We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Eichlseder M., Kales D.
IACR Transactions on Symmetric Cryptology, Vol. 2018(2), 2018
Differential Cryptanalysis of Symmetric Primitives
Eichlseder M.
Doctoral Thesis, 2018
Note on the Robustness of CAESAR Candidates
Kales D., Eichlseder M., Mendel F.
2017
ISAP - Towards Side-Channel Secure Authenticated Encryption
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 2017
Cryptanalysis of Simpira v1
Eichlseder M., Dobraunig C., Mendel F.
Selected Areas in Cryptography - SAC 2016
Side-Channel Analysis of Keymill
Dobraunig C., Eichlseder M., Korak T., Mendel F.
Constructive Side-Channel Analysis and Secure Design
Analysis of the Kupyna-256 Hash Function
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption
Square Attack on 7-Round Kiasu-BC
Dobraunig C., Eichlseder M., Mendel F.
ACNS 2016
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Dobraunig C., Eichlseder M., Korak T., Lomné V., Mendel F.
Advances in Cryptology - ASIACRYPT 2016
Practical Key Recovery Attack on MANTIS-5
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 2016
Analysis of SHA-512/224 and SHA-512/256
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015
Higher-Order Cryptanalysis of LowMC
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015
Forgery Attacks on round-reduced ICEPOLE-128
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015
Cryptanalysis of Ascon
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015
Related-Key Forgeries for Proest-OTR
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015
On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014
Key Recovery Attacks on Recent Authenticated Ciphers
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014
Malicious Hashing: Eve's Variant of SHA-1
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography
