Martin Schläffer
Martin Schläffer
Verified email at infineon.com
Title
Cited by
Cited by
Year
Grøstl–a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST, 2008
308*2008
The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl
F Mendel, C Rechberger, M Schläffer, S Thomsen
Fast Software Encryption, 260-276, 2009
2332009
Secure hardware implementation of nonlinear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Journal of cryptology 24 (2), 292-321, 2011
2302011
Rebound distinguishers: Results on the full Whirlpool compression function
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
1342009
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
F Mendel, T Peyrin, C Rechberger, M Schläffer
Selected Areas in Cryptography, 16-35, 2009
982009
Ascon v1. 2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR Competition, 2016
96*2016
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
International Conference on Information Security and Cryptology, 218-234, 2008
942008
Finding SHA-2 characteristics: searching through a minefield of contradictions
F Mendel, T Nad, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2011
722011
Rebound attack on the full LANE compression function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
702009
The rebound attack and subspace distinguishers: Application to Whirlpool
M Lamberger, F Mendel, M Schläffer, C Rechberger, V Rijmen
Journal of cryptology 28 (2), 257-296, 2015
652015
Improving local collisions: new attacks on reduced SHA-256
F Mendel, T Nad, M Schläffer
Annual International Conference on the Theory and Applications of …, 2013
592013
Rebound attacks on the reduced Grøstl hash function
F Mendel, C Rechberger, M Schläffer, SS Thomsen
Cryptographers’ Track at the RSA Conference, 350-365, 2010
542010
Searching for differential paths in MD4
M Schläffer, E Oswald
International Workshop on Fast Software Encryption, 242-261, 2006
522006
Differential side channel analysis attacks on FPGA implementations of ARIA
CK Kim, M Schläffer, SJ Moon
ETRI journal 30 (2), 315-325, 2008
392008
Using normal bases for compact hardware implementations of the AES S-Box
S Nikova, V Rijmen, M Schläffer
International Conference on Security and Cryptography for Networks, 236-245, 2008
332008
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
322015
ECRYPT yearly report on algorithms and keysizes
S Babbage, D Catalano, C Cid, B de Weger, O Dunkelman, C Gehrmann, ...
322009
Distinguishers for the compression function and output transformation of hamsi-256
JP Aumasson, E Käsper, L Knudsen, K Matusiewicz, R Ødegård, T Peyrin, ...
Information Security and Privacy, 87-103, 2010
292010
Malicious hashing: Eve’s variant of SHA-1
A Albertini, JP Aumasson, M Eichlseder, F Mendel, M Schläffer
International Conference on Selected Areas in Cryptography, 1-19, 2014
282014
Ascon v1. 2 submission to the CAESAR competition
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
CAESAR First Round Submission, March, 2014
282014
The system can't perform the operation now. Try again later.
Articles 1–20