
Christian Rechberger
Person information
- affiliation: Technical University of Denmark, DTU
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j11]Lorenzo Grassi, Christian Rechberger:
Revisiting Gilbert's known-key distinguisher. Des. Codes Cryptogr. 88(7): 1401-1445 (2020) - [j10]Christoph Dobraunig
, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany
:
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta. IET Inf. Secur. 14(2): 202-209 (2020) - [c67]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. ASIACRYPT (1) 2020: 477-506 - [c66]Daniel Kales, Sebastian Ramacher
, Christian Rechberger, Roman Walch, Mario Werner:
Efficient FPGA Implementations of LowMC and Picnic. CT-RSA 2020: 417-441 - [c65]Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger:
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy. EUROCRYPT (2) 2020: 674-704 - [i45]Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics. CoRR abs/2005.02061 (2020) - [i44]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. IACR Cryptol. ePrint Arch. 2020: 182 (2020) - [i43]Lorenzo Grassi, Christian Rechberger, Markus Schofnegger:
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers. IACR Cryptol. ePrint Arch. 2020: 500 (2020) - [i42]Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics. IACR Cryptol. ePrint Arch. 2020: 522 (2020) - [i41]Carlos Cid, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Higher-Order Differentials of Ciphers with Low-Degree S-Boxes. IACR Cryptol. ePrint Arch. 2020: 536 (2020)
2010 – 2019
- 2019
- [c64]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. ASIACRYPT (3) 2019: 371-397 - [c63]Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher
, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. ESORICS (2) 2019: 151-171 - [c62]Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher
, Christian Rechberger:
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC. EUROCRYPT (1) 2019: 343-372 - [c61]Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. USENIX Security Symposium 2019: 1447-1464 - [i40]Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. IACR Cryptol. ePrint Arch. 2019: 397 (2019) - [i39]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. IACR Cryptol. ePrint Arch. 2019: 419 (2019) - [i38]Lorenzo Grassi, Daniel Kales, Dmitry Khovratovich, Arnab Roy, Christian Rechberger, Markus Schofnegger:
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems. IACR Cryptol. ePrint Arch. 2019: 458 (2019) - [i37]Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. IACR Cryptol. ePrint Arch. 2019: 517 (2019) - [i36]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
:
Weak-Key Subspace Trails and Applications to AES. IACR Cryptol. ePrint Arch. 2019: 852 (2019) - [i35]Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger:
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy. IACR Cryptol. ePrint Arch. 2019: 1107 (2019) - [i34]Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner:
Efficient FPGA Implementations of LowMC and Picnic. IACR Cryptol. ePrint Arch. 2019: 1368 (2019) - 2018
- [j9]Christian Rechberger, Hadi Soleimany, Tyge Tiessen:
Cryptanalysis of Low-Data Instances of Full LowMCv2. IACR Trans. Symmetric Cryptol. 2018(3): 163-181 (2018) - [c60]Christoph Dobraunig
, Maria Eichlseder
, Lorenzo Grassi, Virginie Lallemand, Gregor Leander
, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [c59]Qingju Wang
, Lorenzo Grassi, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. CT-RSA 2018: 279-299 - [i33]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i32]Lorenzo Grassi, Christian Rechberger:
New Rigorous Analysis of Truncated Differentials for 5-round AES. IACR Cryptol. ePrint Arch. 2018: 182 (2018) - [i31]Christian Rechberger, Hadi Soleimany, Tyge Tiessen:
Cryptanalysis of Low-Data Instances of Full LowMCv2. IACR Cryptol. ePrint Arch. 2018: 859 (2018) - 2017
- [c58]Melissa Chase, David Derler
, Steven Goldfeder, Claudio Orlandi
, Sebastian Ramacher
, Christian Rechberger, Daniel Slamanig
, Greg Zaverucha:
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. CCS 2017: 1825-1842 - [c57]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. EUROCRYPT (2) 2017: 289-317 - [i30]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. IACR Cryptol. ePrint Arch. 2017: 118 (2017) - [i29]Lorenzo Grassi, Christian Rechberger:
New Limits for AES Known-Key Distinguishers. IACR Cryptol. ePrint Arch. 2017: 255 (2017) - [i28]Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha:
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2017: 279 (2017) - [i27]Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger:
Improvements to the Linear Layer of LowMC: A Faster Picnic. IACR Cryptol. ePrint Arch. 2017: 1148 (2017) - [i26]Qingju Wang, Lorenzo Grassi, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. IACR Cryptol. ePrint Arch. 2017: 1211 (2017) - 2016
- [j8]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Trans. Symmetric Cryptol. 2016(2): 1-29 (2016) - [j7]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
Subspace Trail Cryptanalysis and its Applications to AES. IACR Trans. Symmetric Cryptol. 2016(2): 192-225 (2016) - [c56]Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen:
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. ASIACRYPT (1) 2016: 191-219 - [c55]Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl
, Nigel P. Smart:
MPC-Friendly Symmetric Key Primitives. CCS 2016: 430-443 - [c54]Lorenzo Grassi, Christian Rechberger:
