Christian Rechberger

  1. 2014
  2. Published

    Rotational Rebound Attacks on Reduced Skein. / Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian.

    In: Journal of Cryptology, Vol. 27, No. 3, 2014, p. 452-479.

    Publication: Research - peer-reviewJournal article – Annual report year: 2014

  3. 2013
  4. Published

    Improved cryptanalysis of the block cipher KASUMI. / Jia, Keting; Li, Leibo; Rechberger, Christian; Chen, Jiazhe; Wang, Xiaoyun.

    In: Lecture Notes in Computer Science, Vol. 7707, 2013, p. 222-233.

    Publication: Research - peer-reviewConference article – Annual report year: 2013

  5. E-pub ahead of print

    The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. / Lamberger, Mario; Mendel, Florian; Schläffer, Martin; Rechberger, Christian; Rijmen, Vincent.

    In: Journal of Cryptology, 2013.

    Publication: Research - peer-reviewJournal article – Annual report year: 2014

  6. 2012
  7. Published

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. / Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra.

    Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Springer, 2012. p. 244-263 (Lecture Notes in Computer Science, Vol. 7549).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  8. Published

    Narrow-Bicliques: Cryptanalysis of Full IDEA. / Khovratovich, D.; Leurent, G.; Rechberger, C.

    In: Lecture Notes in Computer Science, Vol. 7237, 2012, p. 392-410.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  9. Published

    On security arguments of the second round SHA-3 candidates. / Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart; Preneel, Bart; Rechberger, Christian.

    In: International Journal of Information Security, Vol. 11, No. 2, 2012, p. 103–120.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  10. Published

    PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract. / Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.; Kavun, E.B.; Knezevic, M.; Knudsen, Lars Ramkilde; Leander, Gregor; Nikov, V.; Paar, C.; Rechberger, Christian.

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Springer, 2012. p. 208-225 (Lecture Notes in Computer Science, Vol. 7658).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  11. 2011
  12. Published

    A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. / Bogdanov, Andrey; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 6544, 2011, p. 229-240.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  13. Published

    Biclique cryptanalysis of the full AES. / Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian.

    In: Lecture Notes in Computer Science, Vol. 7073, 2011, p. 344-371.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

  14. Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. / Wei, Lei; Rechberger, Christian; Guo, Jian; Wu, Hongjun; Wang, Huaxiong; Ling, San.

    In: Lecture Notes in Computer Science, Vol. 6812, 2011, p. 433-438.

    Publication: Research - peer-reviewConference article – Annual report year: 2011

Previous 1 2 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word