List of Publications

2017

  1. Fukang Liu, Florian Mendel, Gaoli Wang: Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. ASIACRYPT 2017
  2. Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier: Gimli: a cross-platform permutation. CHES 2017
  3. Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer: ISAP: Towards Side-Channel Secure Authenticated Encryption. FSE 2017
  4. Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger: Haraka v2: Efficient Short-Input Hashing for Post-Quantum Applications. FSE 2017
  5. Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel: Practical Key Recovery Attack on MANTIS-5. FSE 2017 (Invited to JoC)
  6. Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel: Side-Channel Analysis of Keymill. COSADE 2017
  7. Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang: Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. ACNS 2017

2016

  1. Nasour Bagheri, Florian Mendel, Yu Sasaki: Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP 2016
  2. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Square Attack on 7-Round Kiasu-BC. ACNS 2016
  3. Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel: Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. ASIACRYPT 2016
  4. Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki: Cryptanalysis of Reduced NORX. FSE 2016
  5. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Analysis of the Kupyna-256 Hash Function. FSE 2016
  6. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Cryptanalysis of Simpira v1. SAC 2016

2015

  1. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. ASIACRYPT 2015
  2. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Analysis of SHA-512/224 and SHA-512/256. ASIACRYPT 2015
  3. Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen: The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. JoC 2015
  4. Christoph Dobraunig, François Koeune, Stefan Mangard, Florian Mendel, François-Xavier Standaert: Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. CARDIS 2015
  5. Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer: Cryptanalysis of Ascon. CT-RSA 2015
  6. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Related-Key Forgeries for Prøst-OTR. FSE 2015
  7. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Higher-Order Cryptanalysis of LowMC. ICISC 2015
  8. Christoph Dobraunig, Maria Eichlseder, Florian Mendel: Forgery Attacks on Round-Reduced ICEPOLE-128. SAC 2015

2014

  1. Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel: On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. CARDIS 2014
  2. Maria Eichlseder, Florian Mendel, Martin Schläffer: Branching Heuristics in Differential Collision Search with Applications to SHA-512. FSE 2014
  3. Florian Mendel, Vincent Rijmen, Martin Schläffer: Collision Attack on 5 Rounds of Grøstl. FSE 2014
  4. Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser: Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014
  5. Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer: Malicious Hashing: Eve’s Variant of SHA-1. SAC 2014
  6. Christoph Dobraunig, Florian Mendel, Martin Schläffer: Differential Cryptanalysis of SipHash. SAC 2014

2013

  1. Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu: Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT 2013
  2. Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang: Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES 2013
  3. Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici: Collisions for the WIDEA-8 Compression Function. CT-RSA 2013
  4. Florian Mendel, Tomislav Nad, Martin Schläffer: Finding Collisions for Round-Reduced SM3. CT-RSA 2013
  5. Florian Mendel, Tomislav Nad, Martin Schläffer: Improving Local Collisions: New Attacks on Reduced SHA-256. EUROCRYPT 2013
  6. Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser: ALE: AES-Based Lightweight Authenticated Encryption. FSE 2013
  7. Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer: Differential Cryptanalysis of Keccak Variants. IMA 2013
  8. Maria Eichlseder, Tomislav Nad, Florian Mendel, Vincent Rijmen, Martin Schläffer: Linear Propagation in Efficient Guess-and-Determine Attacks. WCC 2013

2012

  1. Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici: Differential Analysis of the LED Block Cipher. ASIACRYPT 2012
  2. Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser: A Simple Key-Recovery Attack on McOE-X. CANS 2012 (Best Paper Award)
  3. Mario Lamberger, Florian Mendel, Vincent Rijmen, Koen Simoens: Memoryless near-collisions via coding theory. DCC 2012
  4. Florian Mendel, Tomislav Nad, Martin Schläffer: Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. FSE 2012
  5. Yu Sasaki, Florian Mendel, Kazumaro Aoki: Preimage Attacks against PKC98-Hash and HAS-V. IEICE 2012
  6. Mario Lamberger, Florian Mendel, Vincent Rijmen: Collision Attack on the Hamsi-256 Compression Function. INDOCRYPT 2012
  7. Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer: Differential Attacks on Reduced RIPEMD-160. ISC 2012

