We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
MPC-Friendly Symmetric Key Primitives
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 430-443
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, 2016 International Conference on the Theory and Application of Cryptology and Information Security, 191-219, (Lecture Notes in Computer Science; vol. 10031)
Rebound Attacks on the Reduced Grøstl Hash Function
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010, 10th Cryptographers' Track at the RSA Conference, 350-365, (Lecture Notes in Computer Science; vol. 5985)
Cryptanalysis of Hash Functions
Rechberger C.
, Doctoral Thesis
Cryptanalysis of Twister
Mendel F., Rechberger C., Schläffer M.
Applied Cryptography and Network Security, 7th International Conference on Applied Cryptography and Network Security, 342-353, (Lecture Notes in Computer Science; vol. 5536)
Cryptanalysis of Vortex
Aumasson J., Dunkelman O., Mendel F., Rechberger C., Thomsen S.
Lecture Notes in Computer Science, 2nd International Conference on Cryptology in Africa, 14-28, (LNCS)
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009, 16th International Fast Software Encryption Workshop, 260-276, (Lecture Notes in Computer Science; vol. 5665)
Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?
Rechberger C.
Tagungsband 11. Deutscher IT-Sicherheitskongress, Deutscher IT-Sicherheitskongress
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Lamberger M., Mendel F., Rechberger C., Rijmen V., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 126-143, (Lecture Notes in Computer Science; vol. 5912)
Cryptanalysis of MDC-2
Knudsen L., Mendel F., Rechberger C., Thomsen S.
Advances in Cryptology - EUROCRYPT 2009, Eurocrypt - International Conference on the Theory and Applications of Cryptographic Techniques, 106-120, (LNCS)
MD5 is Weaker than Weak: Attacks on Concatenated Combiners
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 144-161, (Lecture Notes in Computer Science; vol. 5912)
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009, International Workshop on Selected Areas in Cryptography, 16-35, (Lecture Notes in Computer Science; vol. 5867)
Analysis of the Hash Function Design Strategy called SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 3647-3655
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Rechberger C., Rijmen V.
Journal of Universal Computer Science , Vol. 14(3), 347-376
A (Second) Preimage Attack on the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C.
Fast Software Encryption. FSE 2008, 2008 Fast Software Encryption Workshop, 224-234, (Lecture Notes in Computer Science; vol. 5086)
Correlated keystreams in Moustique
Käsper E., Rijmen V., Bjørstad T., Rechberger C., Robshaw M., Sekar G.
Progress in Cryptology – AFRICACRYPT 2008, 1st International Conference on Cryptology in Africa, 246-257, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5023 LNCS)
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop, Springer, 470-488
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Indesteege S., Mendel F., Preneel B., Rechberger C.
Selected Areas in Cryptography, 15th Annual Workshop on Selected Areas in Cryptography, 276-293, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5381 LNCS)