Christian Rechberger
Christian Rechberger
Associate Professor, DTU
Verified email at groestl.info - Homepage
TitleCited byYear
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
J Borghoff, A Canteaut, T Güneysu, EB Kavun, M Knezevic, LR Knudsen, ...
International Conference on the Theory and Application of Cryptology and …, 2012
5432012
Biclique Cryptanalysis of the Full AES
A Bogdanov, D Khovratovich, C Rechberger
ASIACRYPT'11, 2011
5422011
Finding SHA-1 characteristics: General results and applications
C De Canniere, C Rechberger
International Conference on the Theory and Application of Cryptology and …, 2006
2952006
Grøstl–a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST, 2008
276*2008
Threshold implementations against side-channel attacks and glitches
S Nikova, C Rechberger, V Rijmen
International conference on information and communications security, 529-545, 2006
2632006
A case against currently used hash functions in RFID protocols
M Feldhofer, C Rechberger
On the move to meaningful internet systems 2006: OTM 2006 workshops, 372-381, 2006
2462006
The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl
F Mendel, C Rechberger, M Schläffer, S Thomsen
Fast Software Encryption, 260-276, 2009
2182009
Practical template attacks
C Rechberger, E Oswald
International Workshop on Information Security Applications, 440-456, 2004
1972004
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
D Khovratovich, C Rechberger, A Savelieva
1502011
Rebound distinguishers: Results on the full Whirlpool compression function
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
1292009
A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN
A Bogdanov, C Rechberger
International Workshop on Selected Areas in Cryptography, 229-240, 2010
1232010
Ciphers for MPC and FHE
MR Albrecht, C Rechberger, T Schneider, T Tiessen, M Zohner
Annual International Conference on the Theory and Applications of …, 2015
1192015
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
Fast Software Encryption, 470-488, 2008
1162008
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
International Workshop on Fast Software Encryption, 470-488, 2008
1142008
Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2
J Guo, S Ling, C Rechberger, H Wang
International Conference on the Theory and Application of Cryptology and …, 2010
1082010
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
F Mendel, T Peyrin, C Rechberger, M Schläffer
Selected Areas in Cryptography, 16-35, 2009
992009
Preimages for Reduced SHA-0 and SHA-1
C De Canniere, C Rechberger
Annual International Cryptology Conference, 179-202, 2008
922008
Collisions for 70-step SHA-1: on the full cost of collision search
C De Canniere, F Mendel, C Rechberger
Selected Areas in Cryptography, 56-73, 2007
90*2007
Analysis of step-reduced SHA-256
F Mendel, N Pramstaller, C Rechberger, V Rijmen
Fast Software Encryption, 126-143, 2006
832006
Post-quantum zero-knowledge and signatures from symmetric-key primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
762017
The system can't perform the operation now. Try again later.
Articles 1–20