We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Searching for messages conforming to arbitrary sets of conditions in SHA-256
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology, Western European Workshop on Research in Cryptology, 28-38, (Lecture notes in computer science)
Preimages for Reduced SHA-0 and SHA-1
De Cannière C., Rechberger C.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 179-202, (Lecture Notes in Computer Science; vol. 5157)
Cryptanalysis of the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C., Kontak M., Szmidt J.
Advances in Cryptology - Proceedings CRYPTO 2008, 28th Annual International Cryptology Conference, 162-178, (Lecture Notes in Computer Science; vol. 5157)
Current Status of SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Collisions for 70-step SHA-1: On the Full Cost of Collision Search
De Cannière C., Mendel F., Rechberger C.
Selected Areas in Cryptography, 14th International Workshop on Selected Areas in Cryptography, 56-73, (Lecture Notes in Computer Science; vol. 4876)
The Grindahl hash functions
Knudsen L., Rechberger C., Thomsen S.
Fast Software Encryption (FSE) 2007, Fast Software Encryption Workshop, 39-57, (LNCS)
On Authentication With HMAC and Non-Rondom Properties
Rechberger C., Rijmen V.
Financial Cryptography 2007, International Conference on Financial Cryptography and Data Security, 119-113, (LNCS)
The SHA Family of Hash Functions: Recent Results
Rechberger C., Rijmen V.
Proceedings of Security and Protection of Information 2007, Security and Protection of Information Conference, 107-114
Second Preimages for SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
Cryptographers´ Track at the RSA Conference, The Cryptographers' Track at the RSA Conference 2007, 101-111, (LNCS)
Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints
Großschädl J., Tillich S., Rechberger C., Hofmann M., Medwed M.
Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007), 10th Conference on Design, Automation and Test in Europe, 1110-1115
D.VAM11 -- Suggested Algorithms for Light-Weight Cryptography
Aigner M., Dominikus S., Feldhofer M., Rechberger C., Oswald M.
, (ECRYPT Deliverable)
The NIST Cryptographic Workshop on Hash Functions
Rechberger C., Rijmen V., Sklavos N.
IEEE Security & Privacy, Vol. 4(1), 54-56
Finding SHA-1 Characteristics: General Results and Applications
De Cannière C., Rechberger C.
Advances in Cryptology - Asiacrypt 2006, International Conference on the Theory and Application of Cryptology and Information Security, 1-20, (Lecture notes in computer science)
Threshold Implementations Against Side-Channel Attacks and Glitches
Nikova S., Rechberger C., Rijmen V.
Information and Communications Security, International Conference on Information and Communications Security, 529-545, (LNCS)
A Compact FPGA Implementation of the Hash Function Whirlpool
Pramstaller N., Rechberger C., Rijmen V.
Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Association of Computing Machinery, 159-166
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006, 13th International Fast Software Encryption Workshop, 278-292, (Lecture Notes in Computer Science; vol. 4047)
A Case Against Currently Used Hash Functions in RFID Protocols
Feldhofer M., Rechberger C.
On the Move to Meaningful Internet Systems 2006, OTM, 372-381, (Lecture Notes in Computer Science)
On the Collision Resistance of RIPEMD-160
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Information Security. ISC 2006, 9th International Information Security Conference, 101-116, (Lecture Notes in Computer Science; vol. 4176)
Improved Collision-Attack on the Hash Function Proposed at PKC'98
Mendel F., Pramstaller N., Rechberger C.
Information Security and Cryptology – ICISC 2006, 9th International Conference on Information Security and Cryptology, 8-21, (Lecture Notes in Computer Science; vol. 4296)
Analysis of Step-Reduced SHA-256
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006, 13th International Fast Software Encryption Workshop, 126-143, (Lecture Notes in Computer Science; vol. 4047)