|
Search the dblp DataBase
Florian Mendel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Florian Mendel, Joseph Lano, Bart Preneel
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:85-100 [Conf]
- Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Analysis of Step-Reduced SHA-256. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:126-143 [Conf]
- Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
The Impact of Carries on the Complexity of Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:278-292 [Conf]
- Florian Mendel, Norbert Pramstaller, Christian Rechberger
Improved Collision Attack on the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:8-21 [Conf]
- Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe
Update on Tiger. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:63-79 [Conf]
- Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
On the Collision Resistance of RIPEMD-160. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:101-116 [Conf]
- Florian Mendel, Vincent Rijmen
Cryptanalysis of the Tiger Hash Function. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:536-550 [Conf]
- Florian Mendel, Vincent Rijmen
Weaknesses in the HAS-V Compression Function. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:335-345 [Conf]
- Florian Mendel, Vincent Rijmen
Colliding Message Pair for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:324-334 [Conf]
Collisions for Round-Reduced LAKE. [Citation Graph (, )][DBLP]
Collision Attack on Boole. [Citation Graph (, )][DBLP]
Cryptanalysis of Twister. [Citation Graph (, )][DBLP]
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. [Citation Graph (, )][DBLP]
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. [Citation Graph (, )][DBLP]
Cryptanalysis of the GOST Hash Function. [Citation Graph (, )][DBLP]
Rebound Attacks on the Reduced Grøstl Hash Function. [Citation Graph (, )][DBLP]
Cryptanalysis of MDC-2. [Citation Graph (, )][DBLP]
A (Second) Preimage Attack on the GOST Hash Function. [Citation Graph (, )][DBLP]
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. [Citation Graph (, )][DBLP]
A Distinguisher for the Compression Function of SIMD-512. [Citation Graph (, )][DBLP]
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. [Citation Graph (, )][DBLP]
On Free-Start Collisions and Collisions for TIB3. [Citation Graph (, )][DBLP]
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. [Citation Graph (, )][DBLP]
Practical Collisions for SHAMATA-256. [Citation Graph (, )][DBLP]
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. [Citation Graph (, )][DBLP]
Collisions and Other Non-random Properties for Step-Reduced SHA-256. [Citation Graph (, )][DBLP]
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. [Citation Graph (, )][DBLP]
Two Passes of Tiger Are Not One-Way. [Citation Graph (, )][DBLP]
Cryptanalysis of Vortex. [Citation Graph (, )][DBLP]
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|