Christian Rechberger
Orcid: 0000-0003-1280-6020Affiliations:
- Technical University of Denmark, DTU
According to our database1,
Christian Rechberger
authored at least 121 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on groestl.info
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
Proc. Priv. Enhancing Technol., 2025
2024
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations.
IACR Trans. Symmetric Cryptol., 2024
IACR Cryptol. ePrint Arch., 2024
Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2024
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System.
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Security and Artificial Intelligence, 2022
IACR Trans. Symmetric Cryptol., 2022
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer.
IACR Trans. Symmetric Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta.
IET Inf. Secur., 2020
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC.
IACR Cryptol. ePrint Arch., 2019
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Trans. Symmetric Cryptol., 2016
IACR Trans. Symmetric Cryptol., 2016
IACR Cryptol. ePrint Arch., 2016
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015
2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN.
IACR Cryptol. ePrint Arch., 2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
IEEE Trans. Inf. Theory, 2008
J. Univers. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Energy evaluation of software implementations of block ciphers under memory constraints.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the ACM/SIGDA 14th International Symposium on Field Programmable Gate Arrays, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Cryptography and Coding, 2005
Interoperable Certification Authorities In The European Union: A Practical Solution.
Proceedings of the Electronic Government, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004