Cryptographers' World
 

Florian Mendel



14 papers in database with 213 citations 

H-number: 10

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Florian Mendel,  Christian Rechberger,  Martin Schläffer,  MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners, pp. 144 - 161, ASIACRYPT 2009.

[Electronic Edition][No citation]

2. Mario Lamberger,  Florian Mendel,  Christian Rechberger,  Vincent Rijmen,  Martin Schläffer,  Rebound Distinguishers: Results on the Full Whirlpool Compression Function, pp. 126 - 143, ASIACRYPT 2009.

[Electronic Edition][Cited 29 times ]

3. Florian Mendel,  Christian Rechberger,  Martin Schläffer,  Cryptanalysis of Twister, pp. 342 - 353, ACNS 2009.

[Electronic Edition][Cited 12 times ]

4. Lars R. Knudsen,  Florian Mendel,  Christian Rechberger,  Søren S. Thomsen,  Cryptanalysis of MDC-2, pp. 106 - 120, EUROCRYPT 2009.

[Electronic Edition][Cited 2 times ]

5. Florian Mendel,  Christian Rechberger,  Martin Schläffer,  Søren S. Thomsen,  The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl, pp. 260 - 276, FSE 2009.

[Electronic Edition][Cited 30 times ]

6. Florian Mendel,  Tomislav Nad,  Martin Schläffer,  Collision Attack on Boole, pp. 369 - 381, ACNS 2009.

[Electronic Edition][Cited 2 times ]

7. Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  Marcin Kontak,  Janusz Smit,  Cryptanalysis of the GOST Hash Function, pp. 162 - 178, CRYPTO 2008.

[Electronic Edition][Cited 10 times ]

8. Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  A (Second) Preimage Attack on the GOST Hash Function, pp. 224 - 234, FSE 2008.

[Electronic Edition][Cited 9 times ]

9. Florian Mendel,  Joseph Lano,  Bart Preneel,  Cryptanalysis of Reduced Variants of the FORK-256 Hash Function, pp. 85 - 100, CT-RSA 2007.

[Electronic Edition][Cited 13 times ]

10. Christophe De Cannière,  Florian Mendel,  Christian Rechberger,  Collisions for 70-Step SHA-1: On the Full Cost of Collision Search, pp. 56 - 73, SAC 2007.

[Electronic Edition][Cited 26 times ]

11. Florian Mendel,  Vincent Rijmen,  Cryptanalysis of the Tiger Hash Function, pp. 536 - 550, ASIACRYPT 2007.

[Electronic Edition][Cited 17 times ]

12. Florian Mendel,  Bart Preneel,  Vincent Rijmen,  Hirotaka Yoshida,  Dai Watanabe,  Update on Tiger, pp. 63 - 79, INDOCRYPT 2006.

[Electronic Edition][Cited 13 times ]

13. Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  Vincent Rijmen,  The Impact of Carries on the Complexity of Collision Attacks on SHA-1, pp. 278 - 292, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

14. Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  Vincent Rijmen,  Analysis of Step-Reduced SHA-256, pp. 126 - 143, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 36 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...