What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Florian Mendel
Google Scholar
ORCID:
0000-0002-8352-9799
78
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tches
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency.
Barbara Gigerl
Franz Klug
Stefan Mangard
Florian Mendel
Robert Primas
2024
conf/ctrsa
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2022
journals/tosc
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.
Johannes Erlacher
Florian Mendel
Maria Eichlseder
2021
journals/joc
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2020
journals/tches
Protecting against Statistical Ineffective Fault Attacks.
Joan Daemen
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Florian Mendel
Robert Primas
2020
journals/tosc
Isap v2.0.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Bart Mennink
Robert Primas
Thomas Unterluggauer
2019
journals/tosc
Preface to Volume 2019, Issue 1.
Florian Mendel
Yu Sasaki
2019
journals/tosc
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/crypto
Efficient Collision Attack Frameworks for RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/sacrypt
Algebraic Cryptanalysis of Variants of Frit.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Markus Schofnegger
2018
journals/tches
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Stefan Mangard
Florian Mendel
Robert Primas
2018
journals/tosc
Preface to Volume 2018, Issue 1.
Florian Mendel
María Naya-Plasencia
2018
conf/crypto
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit.
Christoph Dobraunig
Maria Eichlseder
Lorenzo Grassi
Virginie Lallemand
Gregor Leander
Eik List
Florian Mendel
Christian Rechberger
2018
conf/asiacrypt
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Stefan Mangard
Florian Mendel
Robert Primas
2018
conf/sacrypt
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje.
Christoph Dobraunig
Stefan Mangard
Florian Mendel
Robert Primas
2017
journals/tosc
ISAP - Towards Side-Channel Secure Authenticated Encryption.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Thomas Unterluggauer
2017
conf/acns
Related-Key Impossible-Differential Attack on Reduced-Round Skinny.
Ralph Ankele
Subhadeep Banik
Avik Chakraborti
Eik List
Florian Mendel
Siang Meng Sim
Gaoli Wang
2017
conf/ches
Gimli : A Cross-Platform Permutation.
Daniel J. Bernstein
Stefan Kölbl
Stefan Lucks
Pedro Maat Costa Massolino
Florian Mendel
Kashif Nawaz
Tobias Schneider
Peter Schwabe
François-Xavier Standaert
Yosuke Todo
Benoît Viguier
2017
conf/asiacrypt
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160.
Fukang Liu
Florian Mendel
Gaoli Wang
2016
journals/tosc
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications.
Stefan Kölbl
Martin M. Lauridsen
Florian Mendel
Christian Rechberger
2016
journals/tosc
Practical Key-Recovery Attack on MANTIS5.
Christoph Dobraunig
Maria Eichlseder
Daniel Kales
Florian Mendel
2016
conf/fse
Analysis of the Kupyna-256 Hash Function.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2016
conf/fse
Cryptanalysis of Reduced NORX.
Nasour Bagheri
Tao Huang
Keting Jia
Florian Mendel
Yu Sasaki
2016
conf/acisp
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ.
Nasour Bagheri
Florian Mendel
Yu Sasaki
2016
conf/acns
Square Attack on 7-Round Kiasu-BC.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2016
conf/asiacrypt
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Victor Lomné
Florian Mendel
2016
conf/sacrypt
Cryptanalysis of Simpira v1.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
journals/joc
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool.
Mario Lamberger
Florian Mendel
Martin Schläffer
Christian Rechberger
Vincent Rijmen
2015
conf/fse
Related-Key Forgeries for Prøst-OTR.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/icisc
Higher-Order Cryptanalysis of LowMC.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/ctrsa
Cryptanalysis of Ascon.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2015
conf/asiacrypt
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/asiacrypt
Analysis of SHA-512/224 and SHA-512/256.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/sacrypt
Forgery Attacks on Round-Reduced ICEPOLE-128.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2014
conf/fse
Collision Attack on 5 Rounds of Grøstl.
Florian Mendel
Vincent Rijmen
Martin Schläffer
2014
conf/fse
Branching Heuristics in Differential Collision Search with Applications to SHA-512.
Maria Eichlseder
Florian Mendel
Martin Schläffer
2014
conf/latincrypt
Key Recovery Attacks on Recent Authenticated Ciphers.
Andrey Bogdanov
Christoph Dobraunig
Maria Eichlseder
Martin M. Lauridsen
Florian Mendel
Martin Schläffer
Elmar Tischhauser
2014
conf/sacrypt
Malicious Hashing: Eve's Variant of SHA-1.
