default search action
Martin Schläffer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. CT-RSA 2024: 381-403 - [i19]Barbara Gigerl, Florian Mendel, Martin Schläffer, Robert Primas:
Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice. IACR Cryptol. ePrint Arch. 2024: 755 (2024) - [i18]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Preliminary Analysis of Ascon-Xof and Ascon-Hash. IACR Cryptol. ePrint Arch. 2024: 908 (2024) - 2023
- [i17]Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, Rishub Nagpal:
Efficient Low-Latency Masking of Ascon without Fresh Randomness. IACR Cryptol. ePrint Arch. 2023: 1914 (2023) - 2021
- [j3]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon v1.2: Lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3): 33 (2021) - [i16]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon PRF, MAC, and Short-Input MAC. IACR Cryptol. ePrint Arch. 2021: 1574 (2021)
2010 – 2019
- 2015
- [j2]Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. J. Cryptol. 28(2): 257-296 (2015) - [c37]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. CT-RSA 2015: 371-387 - [i15]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. IACR Cryptol. ePrint Arch. 2015: 30 (2015) - [i14]Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. IACR Cryptol. ePrint Arch. 2015: 350 (2015) - 2014
- [c36]Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. FSE 2014: 473-488 - [c35]Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. FSE 2014: 509-521 - [c34]Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014: 274-287 - [c33]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. Selected Areas in Cryptography 2014: 1-19 - [c32]Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. Selected Areas in Cryptography 2014: 165-182 - [i13]Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. IACR Cryptol. ePrint Arch. 2014: 302 (2014) - [i12]Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. IACR Cryptol. ePrint Arch. 2014: 305 (2014) - [i11]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. IACR Cryptol. ePrint Arch. 2014: 694 (2014) - [i10]Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. IACR Cryptol. ePrint Arch. 2014: 722 (2014) - 2013
- [c31]David Gstir, Martin Schläffer:
Fast Software Encryption Attacks on AES. AFRICACRYPT 2013: 359-374 - [c30]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c29]Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser:
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl. CT-RSA 2013: 145-161 - [c28]Florian Mendel, Tomislav Nad, Martin Schläffer:
Finding Collisions for Round-Reduced SM3. CT-RSA 2013: 174-188 - [c27]Florian Mendel, Tomislav Nad, Martin Schläffer:
Improving Local Collisions: New Attacks on Reduced SHA-256. EUROCRYPT 2013: 262-278 - [c26]Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer:
Differential Cryptanalysis of Keccak Variants. IMACC 2013: 141-157 - [i9]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2013: 600 (2013) - 2012
- [c25]Florian Mendel, Tomislav Nad, Martin Schläffer:
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. FSE 2012: 226-243 - [c24]Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer:
Differential Attacks on Reduced RIPEMD-160. ISC 2012: 23-38 - 2011
- [j1]Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. J. Cryptol. 24(2): 292-321 (2011) - [c23]Florian Mendel, Tomislav Nad, Martin Schläffer:
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. ASIACRYPT 2011: 288-307 - [c22]Kazumaro Aoki, Krystian Matusiewicz, Günther Roland, Yu Sasaki, Martin Schläffer:
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl. ICETE (Selected Papers) 2011: 281-295 - [c21]Florian Mendel, Tomislav Nad, Martin Schläffer:
Cryptanalysis of Round-Reduced HAS-160. ICISC 2011: 33-47 - [c20]Jérémy Jean, María Naya-Plasencia, Martin Schläffer:
Improved Analysis of ECHO-256. Selected Areas in Cryptography 2011: 19-36 - [c19]Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer:
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. SECRYPT 2011: 124-133 - [i8]Jérémy Jean, María Naya-Plasencia, Martin Schläffer:
Improved Analysis of ECHO-256. IACR Cryptol. ePrint Arch. 2011: 422 (2011) - 2010
- [c18]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. ACISP 2010: 87-103 - [c17]Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010: 419-436 - [c16]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Rebound Attacks on the Reduced Grøstl Hash Function. CT-RSA 2010: 350-365 - [c15]Martin Schläffer:
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function. Selected Areas in Cryptography 2010: 369-387 - [c14]Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, Martin Schläffer:
Cryptanalysis of Luffa v2 Components. Selected Areas in Cryptography 2010: 388-409 - [i7]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. IACR Cryptol. ePrint Arch. 2010: 91 (2010) - [i6]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. IACR Cryptol. ePrint Arch. 2010: 198 (2010) - [i5]Martin Schläffer:
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function. IACR Cryptol. ePrint Arch. 2010: 321 (2010) - [i4]Martin Schläffer:
Improved Collisions for Reduced ECHO-256. IACR Cryptol. ePrint Arch. 2010: 588 (2010)
2000 – 2009
- 2009
- [c13]Florian Mendel, Christian Rechberger, Martin Schläffer:
Cryptanalysis of Twister. ACNS 2009: 342-353 - [c12]Florian Mendel, Tomislav Nad, Martin Schläffer:
Collision Attack on Boole. ACNS 2009: 369-381 - [c11]Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer:
Rebound Attack on the Full Lane Compression Function. ASIACRYPT 2009: 106-125 - [c10]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 - [c9]Florian Mendel, Christian Rechberger, Martin Schläffer:
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. ASIACRYPT 2009: 144-161 - [c8]Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. FSE 2009: 260-276 - [c7]Florian Mendel, Martin Schläffer:
On Free-Start Collisions and Collisions for TIB3. ISC 2009: 95-106 - [c6]Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer:
Practical Collisions for SHAMATA-256. Selected Areas in Cryptography 2009: 1-15 - [c5]Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Selected Areas in Cryptography 2009: 16-35 - [i3]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - [i2]Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer:
Rebound Attack on the Full LANE Compression Function. IACR Cryptol. ePrint Arch. 2009: 443 (2009) - 2008
- [c4]Florian Mendel, Martin Schläffer:
Collisions for Round-Reduced LAKE. ACISP 2008: 267-281 - [c3]Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. ICISC 2008: 218-234 - [c2]Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Using Normal Bases for Compact Hardware Implementations of the AES S-Box. SCN 2008: 236-245 - [i1]Florian Mendel, Martin Schläffer:
Collisions for Round-Reduced LAKE. IACR Cryptol. ePrint Arch. 2008: 109 (2008) - 2006
- [c1]Martin Schläffer, Elisabeth Oswald:
Searching for Differential Paths in MD4. FSE 2006: 242-261
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint