Search Results - "Eichlseder, Maria"

Refine Results
  1. 1

    Integral Cryptanalysis of WARP based on Monomial Prediction by Hadipour, Hosein, Eichlseder, Maria

    Published in IACR Transactions on Symmetric Cryptology (10-06-2022)
    “…WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and…”
    Get full text
    Journal Article
  2. 2

    Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks by Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder

    Published in IACR Transactions on Symmetric Cryptology (01-03-2024)
    “…Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding…”
    Get full text
    Journal Article
  3. 3

    Bounds for the Security of Ascon against Differential and Linear Cryptanalysis by Erlacher, Johannes, Mendel, Florian, Eichlseder, Maria

    Published in IACR Transactions on Symmetric Cryptology (11-03-2022)
    “…The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for…”
    Get full text
    Journal Article
  4. 4

    Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs by Chakraborty, Debasmita, Hadipour, Hosein, Nguyen, Phuong Hoa, Eichlseder, Maria

    Published in IACR Transactions on Symmetric Cryptology (06-09-2024)
    “…The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack:…”
    Get full text
    Journal Article
  5. 5

    Finding Collisions for Round-Reduced Romulus-H by Nageler, Marcel, Pallua, Felix, Eichlseder, Maria

    Published in IACR Transactions on Symmetric Cryptology (10-03-2023)
    “…The hash function Romulus-H is a finalist in the NIST Lightweight Cryptography competition. It is based on the Hirose double block-length (DBL) construction…”
    Get full text
    Journal Article
  6. 6

    Isap v2.0 by Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer

    Published in IACR Transactions on Symmetric Cryptology (22-06-2020)
    “…We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault…”
    Get full text
    Journal Article
  7. 7

    SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography by Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas

    “…Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been…”
    Get full text
    Journal Article
  8. 8

    Clustering Related-Tweak Characteristics: Application to MANTIS-6 by Maria Eichlseder, Daniel Kales

    Published in IACR Transactions on Symmetric Cryptology (01-01-2018)
    “…The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several…”
    Get full text
    Journal Article
  9. 9

    Integrity of virtual testing for crash protection by Galijatovic, Esma, Eichlseder, Maria, Heindl, Simon Franz, Klug, Corina

    Published in Frontiers in future transportation (30-11-2022)
    “…The interest in virtual testing is globally rapidly increasing because of several advantages compared to physical tests in laboratories. In the area of passive…”
    Get full text
    Journal Article
  10. 10

    Analyzing the Linear Keystream Biases in AEGIS by Maria Eichlseder, Marcel Nageler, Robert Primas

    Published in IACR Transactions on Symmetric Cryptology (01-01-2019)
    “…AEGIS is one of the authenticated encryption designs selected for the final portfolio of the CAESAR competition. It combines the AES round function and simple…”
    Get full text
    Journal Article
  11. 11

    The QARMAv2 Family of Tweakable Block Ciphers by Avanzi, Roberto, Banik, Subhadeep, Dunkelman, Orr, Eichlseder, Maria, Ghosh, Shibam, Nageler, Marcel, Regazzoni, Francesco

    Published in IACR Transactions on Symmetric Cryptology (19-09-2023)
    “…We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer…”
    Get full text
    Journal Article
  12. 12

    Analyzing the Linear Keystream Biases in AEGIS by Eichlseder, Maria, Nageler, Marcel, Primas, Robert

    Published in IACR Transactions on Symmetric Cryptology (31-01-2020)
    “…AEGIS is one of the authenticated encryption designs selected for the final portfolio of the CAESAR competition. It combines the AES round function and simple…”
    Get full text
    Journal Article
  13. 13

    SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography by Dobraunig, Christoph, Eichlseder, Maria, Korak, Thomas, Mangard, Stefan, Mendel, Florian, Primas, Robert

    “…Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been…”
    Get full text
    Journal Article
  14. 14

    ISAP – Towards Side-Channel Secure Authenticated Encryption by Dobraunig, Christoph, Eichlseder, Maria, Mangard, Stefan, Mendel, Florian, Unterluggauer, Thomas

    Published in IACR Transactions on Symmetric Cryptology (08-03-2017)
    “…Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to…”
    Get full text
    Journal Article
  15. 15

    Ascon v1.2: Lightweight Authenticated Encryption and Hashing by Dobraunig, Christoph, Eichlseder, Maria, Mendel, Florian, Schläffer, Martin

    Published in Journal of cryptology (01-07-2021)
    “…Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the…”
    Get full text
    Journal Article
  16. 16

    Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE by Hadipour, Hosein, Nageler, Marcel, Eichlseder, Maria

    Published in IACR Transactions on Symmetric Cryptology (09-09-2022)
    “…Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on…”
    Get full text
    Journal Article
  17. 17

    Throwing Boomerangs into Feistel Structures by Hosein Hadipour, Marcel Nageler, Maria Eichlseder

    Published in IACR Transactions on Symmetric Cryptology (01-09-2022)
    “…Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on…”
    Get full text
    Journal Article
  18. 18

    Statistical Effective Fault Attacks: The Other Side of the Coin by Vafaei, Navid, Zarei, Sara, Bagheri, Nasour, Eichlseder, Maria, Primas, Robert, Soleimany, Hadi

    “…The introduction of Statistical Ineffective Fault Attacks (SIFA) has led to a renewed interest in fault attacks. SIFA requires minimal knowledge of the…”
    Get full text
    Journal Article
  19. 19

    Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2 by Hadipour, Hosein, Gerhalter, Simon, Sadeghi, Sadegh, Eichlseder, Maria

    Published in IACR Transactions on Symmetric Cryptology (01-03-2024)
    “…Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding…”
    Get full text
    Journal Article
  20. 20

    Clustering Related-Tweak Characteristics: Application to MANTIS-6 by Eichlseder, Maria, Kales, Daniel

    Published in IACR Transactions on Symmetric Cryptology (07-06-2018)
    “…The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several…”
    Get full text
    Journal Article