• Publications
  • Influence
Grøstl - a SHA-3 candidate
TLDR
Grostl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. Expand
  • 280
  • 28
  • PDF
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
TLDR
We present novel fault attacks that work in the presence of detection-based and infective countermeasures and are not restricted to these two countermeasures. Expand
  • 55
  • 16
  • PDF
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
TLDR
In this work, we propose the rebound attack, a new tool for the cryptanalysis of hash functions. Expand
  • 237
  • 11
  • PDF
ALE: AES-Based Lightweight Authenticated Encryption
TLDR
In this paper, we propose a new Authenticated Lightweight Encryption algorithm that supports optional associated data. Expand
  • 101
  • 10
  • PDF
Gimli : A Cross-Platform Permutation
TLDR
This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 32-bit ARM smartphone CPUs, 8-bit AVR microcontrollers, FPGAs, ASICs without side-channel protection. Expand
  • 54
  • 10
  • PDF
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
TLDR
We present a distinguishing attack on the full compression function of Whirlpool based on a scaled up variant of the AES. Expand
  • 131
  • 8
  • PDF
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
TLDR
We present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. Expand
  • 87
  • 8
  • PDF
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
TLDR
In this paper, we analyze the collision resistance of SHA-2 and provide the first results since the beginning of the NIST SHA-3 competition. Expand
  • 62
  • 8
  • PDF
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
TLDR
We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. Expand
  • 51
  • 7
  • PDF