The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Norbert Pramstaller: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, Johannes Wolkerstorfer
    Efficient AES Implementations on ASICs and FPGAs. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:98-112 [Conf]
  2. Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald
    Successfully Attacking Masked AES Hardware Implementations. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:157-171 [Conf]
  3. Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Second Preimages for SMASH. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:101-111 [Conf]
  4. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    A compact FPGA implementation of the hash function whirlpool. [Citation Graph (0, 0)][DBLP]
    FPGA, 2006, pp:159-166 [Conf]
  5. Norbert Pramstaller, Johannes Wolkerstorfer
    A Universal and Efficient AES Co-processor for Field Programmable Logic Arrays. [Citation Graph (0, 0)][DBLP]
    FPL, 2004, pp:565-574 [Conf]
  6. Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen
    A Side-Channel Analysis Resistant Description of the AES S-Box. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:413-423 [Conf]
  7. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Analysis of Step-Reduced SHA-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:126-143 [Conf]
  8. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    The Impact of Carries on the Complexity of Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:278-292 [Conf]
  9. Florian Mendel, Norbert Pramstaller, Christian Rechberger
    Improved Collision Attack on the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:8-21 [Conf]
  10. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Exploiting Coding Theory for Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:78-95 [Conf]
  11. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    On the Collision Resistance of RIPEMD-160. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:101-116 [Conf]
  12. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Breaking a New Hash Function Design Strategy Called SMASH. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:233-244 [Conf]
  13. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Impact of Rotations in SHA-1 and Related Hash Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:261-275 [Conf]
  14. Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Analysis of simplified variants of SHA-256. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:123-134 [Conf]
  15. Norbert Pramstaller, Mario Lamberger, Vincent Rijmen
    Second Preimages for Iterated Hash Functions and Their Implications on MACs. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:68-81 [Conf]
  16. Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum
    An Analysis of the Hermes8 Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:1-10 [Conf]

  17. Cryptanalysis of the GOST Hash Function. [Citation Graph (, )][DBLP]


  18. A (Second) Preimage Attack on the GOST Hash Function. [Citation Graph (, )][DBLP]


  19. Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. [Citation Graph (, )][DBLP]


Search in 0.028secs, Finished in 0.029secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002