We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
A (Second) Preimage Attack on the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C.
Fast Software Encryption. FSE 2008
Correlated keystreams in Moustique
Käsper E., Rijmen V., Bjørstad T., Rechberger C., Robshaw M., Sekar G.
Progress in Cryptology – AFRICACRYPT 2008
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Indesteege S., Mendel F., Preneel B., Rechberger C.
Selected Areas in Cryptography
Searching for messages conforming to arbitrary sets of conditions in SHA-256
Hölbl M., Rechberger C., Welzer T.
Proceedings of Western European Workshop on Research in Cryptology
Preimages for Reduced SHA-0 and SHA-1
De Cannière C., Rechberger C.
Advances in Cryptology - Proceedings CRYPTO 2008
Cryptanalysis of the GOST Hash Function
Mendel F., Pramstaller N., Rechberger C., Kontak M., Szmidt J.
Advances in Cryptology - Proceedings CRYPTO 2008
Current Status of SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
2007
Collisions for 70-step SHA-1: On the Full Cost of Collision Search
De Cannière C., Mendel F., Rechberger C.
Selected Areas in Cryptography
The Grindahl hash functions
Knudsen L., Rechberger C., Thomsen S.
Fast Software Encryption (FSE) 2007
On Authentication With HMAC and Non-Rondom Properties
Rechberger C., Rijmen V.
Financial Cryptography 2007
The SHA Family of Hash Functions: Recent Results
Rechberger C., Rijmen V.
Proceedings of Security and Protection of Information 2007
Second Preimages for SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
Cryptographers´ Track at the RSA Conference
Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints
Großschädl J., Tillich S., Rechberger C., Hofmann M., Medwed M.
Proceedings of the 10th Conference on Design, Automation and Test in Europe (DATE 2007)
D.VAM11 -- Suggested Algorithms for Light-Weight Cryptography
Aigner M., Dominikus S., Feldhofer M., Rechberger C., Oswald M.
2006
The NIST Cryptographic Workshop on Hash Functions
Rechberger C., Rijmen V., Sklavos N.
IEEE Security & Privacy, Vol. 4(1), 2006
Finding SHA-1 Characteristics: General Results and Applications
De Cannière C., Rechberger C.
Advances in Cryptology - Asiacrypt 2006
Threshold Implementations Against Side-Channel Attacks and Glitches
Nikova S., Rechberger C., Rijmen V.
Information and Communications Security
A Compact FPGA Implementation of the Hash Function Whirlpool
Pramstaller N., Rechberger C., Rijmen V.
Fourteenth ACM/SIGDA International Symposium on Field-Programmable Gate Arrays
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
Mendel F., Pramstaller N., Rechberger C., Rijmen V.
Fast Software Encryption. FSE 2006