2011

  1. Stefan Kölbl, Florian Mendel: Practical Attacks on the Maelstrom-0 Compression Function. ACNS 2011
  2. Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic: Second-Order Differential Collisions for Reduced SHA-256. ASIACRYPT 2011
  3. Florian Mendel, Tomislav Nad, Martin Schläffer: Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. ASIACRYPT 2011
  4. Florian Mendel, Tomislav Nad, Martin Schläffer: Cryptanalysis of Round-Reduced HAS-160. ICISC 2011
  5. Florian Mendel, Tomislav Nad: Boomerang Distinguisher for the SIMD-512 Compression Function. INDOCRYPT 2011

2010

  1. Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer: Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010
  2. Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen: Rebound Attacks on the Reduced Grøstl Hash Function. CT-RSA 2010
  3. Yu Sasaki, Florian Mendel, Kazumaro Aoki: Preimage Attacks against PKC98-Hash and HAS-V. ICISC 2010

2009

  1. Florian Mendel, Christian Rechberger, Martin Schläffer: Cryptanalysis of Twister. ACNS 2009
  2. Florian Mendel, Tomislav Nad, Martin Schläffer: Collision Attack on Boole. ACNS 2009
  3. Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen: Cryptanalysis of Vortex. AFRICACRYPT 2009
  4. Florian Mendel: Two Passes of Tiger Are Not One-Way. AFRICACRYPT 2009
  5. Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer: Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009
  6. Florian Mendel, Christian Rechberger, Martin Schläffer: MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. ASIACRYPT 2009
  7. Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen: Cryptanalysis of MDC-2. EUROCRYPT 2009
  8. Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. FSE 2009
  9. Florian Mendel, Tomislav Nad: A Distinguisher for the Compression Function of SIMD-512. INDOCRYPT 2009
  10. Mario Lamberger, Florian Mendel: Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. ISC 2009
  11. Florian Mendel, Martin Schläffer: On Free-Start Collisions and Collisions for TIB3. ISC 2009
  12. Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer: Practical Collisions for SHAMATA-256. SAC 2009
  13. Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. SAC 2009

2008

  1. Florian Mendel, Martin Schläffer: Collisions for Round-Reduced LAKE. ACISP 2008
  2. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt: Cryptanalysis of the GOST Hash Function. CRYPTO 2008
  3. Florian Mendel, Norbert Pramstaller, Christian Rechberger: A (Second) Preimage Attack on the GOST Hash Function. FSE 2008
  4. Jean-Philippe Aumasson, Willi Meier, Florian Mendel: Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. SAC 2008
  5. Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger: Collisions and Other Non-random Properties for Step-Reduced SHA-256. SAC 2008

2007

  1. Florian Mendel, Vincent Rijmen: Cryptanalysis of the Tiger Hash Function. ASIACRYPT 2007
  2. Florian Mendel, Joseph Lano, Bart Preneel: Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. CT-RSA 2007
  3. Florian Mendel, Vincent Rijmen: Colliding Message Pair for 53-Step HAS-160. ICISC 2007
  4. Florian Mendel, Vincent Rijmen: Weaknesses in the HAS-V Compression Function. ICISC 2007
  5. Christophe De Cannière, Florian Mendel, Christian Rechberger: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. SAC 2007

2006

  1. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of Step-Reduced SHA-256. FSE 2006
  2. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006
  3. Florian Mendel, Norbert Pramstaller, Christian Rechberger: Improved Collision Attack on the Hash Function Proposed at PKC’98. ICISC 2006
  4. Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe: Update on Tiger. INDOCRYPT 2006
  5. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: On the Collision Resistance of RIPEMD-160. ISC 2006
Advertisements