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE. INDOCRYPT 2016: 322-342 - [i25]Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. IACR Cryptol. ePrint Arch. 2016: 98 (2016) - [i24]Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen:
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. IACR Cryptol. ePrint Arch. 2016: 492 (2016) - [i23]Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart:
MPC-Friendly Symmetric Key Primitives. IACR Cryptol. ePrint Arch. 2016: 542 (2016) - [i22]Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
Subspace Trail Cryptanalysis and its Applications to AES. IACR Cryptol. ePrint Arch. 2016: 592 (2016) - [i21]Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner:
Ciphers for MPC and FHE. IACR Cryptol. ePrint Arch. 2016: 687 (2016) - [i20]Lorenzo Grassi, Christian Rechberger:
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE. IACR Cryptol. ePrint Arch. 2016: 964 (2016) - [i19]David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig:
Digital Signatures from Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2016: 1085 (2016) - 2015
- [j6]Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. J. Cryptol. 28(2): 257-296 (2015) - [c53]Christof Beierle
, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander
, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [c52]Muhammad Hassan, Ayesha Khalid, Anupam Chattopadhyay, Christian Rechberger, Tim Güneysu
, Christof Paar:
New ASIC/FPGA Cost Estimates for SHA-1 Collisions. DSD 2015: 669-676 - [c51]Martin R. Albrecht, Christian Rechberger, Thomas Schneider
, Tyge Tiessen, Michael Zohner:
Ciphers for MPC and FHE. EUROCRYPT (1) 2015: 430-454 - [c50]Martin M. Lauridsen, Christian Rechberger:
Linear Distinguishers in the Key-less Setting: Application to PRESENT. FSE 2015: 217-240 - [c49]Ralph Ankele, Stefan Kölbl, Christian Rechberger:
State-Recovery Analysis of Spritz. LATINCRYPT 2015: 204-221 - [e1]Carlos Cid, Christian Rechberger:
Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8540, Springer 2015, ISBN 978-3-662-46705-3 [contents] - [i18]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptol. ePrint Arch. 2015: 212 (2015) - [i17]Ralph Ankele, Stefan Kölbl, Christian Rechberger:
State-recovery analysis of Spritz. IACR Cryptol. ePrint Arch. 2015: 828 (2015) - [i16]Martin M. Lauridsen, Christian Rechberger:
Linear Distinguishers in the Key-less Setting: Application to PRESENT. IACR Cryptol. ePrint Arch. 2015: 908 (2015) - 2014
- [j5]Dmitry Khovratovich, Ivica Nikolic
, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. J. Cryptol. 27(3): 452-479 (2014) - [c48]Stefan Kölbl, Christian Rechberger:
Practical Attacks on AES-like Cryptographic Hash Functions. LATINCRYPT 2014: 259-273 - 2013
- [c47]Dmitry Khovratovich, Christian Rechberger:
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE. Selected Areas in Cryptography 2013: 174-184 - [i15]Dmitry Khovratovich, Christian Rechberger:
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE. IACR Cryptol. ePrint Arch. 2013: 357 (2013) - 2012
- [j4]Elena Andreeva, Andrey Bogdanov
, Bart Mennink, Bart Preneel
, Christian Rechberger:
On security arguments of the second round SHA-3 candidates. Int. J. Inf. Sec. 11(2): 103-120 (2012) - [c46]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen
, Gregor Leander
, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c45]Dmitry Khovratovich, Gaëtan Leurent
, Christian Rechberger:
Narrow-Bicliques: Cryptanalysis of Full IDEA. EUROCRYPT 2012: 392-410 - [c44]Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. FSE 2012: 244-263 - [c43]Christian Rechberger:
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. ICISC 2012: 33-36 - [c42]Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. Selected Areas in Cryptography 2012: 222-233 - [i14]Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On Security Arguments of the Second Round SHA-3 Candidates. IACR Cryptol. ePrint Arch. 2012: 147 (2012) - [i13]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). IACR Cryptol. ePrint Arch. 2012: 529 (2012) - 2011
- [c41]Lei Wei, Christian Rechberger, Jian Guo
, Hongjun Wu, Huaxiong Wang, San Ling
:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ACISP 2011: 433-438 - [c40]Andrey Bogdanov
, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. ASIACRYPT 2011: 344-371 - [i12]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. IACR Cryptol. ePrint Arch. 2011: 201 (2011) - [i11]Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family. IACR Cryptol. ePrint Arch. 2011: 286 (2011) - [i10]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. IACR Cryptol. ePrint Arch. 2011: 449 (2011) - 2010
- [c39]Christian Rechberger:
Second-Preimage Analysis of Reduced SHA-1. ACISP 2010: 104-116 - [c38]Praveen Gauravaram, Gaëtan Leurent
, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010: 419-436 - [c37]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. ASIACRYPT 2010: 1-19 - [c36]Jian Guo
, San Ling
, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. ASIACRYPT 2010: 56-75 - [c35]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Rebound Attacks on the Reduced Grøstl Hash Function. CT-RSA 2010: 350-365 - [c34]Andrey Bogdanov
, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. Selected Areas in Cryptography 2010: 229-240 - [i9]Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. IACR Cryptol. ePrint Arch. 2010: 16 (2010) - [i8]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. IACR Cryptol. ePrint Arch. 2010: 198 (2010) - [i7]Andrey Bogdanov, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. IACR Cryptol. ePrint Arch. 2010: 532 (2010) - [i6]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. IACR Cryptol. ePrint Arch. 2010: 538 (2010)
2000 – 2009
- 2009
- [c33]Florian Mendel, Christian Rechberger, Martin Schläffer:
Cryptanalysis of Twister. ACNS 2009: 342-353 - [c32]Jean-Philippe Aumasson, Orr Dunkelman
, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of Vortex. AFRICACRYPT 2009: 14-28 - [c31]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 - [c30]Florian Mendel, Christian Rechberger, Martin Schläffer:
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. ASIACRYPT 2009: 144-161 - [c29]Lars R. Knudsen
, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120 - [c28]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. FSE 2009: 260-276 - [c27]Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Selected Areas in Cryptography 2009: 16-35 - [i5]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - 2008
- [j3]Christian Rechberger, Vincent Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. J. Univers. Comput. Sci. 14(3): 347-376 (2008) - [j2]Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of the Hash Function Design Strategy Called SMASH. IEEE Trans. Inf. Theory 54(8): 3647-3655 (2008) - [c26]Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar:
Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257 - [c25]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt:
Cryptanalysis of the GOST Hash Function. CRYPTO 2008: 162-178 - [c24]Christophe De Cannière, Christian Rechberger:
Preimages for Reduced SHA-0 and SHA-1. CRYPTO 2008: 179-202 - [c23]Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function. FSE 2008: 224-234 - [c22]Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei
, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. FSE 2008: 470-488 - [c21]Sebastiaan Indesteege, Florian Mendel, Bart Preneel
, Christian Rechberger:
Collisions and Other Non-random Properties for Step-Reduced SHA-256. Selected Areas in Cryptography 2008: 276-293 - [i4]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of Step-Reduced SHA-256. IACR Cryptol. ePrint Arch. 2008: 130 (2008) - [i3]Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger:
Collisions and other Non-Random Properties for Step-Reduced SHA-256. IACR Cryptol. ePrint Arch. 2008: 131 (2008) - 2007
- [c20]Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Second Preimages for SMASH. CT-RSA 2007: 101-111 - [c19]Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann, Marcel Medwed:
Energy evaluation of software implementations of block ciphers under memory constraints. DATE 2007: 1110-1115 - [c18]Christian Rechberger, Vincent Rijmen:
On Authentication with HMAC and Non-random Properties. Financial Cryptography 2007: 119-133 - [c17]Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen:
The Grindahl Hash Functions. FSE 2007: 39-57 - [c16]Christophe De Cannière, Florian Mendel, Christian Rechberger:
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. Selected Areas in Cryptography 2007: 56-73 - [c15]Marko Hölbl, Christian Rechberger, Tatjana Welzer:
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. WEWoRC 2007: 28-38 - [i2]Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. IACR Cryptol. ePrint Arch. 2007: 472 (2007) - 2006
- [j1]Christian Rechberger, Vincent Rijmen, Nicolas Sklavos
:
The NIST Cryptographic Workshop on Hash Functions. IEEE Secur. Priv. 4(1): 54-56 (2006) - [c14]Christophe De Cannière, Christian Rechberger:
Finding SHA-1 Characteristics: General Results and Applications. ASIACRYPT 2006: 1-20 - [c13]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
A compact FPGA implementation of the hash function whirlpool. FPGA 2006: 159-166 - [c12]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of Step-Reduced SHA-256. FSE 2006: 126-143 - [c11]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292 - [c10]Svetla Nikova, Christian Rechberger, Vincent Rijmen:
Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545 - [c9]Florian Mendel, Norbert Pramstaller, Christian Rechberger:
Improved Collision Attack on the Hash Function Proposed at PKC'98. ICISC 2006: 8-21 - [c8]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116 - [c7]Martin Feldhofer, Christian Rechberger:
A Case Against Currently Used Hash Functions in RFID Protocols. OTM Workshops (1) 2006: 372-381 - [i1]Christian Rechberger, Vincent Rijmen:
On Authentication with HMAC and Non-Random Properties. IACR Cryptol. ePrint Arch. 2006: 290 (2006) - 2005
- [c6]Amir Hayat, Christian Rechberger:
Interoperable Certification Authorities In The European Union: A Practical Solution. EGOV (Workshops and Posters) 2005: 374-381 - [c5]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Exploiting Coding Theory for Collision Attacks on SHA-1. IMACC 2005: 78-95 - [c4]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Breaking a New Hash Function Design Strategy Called SMASH. Selected Areas in Cryptography 2005: 233-244 - [c3]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Impact of Rotations in SHA-1 and Related Hash Functions. Selected Areas in Cryptography 2005: 261-275 - [c2]Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134 - 2004
- [c1]Christian Rechberger, Elisabeth Oswald:
Practical Template Attacks. WISA 2004: 440-456