 2015: 479-492 - [i23]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. IACR Cryptol. ePrint Arch. 2015: 30 (2015) - [i22]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. IACR Cryptol. ePrint Arch. 2015: 33 (2015) - [i21]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. IACR Cryptol. ePrint Arch. 2015: 91 (2015) - [i20]Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. IACR Cryptol. ePrint Arch. 2015: 350 (2015) - [i19]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. IACR Cryptol. ePrint Arch. 2015: 392 (2015) - [i18]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. IACR Cryptol. ePrint Arch. 2015: 407 (2015) - [i17]Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. IACR Cryptol. ePrint Arch. 2015: 424 (2015) - [i16]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. IACR Cryptol. ePrint Arch. 2015: 956 (2015) - [i15]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. IACR Cryptol. ePrint Arch. 2015: 1200 (2015) - 2014
- [c54]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. CARDIS 2014: 233-244 - [c53]Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. FSE 2014: 473-488 - [c52]Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. FSE 2014: 509-521 - [c51]Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014: 274-287 - [c50]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. Selected Areas in Cryptography 2014: 1-19 - [c49]Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. Selected Areas in Cryptography 2014: 165-182 - [i14]Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. IACR Cryptol. ePrint Arch. 2014: 302 (2014) - [i13]Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. IACR Cryptol. ePrint Arch. 2014: 305 (2014) - [i12]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. IACR Cryptol. ePrint Arch. 2014: 694 (2014) - [i11]Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. IACR Cryptol. ePrint Arch. 2014: 722 (2014) - 2013
- [c48]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c47]Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES 2013: 142-158 - [c46]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Collisions for the WIDEA-8 Compression Function. CT-RSA 2013: 162-173 - [c45]Florian Mendel, Tomislav Nad, Martin Schläffer:
Finding Collisions for Round-Reduced SM3. CT-RSA 2013: 174-188 - [c44]Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. EUROCRYPT 2013: 262-278 - [c43]Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. FSE 2013: 447-466 - [c42]Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer:
Differential Cryptanalysis of Keccak Variants. IMACC 2013: 141-157 - [i10]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2013: 600 (2013) - 2012
- [j2]Mario Lamberger, Florian Mendel, Vincent Rijmen, Koen Simoens:
Memoryless near-collisions via coding theory. Des. Codes Cryptogr. 62(1): 1-18 (2012) - [j1]Yu Sasaki, Florian Mendel, Kazumaro Aoki:
Preimage Attacks against PKC98-Hash and HAS-V. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 111-124 (2012) - [c41]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. ASIACRYPT 2012: 190-207 - [c40]Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser:
A Simple Key-Recovery Attack on McOE-X. CANS 2012: 23-31 - [c39]Florian Mendel, Tomislav Nad, Martin Schläffer:
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. FSE 2012: 226-243 - [c38]Mario Lamberger, Florian Mendel, Vincent Rijmen:
Collision Attack on the Hamsi-256 Compression Function. INDOCRYPT 2012: 156-171 - [c37]Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer:
Differential Attacks on Reduced RIPEMD-160. ISC 2012: 23-38 - [i9]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. IACR Cryptol. ePrint Arch. 2012: 544 (2012) - 2011
- [c36]Stefan Kölbl, Florian Mendel:
Practical Attacks on the Maelstrom-0 Compression Function. ACNS 2011: 449-461 - [c35]Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic:
Second-Order Differential Collisions for Reduced SHA-256. ASIACRYPT 2011: 270-287 - [c34]Florian Mendel, Tomislav Nad, Martin Schläffer:
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. ASIACRYPT 2011: 288-307 - [c33]Florian Mendel, Tomislav Nad, Martin Schläffer:
Cryptanalysis of Round-Reduced HAS-160. ICISC 2011: 33-47 - [c32]Florian Mendel, Tomislav Nad:
Boomerang Distinguisher for the SIMD-512 Compression Function. INDOCRYPT 2011: 255-269 - [i8]Mario Lamberger, Florian Mendel:
