Mario Lamberger
Mario Lamberger
Principal Cryptographer and Security Assessment Expert, NXP Semiconductors Austria
Verified email at
Cited by
Cited by
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Cryptographers’ Track at the RSA Conference, 67-78, 2002
Rebound distinguishers: Results on the full Whirlpool compression function
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
Higher-Order Differential Attack on Reduced SHA-256.
M Lamberger, F Mendel
IACR Cryptology ePrint Archive 2011, 37, 2011
The rebound attack and subspace distinguishers: Application to Whirlpool
M Lamberger, F Mendel, M Schläffer, C Rechberger, V Rijmen
Journal of cryptology 28 (2), 257-296, 2015
Hybrid engine for polymorphic shellcode detection
U Payer, P Teufl, M Lamberger
International Conference on Detection of Intrusions and Malware, and …, 2005
Second-order differential collisions for reduced SHA-256
A Biryukov, M Lamberger, F Mendel, I Nikolić
International Conference on the Theory and Application of Cryptology and …, 2011
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
J Daemen, M Lamberger, N Pramstaller, V Rijmen, F Vercauteren
Computing 85 (1-2), 85-104, 2009
Distribution properties of digital expansions arising from linear recurrences
M Lamberger, JM Thuswaldner
Mathematica Slovaca 53 (1), 1-20, 2003
Analysis of the hash function design strategy called SMASH
M Lamberger, N Pramstaller, C Rechberger, V Rijmen
IEEE Transactions on Information Theory 54 (8), 3647-3655, 2008
Second preimages for SMASH
M Lamberger, N Pramstaller, C Rechberger, V Rijmen
Cryptographers’ Track at the RSA Conference, 101-111, 2007
Numerical solvers and cryptanalysis
M Lamberger, T Nad, V Rijmen
Journal of mathematical cryptology 3 (3), 249-263, 2009
On a family of singular measures related to Minkowski's?(x) function
M Lamberger
Indagationes mathematicae 17 (1), 45-63, 2006
Traffic classification using self-organizing maps
U Payer, P Teufl, M Lamberger
Proceedings of the Fifth International Networking Conference, 11-18, 2005
Memoryless near-collisions, revisited
M Lamberger, E Teufl
Information Processing Letters 113 (3), 60-66, 2013
Memoryless near-collisions via coding theory
M Lamberger, F Mendel, V Rijmen, K Simoens
Designs, codes and cryptography 62 (1), 1-18, 2012
Massive data mining for polymorphic code detection
U Payer, P Teufl, S Kraxberger, M Lamberger
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
Optimal covering codes for finding near-collisions
M Lamberger, V Rijmen
International Workshop on Selected Areas in Cryptography, 187-197, 2010
WiFi Chipset Fingerprinting
G Lackner, M Lamberger, U Payer, P Teufl
Proceedings zu DA-CH Mobility, 2006
Second preimages for iterated hash functions and their implications on MACs
N Pramstaller, M Lamberger, V Rijmen
Australasian Conference on Information Security and Privacy, 68-81, 2007
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
M Lamberger, F Mendel
International Conference on Information Security, 68-78, 2009
The system can't perform the operation now. Try again later.
Articles 1–20