We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Nageler M., Ghosh S., Jüttler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(1), 471-514
Selected Areas in Cryptography - SAC 2024, Part II
Eichlseder M., Gambs S.
, Springer, (Lecture Notes in Computer Science; vol. 15517 LNCS)
Selected Areas in Cryptography - SAC 2024, Part I
Eichlseder M., Gambs S.
, Springer, (Lecture Notes in Computer Science; vol. 15516 LNCS)
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
Chakraborty D., Hadipour H., Nguyen P., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 84-176
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hadipour H., Derbez P., Eichlseder M.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings, 44th Annual International Cryptology Conference, 38–72, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14923 LNCS)
Authenticated Encryption Schemes
Eichlseder M.
Symmetric Cryptography, Volume 1: Design and Security Proofs, ISTE; Wiley, 87-97
Ascon MAC, PRF, and Short-Input PRF
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings, Springer, 381-403, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS)
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks
Hadipour H., Gerhalter S., Sadeghi S., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(1)
The QARMAv2 Family of Tweakable Block Ciphers
Avanzi R., Banik S., Dunkelman O., Eichlseder M., Ghosh S., Nageler M., Regazzoni F.
IACR Transactions on Symmetric Cryptology, Vol. 2023(3), 25-73
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hadipour H., Sadeghi S., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings, 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 128-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2023)
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
Giner L., Steinegger S., Purnal A., Eichlseder M., Unterluggauer T., Mangard S., Gruß D.
2023 IEEE Symposium on Security and Privacy (SP), 44th IEEE Symposium on Security and Privacy, 2273-2287
Finding Collisions for Round-Reduced Romulus-H
Nageler M., Pallua F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2023(1), 67-88
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
Integrity of virtual testing for crash protection
Galijatovic E., Eichlseder M., Heindl S., Klug C.
Frontiers in Future Transportation, Vol. 3
Throwing Boomerangs into Feistel Structures
Hadipour H., Nageler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(3), 271-302
Integral Cryptanalysis of WARP based on Monomial Prediction
Hadipour H., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(2), 92-112
Information-Combining Differential Fault Attacks on DEFAULT
Nageler M., Dobraunig C., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings, 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 168-191, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS)
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
Erlacher J., Mendel F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 64-87
Practical Key Recovery Attacks on FlexAEAD
Dunkelman O., Eichlseder M., Kales D., Keller N., Leurent G., Schofnegger M.
Designs, Codes and Cryptography