2009 |
29 | EE | Lars R. Knudsen,
Florian Mendel,
Christian Rechberger,
Søren S. Thomsen:
Cryptanalysis of MDC-2.
EUROCRYPT 2009: 106-120 |
2008 |
28 | EE | Emilia Käsper,
Vincent Rijmen,
Tor E. Bjørstad,
Christian Rechberger,
Matthew J. B. Robshaw,
Gautham Sekar:
Correlated Keystreams in Moustique.
AFRICACRYPT 2008: 246-257 |
27 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger,
Marcin Kontak,
Janusz Szmidt:
Cryptanalysis of the GOST Hash Function.
CRYPTO 2008: 162-178 |
26 | EE | Christophe De Cannière,
Christian Rechberger:
Preimages for Reduced SHA-0 and SHA-1.
CRYPTO 2008: 179-202 |
25 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function.
FSE 2008: 224-234 |
24 | EE | Jean-Philippe Aumasson,
Simon Fischer,
Shahram Khazaei,
Willi Meier,
Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
FSE 2008: 470-488 |
23 | EE | Mario Lamberger,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of the Hash Function Design Strategy Called SMASH.
IEEE Transactions on Information Theory 54(8): 3647-3655 (2008) |
22 | | Christian Rechberger,
Vincent Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions.
J. UCS 14(3): 347-376 (2008) |
2007 |
21 | EE | Mario Lamberger,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Second Preimages for SMASH.
CT-RSA 2007: 101-111 |
20 | EE | Johann Großschädl,
Stefan Tillich,
Christian Rechberger,
Michael Hofmann,
Marcel Medwed:
Energy evaluation of software implementations of block ciphers under memory constraints.
DATE 2007: 1110-1115 |
19 | EE | Lars R. Knudsen,
Christian Rechberger,
Søren S. Thomsen:
The Grindahl Hash Functions.
FSE 2007: 39-57 |
18 | EE | Christian Rechberger,
Vincent Rijmen:
On Authentication with HMAC and Non-random Properties.
Financial Cryptography 2007: 119-133 |
17 | EE | Christophe De Cannière,
Florian Mendel,
Christian Rechberger:
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.
Selected Areas in Cryptography 2007: 56-73 |
16 | EE | Marko Hölbl,
Christian Rechberger,
Tatjana Welzer:
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256.
WEWoRC 2007: 28-38 |
2006 |
15 | EE | Christophe De Cannière,
Christian Rechberger:
Finding SHA-1 Characteristics: General Results and Applications.
ASIACRYPT 2006: 1-20 |
14 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
A compact FPGA implementation of the hash function whirlpool.
FPGA 2006: 159-166 |
13 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of Step-Reduced SHA-256.
FSE 2006: 126-143 |
12 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
The Impact of Carries on the Complexity of Collision Attacks on SHA-1.
FSE 2006: 278-292 |
11 | EE | Svetla Nikova,
Christian Rechberger,
Vincent Rijmen:
Threshold Implementations Against Side-Channel Attacks and Glitches.
ICICS 2006: 529-545 |
10 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger:
Improved Collision Attack on the Hash Function Proposed at PKC'98.
ICISC 2006: 8-21 |
9 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
On the Collision Resistance of RIPEMD-160.
ISC 2006: 101-116 |
8 | EE | Martin Feldhofer,
Christian Rechberger:
A Case Against Currently Used Hash Functions in RFID Protocols.
OTM Workshops (1) 2006: 372-381 |
7 | EE | Christian Rechberger,
Vincent Rijmen,
Nicolas Sklavos:
The NIST Cryptographic Workshop on Hash Functions.
IEEE Security & Privacy 4(1): 54-56 (2006) |
2005 |
6 | | Amir Hayat,
Christian Rechberger:
Interoperable Certification Authorities In The European Union: A Practical Solution.
EGOV (Workshops and Posters) 2005: 374-381 |
5 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Exploiting Coding Theory for Collision Attacks on SHA-1.
IMA Int. Conf. 2005: 78-95 |
4 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Breaking a New Hash Function Design Strategy Called SMASH.
Selected Areas in Cryptography 2005: 233-244 |
3 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Impact of Rotations in SHA-1 and Related Hash Functions.
Selected Areas in Cryptography 2005: 261-275 |
2 | | Krystian Matusiewicz,
Josef Pieprzyk,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of simplified variants of SHA-256.
WEWoRC 2005: 123-134 |
2004 |
1 | EE | Christian Rechberger,
Elisabeth Oswald:
Practical Template Attacks.
WISA 2004: 440-456 |