dblp.uni-trier.dewww.uni-trier.de

Christian Rechberger

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EELars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen: Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120
2008
28EEEmilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar: Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257
27EEFlorian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt: Cryptanalysis of the GOST Hash Function. CRYPTO 2008: 162-178
26EEChristophe De Cannière, Christian Rechberger: Preimages for Reduced SHA-0 and SHA-1. CRYPTO 2008: 179-202
25EEFlorian Mendel, Norbert Pramstaller, Christian Rechberger: A (Second) Preimage Attack on the GOST Hash Function. FSE 2008: 224-234
24EEJean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger: New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. FSE 2008: 470-488
23EEMario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of the Hash Function Design Strategy Called SMASH. IEEE Transactions on Information Theory 54(8): 3647-3655 (2008)
22 Christian Rechberger, Vincent Rijmen: New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. J. UCS 14(3): 347-376 (2008)
2007
21EEMario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Second Preimages for SMASH. CT-RSA 2007: 101-111
20EEJohann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann, Marcel Medwed: Energy evaluation of software implementations of block ciphers under memory constraints. DATE 2007: 1110-1115
19EELars R. Knudsen, Christian Rechberger, Søren S. Thomsen: The Grindahl Hash Functions. FSE 2007: 39-57
18EEChristian Rechberger, Vincent Rijmen: On Authentication with HMAC and Non-random Properties. Financial Cryptography 2007: 119-133
17EEChristophe De Cannière, Florian Mendel, Christian Rechberger: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. Selected Areas in Cryptography 2007: 56-73
16EEMarko Hölbl, Christian Rechberger, Tatjana Welzer: Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. WEWoRC 2007: 28-38
2006
15EEChristophe De Cannière, Christian Rechberger: Finding SHA-1 Characteristics: General Results and Applications. ASIACRYPT 2006: 1-20
14EENorbert Pramstaller, Christian Rechberger, Vincent Rijmen: A compact FPGA implementation of the hash function whirlpool. FPGA 2006: 159-166
13EEFlorian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of Step-Reduced SHA-256. FSE 2006: 126-143
12EEFlorian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292
11EESvetla Nikova, Christian Rechberger, Vincent Rijmen: Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545
10EEFlorian Mendel, Norbert Pramstaller, Christian Rechberger: Improved Collision Attack on the Hash Function Proposed at PKC'98. ICISC 2006: 8-21
9EEFlorian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116
8EEMartin Feldhofer, Christian Rechberger: A Case Against Currently Used Hash Functions in RFID Protocols. OTM Workshops (1) 2006: 372-381
7EEChristian Rechberger, Vincent Rijmen, Nicolas Sklavos: The NIST Cryptographic Workshop on Hash Functions. IEEE Security & Privacy 4(1): 54-56 (2006)
2005
6 Amir Hayat, Christian Rechberger: Interoperable Certification Authorities In The European Union: A Practical Solution. EGOV (Workshops and Posters) 2005: 374-381
5EENorbert Pramstaller, Christian Rechberger, Vincent Rijmen: Exploiting Coding Theory for Collision Attacks on SHA-1. IMA Int. Conf. 2005: 78-95
4EENorbert Pramstaller, Christian Rechberger, Vincent Rijmen: Breaking a New Hash Function Design Strategy Called SMASH. Selected Areas in Cryptography 2005: 233-244
3EENorbert Pramstaller, Christian Rechberger, Vincent Rijmen: Impact of Rotations in SHA-1 and Related Hash Functions. Selected Areas in Cryptography 2005: 261-275
2 Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134
2004
1EEChristian Rechberger, Elisabeth Oswald: Practical Template Attacks. WISA 2004: 440-456

Coauthor Index

1Jean-Philippe Aumasson [24]
2Tor E. Bjørstad [28]
3Christophe De Cannière [15] [17] [26]
4Martin Feldhofer [8]
5Simon Fischer (Simon Künzli) [24]
6Johann Großschädl [20]
7Amir Hayat [6]
8Michael Hofmann [20]
9Marko Hölbl [16]
10Emilia Käsper [28]
11Shahram Khazaei [24]
12Lars R. Knudsen [19] [29]
13Marcin Kontak [27]
14Mario Lamberger [21] [23]
15Krystian Matusiewicz [2]
16Marcel Medwed [20]
17Willi Meier [24]
18Florian Mendel [9] [10] [12] [13] [17] [25] [27] [29]
19Svetla Nikova [11]
20Elisabeth Oswald [1]
21Josef Pieprzyk [2]
22Norbert Pramstaller [2] [3] [4] [5] [9] [10] [12] [13] [14] [21] [23] [25] [27]
23Vincent Rijmen [2] [3] [4] [5] [7] [9] [11] [12] [13] [14] [18] [21] [22] [23] [28]
24Matthew J. B. Robshaw [28]
25Gautham Sekar [28]
26Nicolas Sklavos [7]
27Janusz Szmidt [27]
28Søren S. Thomsen [19] [29]
29Stefan Tillich [20]
30Tatjana Welzer (Tatjana Welzer-Druzovec) [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)