We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Note on the Robustness of CAESAR Candidates
Kales D., Eichlseder M., Mendel F.
, (IACR Cryptology ePrint Archive)
ISAP - Towards Side-Channel Secure Authenticated Encryption
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 80-105
Cryptanalysis of Simpira v1
Eichlseder M., Dobraunig C., Mendel F.
Selected Areas in Cryptography - SAC 2016, 23rd Conference on Selected Areas in Cryptography, 284-298, (Lecture Notes in Computer Science; vol. 10532)
Side-Channel Analysis of Keymill
Dobraunig C., Eichlseder M., Korak T., Mendel F.
Constructive Side-Channel Analysis and Secure Design, 138-152, (Lecture Notes in Computer Science; vol. 10348)
Analysis of the Kupyna-256 Hash Function
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption, Fast Software Encryption Workshop, (LNCS; vol. 9783)
Square Attack on 7-Round Kiasu-BC
Dobraunig C., Eichlseder M., Mendel F.
ACNS 2016, Springer, (LNCS; vol. 9696)
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Dobraunig C., Eichlseder M., Korak T., Lomné V., Mendel F.
Advances in Cryptology - ASIACRYPT 2016, 2016 International Conference on the Theory and Application of Cryptology and Information Security, 369-395, (Lecture Notes in Computer Science; vol. 10031)
Practical Key Recovery Attack on MANTIS-5
Dobraunig C., Eichlseder M., Kales D., Mendel F.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 248-260
Analysis of SHA-512/224 and SHA-512/256
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 612-630, (LNCS)
Higher-Order Cryptanalysis of LowMC
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015, International Conference on Information Security and Cryptology, 87-101, (LNCS; vol. 9558)
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 490-509, ( Lecture Notes in Computer Science; vol. 9453)
Forgery Attacks on round-reduced ICEPOLE-128
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015, 22nd International Workshop on Selected Areas in Cryptography, 479-492, (Lecture Notes in Computer Science; vol. 9566)
Cryptanalysis of Ascon
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015, Cryptographers´ Track at the RSA Conference, 371-387, (Lecture Notes in Computer Science; vol. 9048)
Related-Key Forgeries for Proest-OTR
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015, 2015 Fast Software Encryption Workshop, 282-296, (Lecture Notes in Computer Science(; vol. 9054)
On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014, 2014 International Conference on Smart Card Research and Advanced Applications, 233-244, ( Lecture Notes in Computer Science; vol. 8968)
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014, 2014 Fast Software Encryption Workshop, 473-488, (Lecture Notes in Computer Science; vol. 8540)
Key Recovery Attacks on Recent Authenticated Ciphers
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014, International Conference on Cryptology and Information Security in Latin America, 274-287, (LNCS)
Malicious Hashing: Eve's Variant of SHA-1
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 1-19, (Lecture Notes in Computer Science; vol. 8781)
Linear Propagation in Efficient Guess-and-Determine Attacks
Eichlseder M., Mendel F., Nad T., Rijmen V., Schläffer M.
International Workshop on Coding and Cryptography, 2013 International Workshop on Coding and Cryptography, 193-202