Maria Eichlseder

Orcid: 0000-0002-8750-7423

Affiliations:
  • Graz University of Technology, Austria


According to our database1, Maria Eichlseder authored at least 65 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519.
IACR Cryptol. ePrint Arch., 2025

AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions.
IACR Cryptol. ePrint Arch., 2025

2024
Preliminary Analysis of Ascon-Xof and Ascon-Hash.
IACR Cryptol. ePrint Arch., 2024

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs.
IACR Cryptol. ePrint Arch., 2024

Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
The QARMAv2 Family of Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2023

Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2.
IACR Cryptol. ePrint Arch., 2023

The tweakable block cipher family QARMAv2.
IACR Cryptol. ePrint Arch., 2023

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2022

Statistical Effective Fault Attacks: The Other Side of the Coin.
IEEE Trans. Inf. Forensics Secur., 2022

Finding Collisions for Round-Reduced Romulus-H.
IACR Cryptol. ePrint Arch., 2022

Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE.
IACR Cryptol. ePrint Arch., 2022

Integral Cryptanalysis of WARP based on Monomial Prediction.
IACR Cryptol. ePrint Arch., 2022

Small MACs from Small Permutations.
IACR Cryptol. ePrint Arch., 2022

Information-Combining Differential Fault Attacks on DEFAULT.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
J. Cryptol., 2021

Practical Key Recovery Attacks on FlexAEAD.
IACR Cryptol. ePrint Arch., 2021

Ascon PRF, MAC, and Short-Input MAC.
IACR Cryptol. ePrint Arch., 2021

L<sup>*</sup>-based learning of Markov decision processes (extended version).
Formal Aspects Comput., 2021

2020
Isap v2.0.
IACR Trans. Symmetric Cryptol., 2020

PRINCEv2 - More Security for (Almost) No Overhead.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Analyzing the Linear Keystream Biases in AEGIS.
IACR Cryptol. ePrint Arch., 2019

Protecting against Statistical Ineffective Fault Attacks.
IACR Cryptol. ePrint Arch., 2019

L*-Based Learning of Markov Decision Processes (Extended Version).
CoRR, 2019

Algebraic Cryptanalysis of Variants of Frit.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Forgery Attacks on FlexAE and FlexAEAD.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

L<sup>*</sup>-Based Learning of Markov Decision Processes.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

2018
Differential Cryptanalysis of Symmetric Primitives.
Proceedings of the Ausgezeichnete Informatikdissertationen 2018., 2018

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Algebraic Cryptanalysis of Frit.
IACR Cryptol. ePrint Arch., 2018

Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2018

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Cryptanalysis of MORUS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
ISAP - Towards Side-Channel Secure Authenticated Encryption.
IACR Trans. Symmetric Cryptol., 2017

Note on the Robustness of CAESAR Candidates.
IACR Cryptol. ePrint Arch., 2017

Clustering Related-Tweak Characteristics: Application to MANTIS-6.
IACR Cryptol. ePrint Arch., 2017

Side-Channel Analysis of Keymill.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
Practical Key-Recovery Attack on MANTIS5.
IACR Trans. Symmetric Cryptol., 2016

ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2016

Key Recovery for MANTIS-5.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Simpira.
IACR Cryptol. ePrint Arch., 2016

Practical Fault Attacks on Authenticated Encryption Modes for AES.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Simpira v1.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Analysis of the Kupyna-256 Hash Function.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Square Attack on 7-Round Kiasu-BC.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Forgery Attacks on Round-Reduced ICEPOLE-128.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Higher-Order Cryptanalysis of LowMC.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Related-Key Forgeries for Prøst-OTR.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Cryptanalysis of Ascon.
Proceedings of the Topics in Cryptology, 2015

Analysis of SHA-512/224 and SHA-512/256.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Malicious Hashing: Eve's Variant of SHA-1.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Key Recovery Attacks on Recent Authenticated Ciphers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Branching Heuristics in Differential Collision Search with Applications to SHA-512.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2014


  Loading...