What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Maria Eichlseder
Google Scholar
ORCID:
0000-0002-8750-7423
44
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions.
Marcel Nageler
Shibam Ghosh
Marlene Jüttler
Maria Eichlseder
2024
journals/tosc
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2.
Hosein Hadipour
Simon Gerhalter
Sadegh Sadeghi
Maria Eichlseder
2024
journals/tosc
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs.
Debasmita Chakraborty
Hosein Hadipour
Phuong Hoa Nguyen
Maria Eichlseder
2024
conf/crypto
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
Hosein Hadipour
Patrick Derbez
Maria Eichlseder
2024
conf/ctrsa
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2023
journals/tosc
The QARMAv2 Family of Tweakable Block Ciphers.
Roberto Avanzi
Subhadeep Banik
Orr Dunkelman
Maria Eichlseder
Shibam Ghosh
Marcel Nageler
Francesco Regazzoni
2023
journals/tosc
Finding Collisions for Round-Reduced Romulus-H.
Marcel Nageler
Felix Pallua
Maria Eichlseder
2023
conf/sp
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Jonas Juffinger
Lukas Lamster
Andreas Kogler
Maria Eichlseder
Moritz Lipp
Daniel Gruss
2023
conf/sp
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks.
Lukas Giner
Stefan Steinegger
Antoon Purnal
Maria Eichlseder
Thomas Unterluggauer
Stefan Mangard
Daniel Gruss
2023
conf/eurocrypt
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks.
Hosein Hadipour
Sadegh Sadeghi
Maria Eichlseder
2022
journals/tosc
Integral Cryptanalysis of WARP based on Monomial Prediction.
Hosein Hadipour
Maria Eichlseder
2022
journals/tosc
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.
Johannes Erlacher
Florian Mendel
Maria Eichlseder
2022
journals/tosc
Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE.
Hosein Hadipour
Marcel Nageler
Maria Eichlseder
2022
journals/tifs
Statistical Effective Fault Attacks: The Other Side of the Coin.
Navid Vafaei
Sara Zarei
Nasour Bagheri
Maria Eichlseder
Robert Primas
Hadi Soleimany
2022
conf/acns
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges.
Hosein Hadipour
Maria Eichlseder
2022
conf/eurocrypt
Information-Combining Differential Fault Attacks on DEFAULT.
Marcel Nageler
Christoph Dobraunig
Maria Eichlseder
2021
journals/joc
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2020
journals/tches
Protecting against Statistical Ineffective Fault Attacks.
Joan Daemen
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Florian Mendel
Robert Primas
2020
journals/tosc
Isap v2.0.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Bart Mennink
Robert Primas
Thomas Unterluggauer
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2020
conf/asiacrypt
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
Maria Eichlseder
Lorenzo Grassi
Reinhard Lüftenegger
Morten Øygarden
Christian Rechberger
Markus Schofnegger
Qingju Wang
2020
conf/sacrypt
PRINCEv2 - More Security for (Almost) No Overhead.
Dusan Bozilov
Maria Eichlseder
Miroslav Knezevic
Baptiste Lambin
Gregor Leander
Thorben Moos
Ventzislav Nikov
Shahram Rasoolzadeh
Yosuke Todo
Friedrich Wiemer
2019
journals/tosc
Analyzing the Linear Keystream Biases in AEGIS.
Maria Eichlseder
Marcel Nageler
Robert Primas
2019
conf/sacrypt
Algebraic Cryptanalysis of Variants of Frit.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Markus Schofnegger
2018
journals/tches
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Stefan Mangard
Florian Mendel
Robert Primas
2018
journals/tosc
Clustering Related-Tweak Characteristics: Application to MANTIS-6.
Maria Eichlseder
Daniel Kales
2018
conf/crypto
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit.
Christoph Dobraunig
Maria Eichlseder
Lorenzo Grassi
Virginie Lallemand
Gregor Leander
Eik List
Florian Mendel
Christian Rechberger
2018
conf/asiacrypt
Cryptanalysis of MORUS.
