Name
Affiliation
Papers
MARIA EICHLSEDER
Graz Univ Technol, IAIK, A-8010 Graz, Austria
41
Collaborators
Citations 
PageRank 
54
46
15.95
Referers 
Referees 
References 
119
369
191
Search Limit
100369
Title
Citations
PageRank
Year
Integral Cryptanalysis of WARP based on Monomial Prediction00.342022
Information-Combining Differential Fault Attacks on DEFAULT00.342022
Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE00.342022
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis00.342022
Ascon V1.2: Lightweight Authenticated Encryption And Hashing20.672021
L∗-based learning of Markov decision processes (extended version)00.342021
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.00.342020
Protecting against Statistical Ineffective Fault Attacks.00.342020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.00.342020
Analyzing The Linear Keystream Biases In Aegis00.342019
Protecting against Statistical Ineffective Fault Attacks.00.342019
Analyzing the Linear Keystream Biases in AEGIS.00.342019
Forgery Attacks on FlexAE and FlexAEAD.00.342019
Clustering Related-Tweak Characteristics: Application To Mantis-630.412018
Exploiting Ineffective Fault Inductions on Symmetric Cryptography.00.342018
Cryptanalysis of MORUS.00.342018
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.00.342018
Rasta: A cipher with low ANDdepth and few ANDs per bit.30.422018
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.10.352018
Algebraic Cryptanalysis of Frit.00.342018
Note on the Robustness of CAESAR Candidates.00.342017
Isap - Towards Side-Channel Secure Authenticated Encryption00.342017
Practical Fault Attacks on Authenticated Encryption Modes for AES.00.342016
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.70.502016
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks.10.352016
Key Recovery for MANTIS-5.00.342016
Square Attack on 7-Round Kiasu-BC.20.572016
Analysis of SHA-512/224 and SHA-512/256.10.632016
Cryptanalysis of Simpira v1.00.342016
Cryptanalysis of Simpira.00.342016
Analysis of the Kupyna-256 Hash Function.10.372016
Practical Key-Recovery Attack On Mantis(5)00.342016
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks.20.402015
Higher-Order Cryptanalysis of LowMC.00.342015
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates70.462015
Forgery Attacks on round-reduced ICEPOLE-128.00.342015
Related-Key Forgeries for Prøst-OTR.40.442015
Cryptanalysis of Ascon.00.342015
Branching Heuristics in Differential Collision Search with Applications to SHA-512.40.412014
Key Recovery Attacks On Recent Authenticated Ciphers10.362014
Malicious Hashing: Eve's Variant of SHA-1.70.842014