Maria Eichlseder
Maria Eichlseder
Verified email at iaik.tugraz.at
Title
Cited by
Cited by
Year
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR competition, 2014
155*2014
Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the NIST Lightweight Cryptography Project, 2019
88*2019
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
51*2018
ISAP – Towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
452017
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
ASIACRYPT 2016, 2016
44*2016
SPHINCS+
JP Aumasson, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
40*2019
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
ASIACRYPT 2015, 612-630, 2015
392015
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 2015
312015
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
CT-RSA 2015, 2015
312015
Rasta: A cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
CRYPTO 2018, 2018
292018
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
ASIACRYPT 2015, 490-509, 2015
292015
Malicious Hashing: Eve’s Variant of SHA-1
A Albertini, JP Aumasson, M Eichlseder, F Mendel, M Schläffer
SAC 2014, 2014
282014
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
C Dobraunig, M Eichlseder, H Gross, S Mangard, F Mendel, R Primas
ASIACRYPT 2018, 2018
242018
Square Attack on 7-Round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
ACNS 2016, 2016
212016
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
CARDIS 2014, 2015
202015
Branching heuristics in differential collision search with applications to SHA-512
M Eichlseder, F Mendel, M Schläffer
FSE 2014, 473-488, 2014
202014
Related-Key Forgeries for Prøst-OTR
C Dobraunig, M Eichlseder, F Mendel
FSE 2015, 2015
172015
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
152016
Analysis of the Kupyna-256 Hash Function
C Dobraunig, M Eichlseder, F Mendel
FSE 2016, 2015
15*2015
Cryptanalysis of MORUS
T Ashur, M Eichlseder, MM Lauridsen, G Leurent, B Minaud, Y Rotella, ...
ASIACRYPT 2018, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20