Tomer Ashur
Maria Eichlseder
Martin M. Lauridsen
Gaëtan Leurent
Brice Minaud
Yann Rotella
Yu Sasaki
Benoît Viguier
2018
conf/asiacrypt
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Stefan Mangard
Florian Mendel
Robert Primas
2017
journals/tosc
ISAP - Towards Side-Channel Secure Authenticated Encryption.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Thomas Unterluggauer
2016
journals/tosc
Practical Key-Recovery Attack on MANTIS5.
Christoph Dobraunig
Maria Eichlseder
Daniel Kales
Florian Mendel
2016
conf/fse
Analysis of the Kupyna-256 Hash Function.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2016
conf/acns
Square Attack on 7-Round Kiasu-BC.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2016
conf/asiacrypt
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Victor Lomné
Florian Mendel
2016
conf/sacrypt
Cryptanalysis of Simpira v1.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/fse
Related-Key Forgeries for Prøst-OTR.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/icisc
Higher-Order Cryptanalysis of LowMC.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/ctrsa
Cryptanalysis of Ascon.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2015
conf/asiacrypt
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/asiacrypt
Analysis of SHA-512/224 and SHA-512/256.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/sacrypt
Forgery Attacks on Round-Reduced ICEPOLE-128.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2014
conf/fse
Branching Heuristics in Differential Collision Search with Applications to SHA-512.
Maria Eichlseder
Florian Mendel
Martin Schläffer
2014
conf/latincrypt
Key Recovery Attacks on Recent Authenticated Ciphers.
Andrey Bogdanov
Christoph Dobraunig
Maria Eichlseder
Martin M. Lauridsen
Florian Mendel
Martin Schläffer
Elmar Tischhauser
2014
conf/sacrypt
Malicious Hashing: Eve's Variant of SHA-1.
Ange Albertini
Jean-Philippe Aumasson
Maria Eichlseder
Florian Mendel
Martin Schläffer
Coauthors
Andreas Kogler
(1)
Andrey Bogdanov
(1)
Ange Albertini
(1)
Anne Canteaut
(1)
Antoon Purnal
(1)
Baptiste Lambin
(1)
Bart Mennink
(1)
Benoît Viguier
(1)
Brice Minaud
(1)
Christian Rechberger
(2)
Christoph Dobraunig
(22)
Daniel Gruss
(2)
Daniel Kales
(2)
Debasmita Chakraborty
(1)
Dusan Bozilov
(1)
Eik List
(1)
Elmar Tischhauser
(1)
Felix Pallua
(1)
Florian Mendel
(24)
Francesco Regazzoni
(1)
Friedrich Wiemer
(2)
Gaëtan Leurent
(2)
Gregor Leander
(3)
Hadi Soleimany
(1)
Hannes Groß
(2)
Hosein Hadipour
(7)
Itai Dinur
(1)
Jean-Philippe Aumasson
(1)
Joan Daemen
(1)
Johannes Erlacher
(1)
Jonas Juffinger
(1)
Léo Perrin
(1)
Lorenzo Grassi
(2)
Lukas Giner
(1)
Lukas Lamster
(1)
Marcel Nageler
(6)
Maria Eichlseder
(44)
María Naya-Plasencia
(1)
Markus Schofnegger
(2)
Marlene Jüttler
(1)
Martin M. Lauridsen
(2)
Martin Schläffer
(6)
Miroslav Knezevic
(1)
Moritz Lipp
(1)
Morten Øygarden
(1)
Nasour Bagheri
(1)
Navid Vafaei
(1)
Orr Dunkelman
(1)
Patrick Derbez
(1)
Phuong Hoa Nguyen
(1)
Qingju Wang
(1)
Reinhard Lüftenegger
(1)
Robert Primas
(6)
Roberto Avanzi
(1)
Sadegh Sadeghi
(2)
Sara Zarei
(1)
Shahram Rasoolzadeh
(1)
Shibam Ghosh
(2)
Simon Gerhalter
(1)
Stefan Mangard
(5)
Stefan Steinegger
(1)
Subhadeep Banik
(1)
Thomas Korak
(2)
Thomas Unterluggauer
(3)
Thorben Moos
(1)
Tim Beyne
(1)
Tomer Ashur
(1)
Ventzislav Nikov
(1)
Victor Lomné
(1)
Virginie Lallemand
(1)
Yann Rotella
(1)
Yosuke Todo
(2)
Yu Sasaki
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to