We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Linear Propagation in Efficient Guess-and-Determine Attacks
Eichlseder M., Mendel F., Nad T., Rijmen V., Schläffer M.
International Workshop on Coding and Cryptography, 2013 International Workshop on Coding and Cryptography, 193-202
Finding Collisions for Round-Reduced SM3
Mendel F., Nad T., Schläffer M.
Topics in Cryptology - CT-RSA 2013, Cryptographers' Track at the RSA Conference 2013, 174-188, (Lecture Notes in Computer Science; vol. 7779)
Improving Local Collisions: New Attacks on Reduced SHA-256
Mendel F., Nad T., Schläffer M.
Advances in Cryptology – EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques , 262-278
Differential Cryptanalysis of Keccak Variants
Kölbl S., Mendel F., Nad T., Schläffer M.
Cryptography and Coding, 14th IMA International Conference on Cryptography and Coding, 141-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
Tools in the Cryptanalysis of Symmetric Primitives
Nad T.
, Doctoral Thesis
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Eisenbarth T., Gong Z., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
Progress in Cryptology – AFRICACRYPT 2012 Fifth International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings, 5th International Conference on Cryptology in Africa, 172-187, (Lecture Notes in Computer Science)
Differential Attacks on Reduced RIPEMD-160
Mendel F., Nad T., Scherz S., Schläffer M.
Information Security, 15th International Conference Information Security , 23-38, (Lecture Notes in Computer Science; vol. 7483)
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Mendel F., Nad T., Schläffer M.
Fast Software Encryption, 19th Fast Software Encryption Workshop, 226-243, (Lecture Notes in Computer Science; vol. 7549)
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Eisenbarth T., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
ECRYPT Workshop on Lightweight Cryptography 2011, Louvain-la-Neuve, Belgium, November 28-29, 2011, ECRYPT Workshop on Lightweight Cryptography 2011, 1-16
Boomerang Distinguisher for the SIMD-512 Compression Function
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2011, 12th International Conference on Cryptology in India, 255-269, (Lecture Notes in Computer Science; vol. 7107)
Cryptanalysis of Round-Reduced HAS-160
Mendel F., Nad T., Schläffer M.
Information Security and Cryptology - ICISC 2011, 10th International Conference on Information Security and Cryptology, 33-47, (Lecture Notes in Computer science; vol. 7259)
Finding SHA-2 Characteristics: Searching Through a Minefield of Contradictions
Mendel F., Nad T., Schläffer M.
Advances in Cryptology - ASIACRYPT 2011, 17th International Conference on the Theory and Application of Cryptology and Information Security, 288-307, (Lecture Notes in Computer Science; vol. 7073)
Numerical solvers and cryptanalysis
Nad T., Lamberger M., Rijmen V.
Journal of Mathematical Cryptology, Vol. 3(3), 249-263
Collision Attack on Boole
Nad T., Mendel F., Schläffer M.
Applied Cryptography and Network Security. ACNS 2009, 7th International Conference on Applied Cryptography and Network Security, 369-381, (Lecture Notes in Computer Science; vol. 5536)
A Distinguisher for the Compression Function of SIMD-512
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, 219-232, (Lecture Notes in Computer Science; vol. 5922)