Florian Mendel


Ontology type: schema:Person     


Person Info

NAME

Florian

SURNAME

Mendel

Publications in SciGraph latest 50 shown

  • 2021-06-22 Ascon v1.2: Lightweight Authenticated Encryption and Hashing in JOURNAL OF CRYPTOLOGY
  • 2020-01-28 Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2020-01-10 Algebraic Cryptanalysis of Variants of Frit in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2019
  • 2019-08-01 Efficient Collision Attack Frameworks for RIPEMD-160 in ADVANCES IN CRYPTOLOGY – CRYPTO 2019
  • 2019-01-13 Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2018
  • 2018-10-27 Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2018
  • 2018-07-25 Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2017-11-30 Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2017
  • 2017-10-20 Cryptanalysis of Simpira v1 in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2016
  • 2017-08-25 Gimli : A Cross-Platform Permutation in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2017
  • 2017-07-29 Side-Channel Analysis of Keymill in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2017-06-26 Related-Key Impossible-Differential Attack on Reduced-Round Skinny in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2016-11-09 Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2016-07-20 Cryptanalysis of Reduced NORX in FAST SOFTWARE ENCRYPTION
  • 2016-07-20 Analysis of the Kupyna-256 Hash Function in FAST SOFTWARE ENCRYPTION
  • 2016-06-30 Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ in INFORMATION SECURITY AND PRIVACY
  • 2016-06-09 Square Attack on 7-Round Kiasu-BC in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2016-03-10 Higher-Order Cryptanalysis of LowMC in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2015
  • 2016-03-10 Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security in SMART CARD RESEARCH AND ADVANCED APPLICATIONS
  • 2016 Forgery Attacks on Round-Reduced ICEPOLE-128 in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2015-12-30 Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2015-12-30 Analysis of SHA-512/224 and SHA-512/256 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2015-08-12 Related-Key Forgeries for Prøst-OTR in FAST SOFTWARE ENCRYPTION
  • 2015-04-19 Collision Attack on 5 Rounds of Grøstl in FAST SOFTWARE ENCRYPTION
  • 2015-04-19 Branching Heuristics in Differential Collision Search with Applications to SHA-512 in FAST SOFTWARE ENCRYPTION
  • 2015-03-29 Key Recovery Attacks on Recent Authenticated Ciphers in PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014
  • 2015-03-17 On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks in SMART CARD RESEARCH AND ADVANCED APPLICATIONS
  • 2015-03-11 Cryptanalysis of Ascon in TOPICS IN CRYPTOLOGY –- CT-RSA 2015
  • 2014-11-29 Differential Cryptanalysis of SipHash in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2014-11-29 Malicious Hashing: Eve’s Variant of SHA-1 in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2014-07-08 ALE: AES-Based Lightweight Authenticated Encryption in FAST SOFTWARE ENCRYPTION
  • 2013-11-12 The Rebound Attack and Subspace Distinguishers: Application to Whirlpool in JOURNAL OF CRYPTOLOGY
  • 2013 Collisions for the WIDEA-8 Compression Function in TOPICS IN CRYPTOLOGY – CT-RSA 2013
  • 2013 Finding Collisions for Round-Reduced SM3 in TOPICS IN CRYPTOLOGY – CT-RSA 2013
  • 2013 Improving Local Collisions: New Attacks on Reduced SHA-256 in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2013
  • 2013 Improved Cryptanalysis of Reduced RIPEMD-160 in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2013 Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013
  • 2013 Differential Cryptanalysis of Keccak Variants in CRYPTOGRAPHY AND CODING
  • 2012 Differential Analysis of the LED Block Cipher in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2012 Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128 in FAST SOFTWARE ENCRYPTION
  • 2012 A Simple Key-Recovery Attack on McOE-X in CRYPTOLOGY AND NETWORK SECURITY
  • 2012 Cryptanalysis of Round-Reduced HAS-160 in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2011
  • 2012 Differential Attacks on Reduced RIPEMD-160 in INFORMATION SECURITY
  • 2012 Collision Attack on the Hamsi-256 Compression Function in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2012
  • 2011-02-13 Memoryless near-collisions via coding theory in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2011 Second-Order Differential Collisions for Reduced SHA-256 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011 Boomerang Distinguisher for the SIMD-512 Compression Function in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2011
  • 2011 Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011 Preimage Attacks against PKC98-Hash and HAS-V in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010
  • 2011 Practical Attacks on the Maelstrom-0 Compression Function in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.410337.2", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5596.f", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.410413.3", 
            "type": "Organization"
          }
        ], 
        "familyName": "Mendel", 
        "givenName": "Florian", 
        "id": "sg:person.013342563571.85", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013342563571.85"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-08-04T17:39", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/person/person_942.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.013342563571.85'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.013342563571.85'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.013342563571.85'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.013342563571.85'


     




    Preview window. Press ESC to close (or click here)


    ...