Follow
Florian Mendel
Florian Mendel
Cryptographer & Security Architect - Infineon Technologies
Verified email at infineon.com - Homepage
Title
Cited by
Cited by
Year
Grøstl–a SHA-3 candidate
P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel, C Rechberger, ...
Submission to NIST, 2008
392*2008
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR Competition, 2014
336*2014
The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl
F Mendel, C Rechberger, M Schläffer, S Thomsen
Fast Software Encryption, 260-276, 2009
2692009
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
1512018
Rebound distinguishers: Results on the full Whirlpool compression function
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
1472009
Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware
B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang
Cryptographic Hardware and Embedded Systems, 142-158, 2013
1382013
SPHINCS+
JP Aumasson, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
Submission to the NIST post-quantum project, 2017
133*2017
Gimli: a cross-platform permutation
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
Cryptographic Hardware and Embedded Systems, 2017
1242017
ALE: AES-based lightweight authenticated encryption
A Bogdanov, F Mendel, F Regazzoni, V Rijmen, E Tischhauser
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
1112014
Collisions for 70-step SHA-1: on the full cost of collision search
C De Canniere, F Mendel, C Rechberger
Selected Areas in Cryptography, 56-73, 2007
1092007
Analysis of step-reduced SHA-256
F Mendel, N Pramstaller, C Rechberger, V Rijmen
Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006
972006
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
F Mendel, T Peyrin, C Rechberger, M Schläffer
Selected Areas in Cryptography, 16-35, 2009
962009
Finding SHA-2 characteristics: searching through a minefield of contradictions
F Mendel, T Nad, M Schläffer
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
912011
PRIMATEs
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to the CAESAR Competition, 2014
87*2014
Improving Local Collisions: New Attacks on Reduced SHA-256
F Mendel, T Nad, M Schläffer
EUROCRYPT, 262-278, 2013
842013
Rasta: A cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
832018
Higher-Order Differential Attack on Reduced SHA-256
M Lamberger, F Mendel
IACR Cryptology ePrint Archive 2011, 37, 2011
812011
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
Advances in Cryptology–ASIACRYPT 2015, 612-630, 2015
792015
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
782017
ISAP v2.0
C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas
Submission to the NIST Lightweight Cryptography Standardization Process, 2019
75*2019
The system can't perform the operation now. Try again later.
Articles 1–20