We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hadipour H., Eichlseder M.
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings, 20th International Conference on Applied Cryptography and Network Security, 230-250, (Lecture Notes in Computer Science; vol. 13269 )
Statistical Effective Fault Attacks: The other Side of the Coin
Vafaei N., Zarei S., Bagheri N., Eichlseder M., Primas R., Soleimany H.
IEEE Transactions on Information Forensics and Security, Vol. 17, 1855-1867
L*-Based Learning of Markov Decision Processes (Extended Version)
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Aspects of Computing, Vol. 33(4-5), 575-615
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Journal of Cryptology, Vol. 34(3)
PRINCEv2 - More Security for (Almost) No Overhead
Božilov D., Eichlseder M., Knezevic M., Lambin B., Leander G., Moos T., Nikov V., Rasoolzadeh S., Todo Y., Wiemer F.
Selected Areas in Cryptography , 27th International Conference on Selected Areas in Cryptography, 483-511, (Lecture Notes in Computer Science; vol. 12804)
ISAP v2.0
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Mennink B., Primas R., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2020(Special Issue 1), 390-416
Algebraic Cryptanalysis of Variants of Frit
Dobraunig C., Eichlseder M., Mendel F., Schofnegger M.
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers, 26th International Conference on Selected Areas in Cryptography, 149-170, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11959 LNCS)
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Eichlseder M., Grassi L., Lüftenegger R., Øygarden M., Rechberger C., Schofnegger M., Wang Q.
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings, ASIACRYPT 2020 , 477-506, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12491 LNCS)
Protecting against Statistical Ineffective Fault Attacks
Daemen J., Dobraunig C., Eichlseder M., Groß H., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020(3), 508-543
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Beyne T., Canteaut A., Dinur I., Eichlseder M., Leander G., Leurent G., Naya-Plasencia M., Sasaki Y., Todo Y., Wiemer F.
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings, Springer, 299-328, (Lecture Notes in Computer Science; vol. 12172)
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
Eichlseder M., Leander G., Rasoolzadeh S.
Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings, 21st International Conference on Cryptology in India, 345-369, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS)
Forgery Attacks on FlexAE and FlexAEAD
Eichlseder M., Kales D., Schofnegger M.
Cryptography and Coding - IMACC 2019, IMACC 2019, 200-214, (Lecture Notes in Computer Science; vol. 11929)
L*-Based Learning of Markov Decision Processes
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Methods - The Next 30 Years , International Symposium on Formal Methods, 651 - 669, (Lecture Notes in Computer Science; vol. 11800)
Analyzing the Linear Keystream Biases in AEGIS
Eichlseder M., Nageler M., Primas R.
IACR Transactions on Symmetric Cryptology, Vol. 2019(4), 348-368
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Dobraunig C., Eichlseder M., Korak T., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(3), 547-572
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Dobraunig C., Eichlseder M., Groß H., Mangard S., Mendel F., Primas R.
Advances in Cryptology – ASIACRYPT 2018, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 315-342, (Lecture Notes in Computer Science; vol. 11273)
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018, 38th International Cryptology Conference, 662-692, (Lecture Notes in Computer Science; vol. 10991)
Cryptanalysis of MORUS
Ashur T., Eichlseder M., Lauridsen M., Leurent G., Minaud B., Rotella Y., Viguier B.
Advances in Cryptology – ASIACRYPT 2018, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 35-64, (Lecture Notes in Computer Science; vol. 11273)
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Eichlseder M., Kales D.
IACR Transactions on Symmetric Cryptology, Vol. 2018(2), 111-132
Differential Cryptanalysis of Symmetric Primitives
Eichlseder M.
, Doctoral Thesis