We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
MD5 is Weaker than Weak: Attacks on Concatenated Combiners
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 144-161, (Lecture Notes in Computer Science; vol. 5912)
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009, International Workshop on Selected Areas in Cryptography, 16-35, (Lecture Notes in Computer Science; vol. 5867)
Collision Attack on Boole
Nad T., Mendel F., Schläffer M.
Applied Cryptography and Network Security. ACNS 2009, 7th International Conference on Applied Cryptography and Network Security, 369-381, (Lecture Notes in Computer Science; vol. 5536)
A Distinguisher for the Compression Function of SIMD-512
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, 219-232, (Lecture Notes in Computer Science; vol. 5922)
InFeCT - Network Traffic Classification
Payer U., Teufl P.
International Conference on Networking, International Conference on Networking, ...-...
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme
Tögl R., Hofferek G., Greimel K., Leung A., Phan R., Bloem R.
International Symposium on Trusted Computing (TrustCom 2008) Proceedings, in 9th ICYCS Conference Proceedings, International Symposium on Trusted Computing, 2289-2294
Debugging Design Errors by Using Unsatisfiable Cores
Suelflow A., Fey G., Bloem R., Drechsler R.
Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, Workshop Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, 159-168
Analysis of the Hash Function Design Strategy called SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 3647-3655
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Rechberger C., Rijmen V.
Journal of Universal Computer Science , Vol. 14(3), 347-376
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop, Springer, 470-488
Searching for messages conforming to arbitrary sets of conditions in SHA-256
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology, Western European Workshop on Research in Cryptology, 28-38, (Lecture notes in computer science)
Automatic Fault Localization for Property Checking
Fey G., Staber S., Bloem R., Drechsler R.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 27(6), 1138-1149
Open Implication
Greimel K., Bloem R., Jobstmann B., Vardi M.
Automata, Languages and Programming - ICALP 2008, 2008 International Colloquium on Automata, Languages and Programming, 361-372, (Lecture Notes in Computer Science; vol. 5126)
Using unsatisfiable cores to debug multiple design errors
Suelflow A., Fey G., Bloem R., Drechsler R.
GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI, 18th ACM Great Lakes Symposium on VLSI, 77-82
A Practical Fault Attack on Square and Multiply
Schmidt J., Herbst C.
5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008, Fault Diagnosis and Tolerance in Cryptography, 53-58
A (Second) Preimage Attack on the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C.
Fast Software Encryption. FSE 2008, 2008 Fast Software Encryption Workshop, 224-234, (Lecture Notes in Computer Science; vol. 5086)
Correlated keystreams in Moustique
Käsper E., Rijmen V., Bjørstad T., Rechberger C., Robshaw M., Sekar G.
Progress in Cryptology – AFRICACRYPT 2008, 1st International Conference on Cryptology in Africa, 246-257, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5023 LNCS)
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Indesteege S., Mendel F., Preneel B., Rechberger C.
Selected Areas in Cryptography, 15th Annual Workshop on Selected Areas in Cryptography, 276-293, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5381 LNCS)