Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Christian Rechberger
Search web for home page
Program Committees
1
2013
FSE
pc
2
2012
Asiacrypt
pc
3
2011
FSE
pc
4
2011
Asiacrypt
pc
5
2010
FSE
pc
6
2009
Eurocrypt
pc
7
2009
FSE
pc
Publications
year
title
booktitle
pages
1
2012
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract
asiacrypt
208-225
2
2012
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
fse
244-263
3
2012
Narrow-Bicliques: Cryptanalysis of Full IDEA
eurocrypt
392-410
4
2011
Biclique Cryptanalysis of the Full AES
asiacrypt
344-371
5
2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
asiacrypt
56-75
6
2010
Rotational Rebound Attacks on Reduced Skein
asiacrypt
1-19
7
2010
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
eprint
online
8
2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
eprint
online
9
2009
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
asiacrypt
144-161
10
2009
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
asiacrypt
126-143
11
2009
Cryptanalysis of MDC-2
eurocrypt
106-120
12
2009
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
fse
260-276
13
2008
A (Second) Preimage Attack on the GOST Hash Function
fse
224-234
14
2008
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
fse
online
15
2008
Cryptanalysis of the GOST Hash Function
crypto
162-178
16
2008
Preimages for Reduced SHA-0 and SHA-1
crypto
179-202
17
2008
Analysis of Step-Reduced SHA-256
eprint
online
18
2008
Collisions and other Non-Random Properties for Step-Reduced SHA-256
eprint
online
19
2007
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
eprint
online
20
2007
The Grindahl Hash Functions
fse
39-57
21
2006
On Authentication with HMAC and Non-Random Properties
eprint
online
22
2006
Finding SHA-1 Characteristics: General Results and Applications
asiacrypt
online
23
2006
Analysis of Step-Reduced SHA-256
fse
online
24
2006
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
fse
online
25
2005
Smashing SMASH
eprint
online
Coauthors of Christian Rechberger
Jean-Philippe Aumasson
Andrey Bogdanov
Julia Borghoff
Christophe De Cannière
Anne Canteaut
Simon Fischer
Tim Güneysu
Jian Guo
Sebastiaan Indesteege
Elif Bilge Kavun
Shahram Khazaei
Dmitry Khovratovich
Miroslav Knezevic
Lars R. Knudsen
Marcin Kontak
Mario Lamberger
Gregor Leander
Gaëtan Leurent
San Ling
Willi Meier
Florian Mendel
Ivica Nikolić
Ventzislav Nikov
Christof Paar
Norbert Pramstaller
Bart Preneel
Vincent Rijmen
Peter Rombouts
Alexandra Savelieva
Martin Schläffer
Janusz Szmidt
Søren S. Thomsen
Søren S. Thomsen
Huaxiong Wang
Tolga Yalçin