We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Gerhalter S., Hodžić S., Medwed M., Nageler M., Folwarczny A., Nikov V., Hoogerbrugge J., Schneider T., McConville G., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(4), 2025
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography – SAC 2025
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Nageler M., Ghosh S., Jüttler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(1), 2025
Selected Areas in Cryptography - SAC 2024, Part II
Eichlseder M., Gambs S.
Springer, 2025
Selected Areas in Cryptography - SAC 2024, Part I
Eichlseder M., Gambs S.
Springer, 2025
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
Chakraborty D., Hadipour H., Nguyen P., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 2024
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hadipour H., Derbez P., Eichlseder M.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
Authenticated Encryption Schemes
Eichlseder M.
Symmetric Cryptography, Volume 1: Design and Security Proofs, ISTE; Wiley, 87-97, 2024
Ascon MAC, PRF, and Short-Input PRF
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks
Hadipour H., Gerhalter S., Sadeghi S., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(1), 2023
The QARMAv2 Family of Tweakable Block Ciphers
Avanzi R., Banik S., Dunkelman O., Eichlseder M., Ghosh S., Nageler M., Regazzoni F.
IACR Transactions on Symmetric Cryptology, Vol. 2023(3), 2023
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hadipour H., Sadeghi S., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
Giner L., Steinegger S., Purnal A., Eichlseder M., Unterluggauer T., Mangard S., Gruß D.
IEEE S&P
Finding Collisions for Round-Reduced Romulus-H
Nageler M., Pallua F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2023(1), 2023
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy
Integrity of virtual testing for crash protection
Galijatovic E., Eichlseder M., Heindl S., Klug C.
Frontiers in Future Transportation, Vol. 3, 2022
Throwing Boomerangs into Feistel Structures
Hadipour H., Nageler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(3), 2022
Integral Cryptanalysis of WARP based on Monomial Prediction
Hadipour H., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(2), 2022
Information-Combining Differential Fault Attacks on DEFAULT
Nageler M., Dobraunig C., Eichlseder M.
EUROCRYPT 2022
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
Erlacher J., Mendel F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 2022
