We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018
Zero-Sum Partitions of PHOTON Permutations
Wang Q., Grassi L., Rechberger C.
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Zaverucha G.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017
A new structural-differential property of 5-round AES
Grassi L., Rechberger C., Rønjom S.
Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
Grassi L., Rechberger C.
Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, Springer International Publishing AG , 322-342, 2016
Subspace Trail Cryptanalysis and its Applications to AES
Grassi L., Rechberger C., Rønjom S.
FSE 2017 - 24th International Conference on Fast Software Encryption
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
Kölbl S., Lauridsen M., Mendel F., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 2016
MPC-Friendly Symmetric Key Primitives
Grassi L., Rechberger C., Rotaru D., Scholl P., Smart N.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Albrecht M., Grassi L., Rechberger C., Roy A., Tiessen T.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
Rebound Attacks on the Reduced Grøstl Hash Function
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010
Cryptanalysis of Hash Functions
Rechberger C.
Doctoral Thesis, 2009
Cryptanalysis of Twister
Mendel F., Rechberger C., Schläffer M.
Applied Cryptography and Network Security
Cryptanalysis of Vortex
Aumasson J., Dunkelman O., Mendel F., Rechberger C., Thomsen S.
Lecture Notes in Computer Science
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009
Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?
Rechberger C.
Tagungsband 11. Deutscher IT-Sicherheitskongress
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Lamberger M., Mendel F., Rechberger C., Rijmen V., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009
MD5 is Weaker than Weak: Attacks on Concatenated Combiners
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009
Cryptanalysis of MDC-2
Knudsen L., Mendel F., Rechberger C., Thomsen S.
Advances in Cryptology - EUROCRYPT 2009
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009
