What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Martin Schläffer
Google Scholar
35
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ctrsa
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2021
journals/joc
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2015
journals/joc
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool.
Mario Lamberger
Florian Mendel
Martin Schläffer
Christian Rechberger
Vincent Rijmen
2015
conf/ctrsa
Cryptanalysis of Ascon.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2014
conf/fse
Collision Attack on 5 Rounds of Grøstl.
Florian Mendel
Vincent Rijmen
Martin Schläffer
2014
conf/fse
Branching Heuristics in Differential Collision Search with Applications to SHA-512.
Maria Eichlseder
Florian Mendel
Martin Schläffer
2014
conf/latincrypt
Key Recovery Attacks on Recent Authenticated Ciphers.
Andrey Bogdanov
Christoph Dobraunig
Maria Eichlseder
Martin M. Lauridsen
Florian Mendel
Martin Schläffer
Elmar Tischhauser
2014
conf/sacrypt
Malicious Hashing: Eve's Variant of SHA-1.
Ange Albertini
Jean-Philippe Aumasson
Maria Eichlseder
Florian Mendel
Martin Schläffer
2014
conf/sacrypt
Differential Cryptanalysis of SipHash.
Christoph Dobraunig
Florian Mendel
Martin Schläffer
2013
conf/ctrsa
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl.
Severin Holzer-Graf
Thomas Krinninger
Martin Pernull
Martin Schläffer
Peter Schwabe
David Seywald
Wolfgang Wieser
2013
conf/ctrsa
Finding Collisions for Round-Reduced SM3.
Florian Mendel
Tomislav Nad
Martin Schläffer
2013
conf/eurocrypt
Improving Local Collisions: New Attacks on Reduced SHA-256.
Florian Mendel
Tomislav Nad
Martin Schläffer
2013
conf/asiacrypt
Improved Cryptanalysis of Reduced RIPEMD-160.
Florian Mendel
Thomas Peyrin
Martin Schläffer
Lei Wang
Shuang Wu
2013
conf/africacrypt
Fast Software Encryption Attacks on AES.
David Gstir
Martin Schläffer
2012
conf/fse
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128.
Florian Mendel
Tomislav Nad
Martin Schläffer
2011
journals/joc
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches.
Svetla Nikova
Vincent Rijmen
Martin Schläffer
2011
conf/icisc
Cryptanalysis of Round-Reduced HAS-160.
Florian Mendel
Tomislav Nad
Martin Schläffer
2011
conf/asiacrypt
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions.
Florian Mendel
Tomislav Nad
Martin Schläffer
2011
conf/sacrypt
Improved Analysis of ECHO-256.
Jérémy Jean
María Naya-Plasencia
Martin Schläffer
2010
conf/acisp
Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
Jean-Philippe Aumasson
Emilia Käsper
Lars R. Knudsen
Krystian Matusiewicz
Rune Steinsmo Ødegård
Thomas Peyrin
Martin Schläffer
2010
conf/ctrsa
Rebound Attacks on the Reduced Grøstl Hash Function.
Florian Mendel
Christian Rechberger
Martin Schläffer
Søren S. Thomsen
2010
conf/africacrypt
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Praveen Gauravaram
Gaëtan Leurent
Florian Mendel
María Naya-Plasencia
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2010
conf/sacrypt
v2 Components.
Dmitry Khovratovich
María Naya-Plasencia
Andrea Röck
Martin Schläffer
2010
conf/sacrypt
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function.
Martin Schläffer
2009
conf/fse
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl.
Florian Mendel
Christian Rechberger
Martin Schläffer
Søren S. Thomsen
2009
conf/acns
Cryptanalysis of Twister.
Florian Mendel
Christian Rechberger
Martin Schläffer
2009
conf/acns
Collision Attack on Boole.
Florian Mendel
Tomislav Nad
Martin Schläffer
2009
conf/asiacrypt
Rebound Distinguishers: Results on the Full Whirlpool Compression Function.
Mario Lamberger
Florian Mendel
Christian Rechberger
Vincent Rijmen
Martin Schläffer
2009
conf/asiacrypt
Rebound Attack on the Full Lane Compression Function.
Krystian Matusiewicz
María Naya-Plasencia
Ivica Nikolic
Yu Sasaki
Martin Schläffer
2009
conf/asiacrypt
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners.
Florian Mendel
Christian Rechberger
Martin Schläffer
2009
conf/sacrypt
Practical Collisions for SHAMATA-256.
Sebastiaan Indesteege
Florian Mendel
Bart Preneel
Martin Schläffer
2009
conf/sacrypt
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Florian Mendel
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2008
conf/acisp
Collisions for Round-Reduced LAKE.
Florian Mendel
Martin Schläffer
2008
conf/icisc
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.
Svetla Nikova
Vincent Rijmen
Martin Schläffer
2006
conf/fse
Searching for Differential Paths in MD4.
Martin Schläffer
Elisabeth Oswald
Coauthors
Andrea Röck
(1)
Andrey Bogdanov
(1)
Ange Albertini
(1)
Bart Preneel
(1)
Christian Rechberger
(8)
Christoph Dobraunig
(5)
David Gstir
(1)
David Seywald
(1)
Dmitry Khovratovich
(1)
Elisabeth Oswald
(1)
Elmar Tischhauser
(1)
Emilia Käsper
(1)
Florian Mendel
(25)
Gaëtan Leurent
(1)
Ivica Nikolic
(1)
Jean-Philippe Aumasson
(2)
Jérémy Jean
(1)
Krystian Matusiewicz
(2)
Lars R. Knudsen
(1)
Lei Wang
(1)
Maria Eichlseder
(6)
María Naya-Plasencia
(4)
Mario Lamberger
(2)
Martin M. Lauridsen
(1)
Martin Pernull
(1)
Martin Schläffer
(35)
Peter Schwabe
(1)
Praveen Gauravaram
(1)
Rune Steinsmo Ødegård
(1)
Sebastiaan Indesteege
(1)
Severin Holzer-Graf
(1)
Shuang Wu
(1)
Svetla Nikova
(2)
Søren S. Thomsen
(2)
Thomas Krinninger
(1)
Thomas Peyrin
(4)
Tomislav Nad
(6)
Vincent Rijmen
(5)
Wolfgang Wieser
(1)
Yu Sasaki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to