Higher-Order Differential Attack on Reduced SHA-256. IACR Cryptol. ePrint Arch. 2011: 37 (2011) - 2010
- [c31]Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010: 419-436 - [c30]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Rebound Attacks on the Reduced Grøstl Hash Function. CT-RSA 2010: 350-365 - [c29]Yu Sasaki, Florian Mendel, Kazumaro Aoki:
Preimage Attacks against PKC98-Hash and HAS-V. ICISC 2010: 68-91 - [i7]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. IACR Cryptol. ePrint Arch. 2010: 198 (2010)
2000 – 2009
- 2009
- [c28]Florian Mendel, Christian Rechberger, Martin Schläffer:
Cryptanalysis of Twister. ACNS 2009: 342-353 - [c27]Florian Mendel, Tomislav Nad, Martin Schläffer:
Collision Attack on Boole. ACNS 2009: 369-381 - [c26]Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of Vortex. AFRICACRYPT 2009: 14-28 - [c25]Florian Mendel:
Two Passes of Tiger Are Not One-Way. AFRICACRYPT 2009: 29-40 - [c24]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 - [c23]Florian Mendel, Christian Rechberger, Martin Schläffer:
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. ASIACRYPT 2009: 144-161 - [c22]Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120 - [c21]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. FSE 2009: 260-276 - [c20]Florian Mendel, Tomislav Nad:
A Distinguisher for the Compression Function of SIMD-512. INDOCRYPT 2009: 219-232 - [c19]Mario Lamberger, Florian Mendel:
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. ISC 2009: 68-78 - [c18]Florian Mendel, Martin Schläffer:
On Free-Start Collisions and Collisions for TIB3. ISC 2009: 95-106 - [c17]Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer:
Practical Collisions for SHAMATA-256. Selected Areas in Cryptography 2009: 1-15 - [c16]Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Selected Areas in Cryptography 2009: 16-35 - [i6]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - 2008
- [c15]Florian Mendel, Martin Schläffer:
Collisions for Round-Reduced LAKE. ACISP 2008: 267-281 - [c14]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt:
Cryptanalysis of the GOST Hash Function. CRYPTO 2008: 162-178 - [c13]Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function. FSE 2008: 224-234 - [c12]Jean-Philippe Aumasson, Willi Meier, Florian Mendel:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Selected Areas in Cryptography 2008: 120-135 - [c11]Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger:
Collisions and Other Non-random Properties for Step-Reduced SHA-256. Selected Areas in Cryptography 2008: 276-293 - [i5]Florian Mendel, Martin Schläffer:
Collisions for Round-Reduced LAKE. IACR Cryptol. ePrint Arch. 2008: 109 (2008) - [i4]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of Step-Reduced SHA-256. IACR Cryptol. ePrint Arch. 2008: 130 (2008) - [i3]Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger:
Collisions and other Non-Random Properties for Step-Reduced SHA-256. IACR Cryptol. ePrint Arch. 2008: 131 (2008) - [i2]Jean-Philippe Aumasson, Willi Meier, Florian Mendel:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. IACR Cryptol. ePrint Arch. 2008: 183 (2008) - 2007
- [c10]Florian Mendel, Vincent Rijmen:
Cryptanalysis of the Tiger Hash Function. ASIACRYPT 2007: 536-550 - [c9]Florian Mendel, Joseph Lano, Bart Preneel:
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. CT-RSA 2007: 85-100 - [c8]Florian Mendel, Vincent Rijmen:
Colliding Message Pair for 53-Step HAS-160. ICISC 2007: 324-334 - [c7]Florian Mendel, Vincent Rijmen:
Weaknesses in the HAS-V Compression Function. ICISC 2007: 335-345 - [c6]Christophe De Cannière, Florian Mendel, Christian Rechberger:
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. Selected Areas in Cryptography 2007: 56-73 - 2006
- [c5]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of Step-Reduced SHA-256. FSE 2006: 126-143 - [c4]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292 - [c3]Florian Mendel, Norbert Pramstaller, Christian Rechberger:
Improved Collision Attack on the Hash Function Proposed at PKC'98. ICISC 2006: 8-21 - [c2]Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe:
Update on Tiger. INDOCRYPT 2006: 63-79 - [c1]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116 - [i1]Florian Mendel:
Colliding Message Pair for 53-Step HAS-160. IACR Cryptol. ePrint Arch. 2006: 334 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint