Suivre
Maria Eichlseder
Maria Eichlseder
Adresse e-mail validée de iaik.tugraz.at - Page d'accueil
Titre
Citée par
Citée par
Année
Ascon v1.2 - Lightweight Authenticated Encryption and Hashing
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Journal of Cryptology 34 (33), 2021
617*2021
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
2122018
SPHINCS+
JP Aumasson, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
204*2019
Rasta: A cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
CRYPTO 2018, 2018
1332018
ISAP v2.0. Submission to NIST
C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas, ...
Submission to the NIST Lightweight Cryptography Project, 2019
112*2019
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
CT-RSA 2015, 2015
1072015
ISAP – Towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
1002017
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
C Dobraunig, M Eichlseder, H Gross, S Mangard, F Mendel, R Primas
ASIACRYPT 2018, 2018
962018
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
ASIACRYPT 2015, 612-630, 2015
902015
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
ASIACRYPT 2016, 2016
882016
Out of Oddity–New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
742020
Ascon v1. 2. submission to the CAESAR competition
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Institute for Applied Information Processing and Communications, Graz, 2016
672016
Protecting against Statistical Ineffective Fault Attacks
J Daemen, C Dobraunig, M Eichlseder, H Gross, F Mendel, R Primas
622019
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
ASIACRYPT 2015, 490-509, 2015
622015
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
M Eichlseder, L Grassi, R Lüftenegger, M Øygarden, C Rechberger, ...
602020
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 2015
602015
-Based Learning of Markov Decision Processes
M Tappler, BK Aichernig, G Bacci, M Eichlseder, KG Larsen
International Symposium on Formal Methods, 651-669, 2019
53*2019
CSI: Rowhammer–Cryptographic security and integrity against rowhammer
J Juffinger, L Lamster, A Kogler, M Eichlseder, M Lipp, D Gruss
2023 IEEE Symposium on Security and Privacy (SP), 1702-1718, 2023
502023
Malicious Hashing: Eve’s Variant of SHA-1
A Albertini, JP Aumasson, M Eichlseder, F Mendel, M Schläffer
SAC 2014, 2014
422014
Square Attack on 7-Round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
ACNS 2016, 2016
362016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20