The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Florian Mendel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Florian Mendel, Joseph Lano, Bart Preneel
    Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:85-100 [Conf]
  2. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Analysis of Step-Reduced SHA-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:126-143 [Conf]
  3. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    The Impact of Carries on the Complexity of Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:278-292 [Conf]
  4. Florian Mendel, Norbert Pramstaller, Christian Rechberger
    Improved Collision Attack on the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:8-21 [Conf]
  5. Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe
    Update on Tiger. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:63-79 [Conf]
  6. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    On the Collision Resistance of RIPEMD-160. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:101-116 [Conf]
  7. Florian Mendel, Vincent Rijmen
    Cryptanalysis of the Tiger Hash Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:536-550 [Conf]
  8. Florian Mendel, Vincent Rijmen
    Weaknesses in the HAS-V Compression Function. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:335-345 [Conf]
  9. Florian Mendel, Vincent Rijmen
    Colliding Message Pair for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:324-334 [Conf]

  10. Collisions for Round-Reduced LAKE. [Citation Graph (, )][DBLP]


  11. Collision Attack on Boole. [Citation Graph (, )][DBLP]


  12. Cryptanalysis of Twister. [Citation Graph (, )][DBLP]


  13. MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. [Citation Graph (, )][DBLP]


  14. Rebound Distinguishers: Results on the Full Whirlpool Compression Function. [Citation Graph (, )][DBLP]


  15. Cryptanalysis of the GOST Hash Function. [Citation Graph (, )][DBLP]


  16. Rebound Attacks on the Reduced Grøstl Hash Function. [Citation Graph (, )][DBLP]


  17. Cryptanalysis of MDC-2. [Citation Graph (, )][DBLP]


  18. A (Second) Preimage Attack on the GOST Hash Function. [Citation Graph (, )][DBLP]


  19. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. [Citation Graph (, )][DBLP]


  20. A Distinguisher for the Compression Function of SIMD-512. [Citation Graph (, )][DBLP]


  21. Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. [Citation Graph (, )][DBLP]


  22. On Free-Start Collisions and Collisions for TIB3. [Citation Graph (, )][DBLP]


  23. Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. [Citation Graph (, )][DBLP]


  24. Practical Collisions for SHAMATA-256. [Citation Graph (, )][DBLP]


  25. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. [Citation Graph (, )][DBLP]


  26. Collisions and Other Non-random Properties for Step-Reduced SHA-256. [Citation Graph (, )][DBLP]


  27. Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. [Citation Graph (, )][DBLP]


  28. Two Passes of Tiger Are Not One-Way. [Citation Graph (, )][DBLP]


  29. Cryptanalysis of Vortex. [Citation Graph (, )][DBLP]


  30. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002