Ange Albertini
Jean-Philippe Aumasson
Maria Eichlseder
Florian Mendel
Martin Schläffer
2014
conf/sacrypt
Differential Cryptanalysis of SipHash.
Christoph Dobraunig
Florian Mendel
Martin Schläffer
2013
conf/fse
ALE: AES-Based Lightweight Authenticated Encryption.
Andrey Bogdanov
Florian Mendel
Francesco Regazzoni
Vincent Rijmen
Elmar Tischhauser
2013
conf/ches
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
Begül Bilgin
Andrey Bogdanov
Miroslav Knezevic
Florian Mendel
Qingju Wang
2013
conf/ctrsa
Collisions for the WIDEA-8 Compression Function.
Florian Mendel
Vincent Rijmen
Deniz Toz
Kerem Varici
2013
conf/ctrsa
Finding Collisions for Round-Reduced SM3.
Florian Mendel
Tomislav Nad
Martin Schläffer
2013
conf/eurocrypt
Improving Local Collisions: New Attacks on Reduced SHA-256.
Florian Mendel
Tomislav Nad
Martin Schläffer
2013
conf/asiacrypt
Improved Cryptanalysis of Reduced RIPEMD-160.
Florian Mendel
Thomas Peyrin
Martin Schläffer
Lei Wang
Shuang Wu
2012
conf/fse
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128.
Florian Mendel
Tomislav Nad
Martin Schläffer
2012
conf/asiacrypt
Differential Analysis of the LED Block Cipher.
Florian Mendel
Vincent Rijmen
Deniz Toz
Kerem Varici
2012
conf/cans
A Simple Key-Recovery Attack on McOE-X.
Florian Mendel
Bart Mennink
Vincent Rijmen
Elmar Tischhauser
2011
conf/acns
Practical Attacks on the Maelstrom-0 Compression Function.
Stefan Kölbl
Florian Mendel
2011
conf/icisc
Cryptanalysis of Round-Reduced HAS-160.
Florian Mendel
Tomislav Nad
Martin Schläffer
2011
conf/asiacrypt
Second-Order Differential Collisions for Reduced SHA-256.
Alex Biryukov
Mario Lamberger
Florian Mendel
Ivica Nikolic
2011
conf/asiacrypt
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions.
Florian Mendel
Tomislav Nad
Martin Schläffer
2010
conf/icisc
Preimage Attacks against PKC98-Hash and HAS-V.
Yu Sasaki
Florian Mendel
Kazumaro Aoki
2010
conf/ctrsa
Rebound Attacks on the Reduced Grøstl Hash Function.
Florian Mendel
Christian Rechberger
Martin Schläffer
Søren S. Thomsen
2010
conf/africacrypt
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Praveen Gauravaram
Gaëtan Leurent
Florian Mendel
María Naya-Plasencia
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2009
conf/fse
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl.
Florian Mendel
Christian Rechberger
Martin Schläffer
Søren S. Thomsen
2009
conf/acns
Cryptanalysis of Twister.
Florian Mendel
Christian Rechberger
Martin Schläffer
2009
conf/acns
Collision Attack on Boole.
Florian Mendel
Tomislav Nad
Martin Schläffer
2009
conf/eurocrypt
Cryptanalysis of MDC-2.
Lars R. Knudsen
Florian Mendel
Christian Rechberger
Søren S. Thomsen
2009
conf/asiacrypt
Rebound Distinguishers: Results on the Full Whirlpool Compression Function.
Mario Lamberger
Florian Mendel
Christian Rechberger
Vincent Rijmen
Martin Schläffer
2009
conf/asiacrypt
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners.
Florian Mendel
Christian Rechberger
Martin Schläffer
2009
conf/africacrypt
Two Passes of Tiger Are Not One-Way.
Florian Mendel
2009
conf/africacrypt
Cryptanalysis of Vortex.
Jean-Philippe Aumasson
Orr Dunkelman
Florian Mendel
Christian Rechberger
Søren S. Thomsen
2009
conf/sacrypt
Practical Collisions for SHAMATA-256.
Sebastiaan Indesteege
Florian Mendel
Bart Preneel
Martin Schläffer
2009
conf/sacrypt
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Florian Mendel
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2008
conf/fse
A (Second) Preimage Attack on the GOST Hash Function.
