Mario Lamberger

According to our database1, Mario Lamberger authored at least 18 papers between 2002 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool.
J. Cryptol., 2015

2013
Memoryless near-collisions, revisited.
Inf. Process. Lett., 2013

2012
Memoryless near-collisions via coding theory.
Des. Codes Cryptogr., 2012

Collision Attack on the Hamsi-256 Compression Function.
Proceedings of the Progress in Cryptology, 2012

2011
Higher-Order Differential Attack on Reduced SHA-256.
IACR Cryptol. ePrint Arch., 2011

Second-Order Differential Collisions for Reduced SHA-256.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Optimal Covering Codes for Finding Near-Collisions.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2009
Numerical solvers and cryptanalysis.
J. Math. Cryptol., 2009

Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers.
Computing, 2009

Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n.
Proceedings of the Information Security, 12th International Conference, 2009

Rebound Distinguishers: Results on the Full Whirlpool Compression Function.
Proceedings of the Advances in Cryptology, 2009

2008
Analysis of the Hash Function Design Strategy Called SMASH.
IEEE Trans. Inf. Theory, 2008

2007
Second Preimages for SMASH.
Proceedings of the Topics in Cryptology, 2007

Second Preimages for Iterated Hash Functions and Their Implications on MACs.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass.
IACR Cryptol. ePrint Arch., 2006

2005
Massive Data Mining for Polymorphic Code Detection.
Proceedings of the Computer Network Security, 2005

Hybrid Engine for Polymorphic Shellcode Detection.
Proceedings of the Detection of Intrusions and Malware, 2005

2002
An ASIC Implementation of the AES SBoxes.
Proceedings of the Topics in Cryptology, 2002


  Loading...