Christian Rechberger


Ontology type: schema:Person     


Person Info

NAME

Christian

SURNAME

Rechberger

Publications in SciGraph latest 50 shown

  • 2022-04-08 Privacy-Preserving Machine Learning Using Cryptography in SECURITY AND ARTIFICIAL INTELLIGENCE
  • 2021-07-21 Weak-Key Distinguishers for AES in SELECTED AREAS IN CRYPTOGRAPHY
  • 2020-12-06 An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2020
  • 2020-05-04 Revisiting Gilbert’s known-key distinguisher in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2020-05-01 On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2020-02-14 Efficient FPGA Implementations of LowMC and Picnic in TOPICS IN CRYPTOLOGY – CT-RSA 2020
  • 2019-11-22 Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2019
  • 2019-09-15 Feistel Structures for MPC, and More in COMPUTER SECURITY – ESORICS 2019
  • 2019-04-18 Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2019
  • 2018-07-25 Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-03-07 Zero-Sum Partitions of PHOTON Permutations in TOPICS IN CRYPTOLOGY – CT-RSA 2018
  • 2017-04-01 A New Structural-Differential Property of 5-Round AES in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2017
  • 2016-11-11 Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2016
  • 2016-11-09 MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2015-08-15 State-Recovery Analysis of Spritz in PROGRESS IN CRYPTOLOGY -- LATINCRYPT 2015
  • 2015-08-12 Linear Distinguishers in the Key-less Setting: Application to PRESENT in FAST SOFTWARE ENCRYPTION
  • 2015-04-14 Ciphers for MPC and FHE in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2015-03-29 Practical Attacks on AES-like Cryptographic Hash Functions in PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014
  • 2015-03-11 Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows in TOPICS IN CRYPTOLOGY –- CT-RSA 2015
  • 2014-05-21 The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2013-11-12 The Rebound Attack and Subspace Distinguishers: Application to Whirlpool in JOURNAL OF CRYPTOLOGY
  • 2013-05-31 Rotational Rebound Attacks on Reduced Skein in JOURNAL OF CRYPTOLOGY
  • 2013 Improved Cryptanalysis of the Block Cipher KASUMI in SELECTED AREAS IN CRYPTOGRAPHY
  • 2013 On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis in INFORMATION SECURITY AND CRYPTOLOGY – ICISC 2012
  • 2012-02-11 On security arguments of the second round SHA-3 candidates in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2012 PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2012 Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family in FAST SOFTWARE ENCRYPTION
  • 2012 Narrow-Bicliques: Cryptanalysis of Full IDEA in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2011 A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011 Biclique Cryptanalysis of the Full AES in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011 Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) in INFORMATION SECURITY AND PRIVACY
  • 2010 Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2010
  • 2010 Rotational Rebound Attacks on Reduced Skein in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2010 Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2010 Rebound Attacks on the Reduced Grøstl Hash Function in TOPICS IN CRYPTOLOGY - CT-RSA 2010
  • 2010 Second-Preimage Analysis of Reduced SHA-1 in INFORMATION SECURITY AND PRIVACY
  • 2009 Cryptanalysis of Twister in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2009 Cryptanalysis of MDC-2 in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2009 MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2009 Cryptanalysis of Vortex in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2009
  • 2009 Rebound Distinguishers: Results on the Full Whirlpool Compression Function in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2009 Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher in SELECTED AREAS IN CRYPTOGRAPHY
  • 2009 The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl in FAST SOFTWARE ENCRYPTION
  • 2009 Collisions and Other Non-random Properties for Step-Reduced SHA-256 in SELECTED AREAS IN CRYPTOGRAPHY
  • 2008-01-01 Cryptanalysis of the GOST Hash Function in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2008-01-01 A (Second) Preimage Attack on the GOST Hash Function in FAST SOFTWARE ENCRYPTION
  • 2008-01-01 New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba in FAST SOFTWARE ENCRYPTION
  • 2008-01-01 Correlated Keystreams in Moustique in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2008
  • 2008 Preimages for Reduced SHA-0 and SHA-1 in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2008-01-01 Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 in RESEARCH IN CRYPTOLOGY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.410413.3", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.56912.39", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5170.3", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5596.f", 
            "type": "Organization"
          }
        ], 
        "familyName": "Rechberger", 
        "givenName": "Christian", 
        "id": "sg:person.013632630546.55", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013632630546.55"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-08-04T17:38", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/person/person_851.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.013632630546.55'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.013632630546.55'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.013632630546.55'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.013632630546.55'


     




    Preview window. Press ESC to close (or click here)


    ...