Florian Mendel
Norbert Pramstaller
Christian Rechberger
2008
conf/acisp
Collisions for Round-Reduced LAKE.
Florian Mendel
Martin Schläffer
2008
conf/crypto
Cryptanalysis of the GOST Hash Function.
Florian Mendel
Norbert Pramstaller
Christian Rechberger
Marcin Kontak
Janusz Szmidt
2008
conf/sacrypt
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.
Jean-Philippe Aumasson
Willi Meier
Florian Mendel
2008
conf/sacrypt
Collisions and Other Non-random Properties for Step-Reduced SHA-256.
Sebastiaan Indesteege
Florian Mendel
Bart Preneel
Christian Rechberger
2007
conf/icisc
Weaknesses in the HAS-V Compression Function.
Florian Mendel
Vincent Rijmen
2007
conf/icisc
Colliding Message Pair for 53-Step HAS-160.
Florian Mendel
Vincent Rijmen
2007
conf/ctrsa
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.
Florian Mendel
Joseph Lano
Bart Preneel
2007
conf/asiacrypt
Cryptanalysis of the Tiger Hash Function.
Florian Mendel
Vincent Rijmen
2007
conf/sacrypt
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.
Christophe De Cannière
Florian Mendel
Christian Rechberger
2006
conf/fse
The Impact of Carries on the Complexity of Collision Attacks on SHA-1.
Florian Mendel
Norbert Pramstaller
Christian Rechberger
Vincent Rijmen
2006
conf/fse
Analysis of Step-Reduced SHA-256.
Florian Mendel
Norbert Pramstaller
Christian Rechberger
Vincent Rijmen
2006
conf/icisc
Improved Collision Attack on the Hash Function Proposed at PKC'98.
Florian Mendel
Norbert Pramstaller
Christian Rechberger
Coauthors
Alex Biryukov
(1)
Andrey Bogdanov
(3)
Ange Albertini
(1)
Avik Chakraborti
(1)
Barbara Gigerl
(1)
Bart Mennink
(2)
Bart Preneel
(3)
Begül Bilgin
(1)
Benoît Viguier
(1)
Christian Rechberger
(19)
Christoph Dobraunig
(25)
Christophe De Cannière
(1)
Daniel J. Bernstein
(1)
Daniel Kales
(1)
Deniz Toz
(2)
Eik List
(2)
Elmar Tischhauser
(3)
Florian Mendel
(78)
Francesco Regazzoni
(1)
François-Xavier Standaert
(1)
Franz Klug
(1)
Fukang Liu
(3)
Gaëtan Leurent
(1)
Gaoli Wang
(4)
Gregor Leander
(1)
Hannes Groß
(2)
Ivica Nikolic
(1)
Janusz Szmidt
(1)
Jean-Philippe Aumasson
(3)
Joan Daemen
(1)
Johannes Erlacher
(1)
Joseph Lano
(1)
Kashif Nawaz
(1)
Kazumaro Aoki
(1)
Kerem Varici
(2)
Keting Jia
(1)
Lars R. Knudsen
(1)
Lei Wang
(1)
Lorenzo Grassi
(1)
Marcin Kontak
(1)
Maria Eichlseder
(24)
María Naya-Plasencia
(2)
Mario Lamberger
(3)
Markus Schofnegger
(1)
Martin M. Lauridsen
(2)
Martin Schläffer
(25)
Miroslav Knezevic
(1)
Nasour Bagheri
(2)
Norbert Pramstaller
(5)
Orr Dunkelman
(1)
Pedro Maat Costa Massolino
(1)
Peter Schwabe
(1)
Praveen Gauravaram
(1)
Qingju Wang
(1)
Ralph Ankele
(1)
Robert Primas
(6)
Sebastiaan Indesteege
(2)
Shuang Wu
(1)
Siang Meng Sim
(1)
Stefan Kölbl
(3)
Stefan Lucks
(1)
Stefan Mangard
(6)
Subhadeep Banik
(1)
Søren S. Thomsen
(4)
Takanori Isobe
(2)
Tao Huang
(1)
Thomas Korak
(2)
Thomas Peyrin
(3)
Thomas Unterluggauer
(2)
Tobias Schneider
(1)
Tomislav Nad
(6)
Victor Lomné
(1)
Vincent Rijmen
(12)
Virginie Lallemand
(1)
Willi Meier
(1)
Yosuke Todo
(1)
Yu Sasaki
(4)
Zhenfu Cao
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to