Florian Mendel
Florian Mendel
Cryptographer & Security Architect - Infineon Technologies
Verified email at iaik.tugraz.at - Homepage
TitleCited byYear
Grøstl–a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST, 2008
302*2008
The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl
F Mendel, C Rechberger, M Schläffer, S Thomsen
Fast Software Encryption, 260-276, 2009
2152009
Rebound distinguishers: Results on the full Whirlpool compression function
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
1272009
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR Competition, 2014
105*2014
ALE: AES-based lightweight authenticated encryption
A Bogdanov, F Mendel, F Regazzoni, V Rijmen, E Tischhauser
Fast Software Encryption, 447-466, 2013
1002013
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
F Mendel, T Peyrin, C Rechberger, M Schläffer
Selected Areas in Cryptography, 16-35, 2009
992009
Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware
B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang
Cryptographic Hardware and Embedded Systems, 142-158, 2013
892013
Collisions for 70-step SHA-1: on the full cost of collision search
C De Canniere, F Mendel, C Rechberger
Selected Areas in Cryptography, 56-73, 2007
862007
Analysis of step-reduced SHA-256
F Mendel, N Pramstaller, C Rechberger, V Rijmen
International workshop on fast software encryption, 126-143, 2006
832006
PRIMATEs
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to the CAESAR Competition, 2014
63*2014
Collisions and other non-random properties for step-reduced SHA-256
S Indesteege, F Mendel, B Preneel, C Rechberger
International Workshop on Selected Areas in Cryptography, 276-293, 2008
632008
Finding SHA-2 characteristics: searching through a minefield of contradictions
F Mendel, T Nad, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2011
612011
Cryptanalysis of the GOST hash function
F Mendel, N Pramstaller, C Rechberger, M Kontak, J Szmidt
Advances in Cryptology–CRYPTO 2008, 162-178, 2008
612008
Higher-Order Differential Attack on Reduced SHA-256
M Lamberger, F Mendel
IACR Cryptology ePrint Archive 2011, 37, 2011
592011
The rebound attack and subspace distinguishers: Application to Whirlpool
M Lamberger, F Mendel, M Schläffer, C Rechberger, V Rijmen
Journal of Cryptology 28 (2), 1-40, 2015
572015
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to NIST, 2019
542019
Differential Analysis of the LED Block Cipher
F Mendel, V Rijmen, D Toz, K Varıcı
Advances in Cryptology–ASIACRYPT 2012, 2012
512012
Rebound attacks on the reduced Grøstl hash function
F Mendel, C Rechberger, M Schläffer, S Thomsen
Topics in Cryptology-CT-RSA 2010, 350-365, 2010
512010
Preimage attacks on 3-pass HAVAL and step-reduced MD5
JP Aumasson, W Meier, F Mendel
Selected Areas in Cryptography, 120-135, 2009
502009
Improving Local Collisions: New Attacks on Reduced SHA-256
F Mendel, T Nad, M Schläffer
EUROCRYPT, 262-278, 2013
462013
The system can't perform the operation now. Try again later.
Articles 1–20