Maria Eichlseder

Orcid: 0000-0002-8750-7423

Affiliations:
  • Graz University of Technology, Austria


According to our database1, Maria Eichlseder authored at least 60 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
IACR Cryptol. ePrint Arch., 2024

2023
The QARMAv2 Family of Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2023

Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2.
IACR Cryptol. ePrint Arch., 2023

The tweakable block cipher family QARMAv2.
IACR Cryptol. ePrint Arch., 2023

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2022

Statistical Effective Fault Attacks: The Other Side of the Coin.
IEEE Trans. Inf. Forensics Secur., 2022

Finding Collisions for Round-Reduced Romulus-H.
IACR Cryptol. ePrint Arch., 2022

Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks.
IACR Cryptol. ePrint Arch., 2022

Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE.
IACR Cryptol. ePrint Arch., 2022

Integral Cryptanalysis of WARP based on Monomial Prediction.
IACR Cryptol. ePrint Arch., 2022

Small MACs from Small Permutations.
IACR Cryptol. ePrint Arch., 2022

Practical key recovery attacks on FlexAEAD.
Des. Codes Cryptogr., 2022

2021
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
J. Cryptol., 2021

Information-Combining Differential Fault Attacks on DEFAULT.
IACR Cryptol. ePrint Arch., 2021

Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges.
IACR Cryptol. ePrint Arch., 2021

Ascon PRF, MAC, and Short-Input MAC.
IACR Cryptol. ePrint Arch., 2021

L<sup>*</sup>-based learning of Markov decision processes (extended version).
Formal Aspects Comput., 2021

2020
Isap v2.0.
IACR Trans. Symmetric Cryptol., 2020

Protecting against Statistical Ineffective Fault Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
IACR Cryptol. ePrint Arch., 2020

PRINCEv2 - More Security for (Almost) No Overhead.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

2019
Analyzing the Linear Keystream Biases in AEGIS.
IACR Cryptol. ePrint Arch., 2019

Forgery Attacks on FlexAE and FlexAEAD.
IACR Cryptol. ePrint Arch., 2019

L*-Based Learning of Markov Decision Processes (Extended Version).
CoRR, 2019

Algebraic Cryptanalysis of Variants of Frit.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

L<sup>*</sup>-Based Learning of Markov Decision Processes.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

2018
Differential Cryptanalysis of Symmetric Primitives.
Proceedings of the Ausgezeichnete Informatikdissertationen 2018., 2018

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Algebraic Cryptanalysis of Frit.
IACR Cryptol. ePrint Arch., 2018

Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2018

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
IACR Cryptol. ePrint Arch., 2018

Rasta: A cipher with low ANDdepth and few ANDs per bit.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of MORUS.
IACR Cryptol. ePrint Arch., 2018

2017
ISAP - Towards Side-Channel Secure Authenticated Encryption.
IACR Trans. Symmetric Cryptol., 2017

Note on the Robustness of CAESAR Candidates.
IACR Cryptol. ePrint Arch., 2017

Clustering Related-Tweak Characteristics: Application to MANTIS-6.
IACR Cryptol. ePrint Arch., 2017

2016
Practical Key-Recovery Attack on MANTIS5.
IACR Trans. Symmetric Cryptol., 2016

ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2016

Key Recovery for MANTIS-5.
IACR Cryptol. ePrint Arch., 2016

Analysis of SHA-512/224 and SHA-512/256.
IACR Cryptol. ePrint Arch., 2016

Square Attack on 7-Round Kiasu-BC.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Simpira.
IACR Cryptol. ePrint Arch., 2016

Side-Channel Analysis of Keymill.
IACR Cryptol. ePrint Arch., 2016

Practical Fault Attacks on Authenticated Encryption Modes for AES.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Simpira v1.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Cryptanalysis of Ascon.
IACR Cryptol. ePrint Arch., 2015

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2015

Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates.
IACR Cryptol. ePrint Arch., 2015

Analysis of the Kupyna-256 Hash Function.
IACR Cryptol. ePrint Arch., 2015

Higher-order cryptanalysis of LowMC.
IACR Cryptol. ePrint Arch., 2015

Forgery Attacks on round-reduced ICEPOLE-128.
IACR Cryptol. ePrint Arch., 2015

Related-Key Forgeries for Prøst-OTR.
IACR Cryptol. ePrint Arch., 2015

2014
Branching Heuristics in Differential Collision Search with Applications to SHA-512.
IACR Cryptol. ePrint Arch., 2014

Malicious Hashing: Eve's Variant of SHA-1.
IACR Cryptol. ePrint Arch., 2014

Key Recovery Attacks on Recent Authenticated Ciphers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014


  Loading...