We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Cid C., Grassi L., Gunsing A., Lüftenegger R., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 2022
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
Grassi L., Rechberger C.
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings
Privacy-Preserving Machine Learning Using Cryptography
Rechberger C., Walch R.
Security and Artificial Intelligence , Springer Science and Business Media Deutschland GmbH, 109-129, 2022
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Grassi L., Khovratovich D., Rechberger C., Roy A., Schofnegger M.
Proceedings of the 30th USENIX Security Symposium
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Grassi L., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2021(2), 2021
Weak-Key Distinguishers for AES
Grassi L., Leander G., Rechberger C., Tezcan C., Wiemer F.
Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers
Revisiting Gilbert’s known-key distinguisher
Grassi L., Rechberger C.
Designs, Codes and Cryptography, Vol. 88(7), 2020
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Grassi L., Lüftenegger R., Rechberger C., Rotaru D., Schofnegger M.
Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Framework for faster key search using related-key higher-order differential properties
Dobraunig C., Moazami F., Rechberger C., Soleimany H.
IET Information Security, Vol. 14(2), 2020
Efficient FPGA Implementations of LowMC and Picnic
Kales D., Ramacher S., Rechberger C., Walch R., Werner M.
Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Eichlseder M., Grassi L., Lüftenegger R., Øygarden M., Rechberger C., Schofnegger M., Wang Q.
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings
Mobile Private Contact Discovery at Scale
Kales D., Rechberger C., Schneider T., Senker M., Weinert C.
28th USENIX Security Symposium
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Dinur I., Promitzer A., Kales D., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Feistel Structures for MPC, and More
Albrecht M., Grassi L., Perrin L., Ramacher S., Rechberger C., Rotaru D., Roy A., Schofnegger M.
Computer Security – ESORICS 2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Albrecht M., Cid C., Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M.
Advances in Cryptology - ASIACRYPT 2019
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018
Zero-Sum Partitions of PHOTON Permutations
Wang Q., Grassi L., Rechberger C.
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Zaverucha G.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017
A new structural-differential property of 5-round AES
Grassi L., Rechberger C., Rønjom S.
Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
