[go: up one dir, main page]

Follow
Mario Lamberger
Mario Lamberger
Senior Principal Cryptography Architect, NXP Semiconductors Austria
Verified email at nxp.com
Title
Cited by
Cited by
Year
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Cryptographers’ Track at the RSA Conference, 67-78, 2002
5092002
Rebound distinguishers: Results on the full Whirlpool compression function
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
1772009
Higher-order differential attack on reduced SHA-256
M Lamberger, F Mendel
Cryptology ePrint Archive, 2011
922011
Second-order differential collisions for reduced SHA-256
A Biryukov, M Lamberger, F Mendel, I Nikolić
International Conference on the Theory and Application of Cryptology and …, 2011
682011
The rebound attack and subspace distinguishers: Application to Whirlpool
M Lamberger, F Mendel, M Schläffer, C Rechberger, V Rijmen
Journal of Cryptology 28 (2), 257-296, 2015
642015
Hybrid engine for polymorphic shellcode detection
U Payer, P Teufl, M Lamberger
International Conference on Detection of Intrusions and Malware, and …, 2005
532005
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
J Daemen, M Lamberger, N Pramstaller, V Rijmen, F Vercauteren
Computing 85 (1), 85-104, 2009
522009
Distribution properties of digital expansions arising from linear recurrences
M Lamberger, JM Thuswaldner
Mathematica Slovaca 53 (1), 1-20, 2003
462003
The rebound attack and subspace distinguishers: Application to Whirlpool
M Lamberger, F Mendel, C Rechberger, V Rijmen, M Schläffer
Cryptology ePrint Archive, 2010
202010
Memoryless near-collisions via coding theory
M Lamberger, F Mendel, V Rijmen, K Simoens
Designs, Codes and Cryptography 62 (1), 1-18, 2012
162012
Analysis of the hash function design strategy called SMASH
M Lamberger, N Pramstaller, C Rechberger, V Rijmen
IEEE Transactions on Information Theory 54 (8), 3647-3655, 2008
152008
Memoryless near-collisions, revisited
M Lamberger, E Teufl
Information Processing Letters 113 (3), 60-66, 2013
142013
Numerical solvers and cryptanalysis.
M Lamberger, T Nad, V Rijmen
Journal of mathematical cryptology 3 (3), 2009
132009
Second preimages for SMASH
M Lamberger, N Pramstaller, C Rechberger, V Rijmen
Cryptographers’ Track at the RSA Conference, 101-111, 2007
132007
Traffic classification using self-organizing maps
U Payer, P Teufl, M Lamberger
Proceedings of the Fifth International Networking Conference, 11-18, 2005
112005
On a family of singular measures related to Minkowski's?(x) function
M Lamberger
Indagationes Mathematicae 17 (1), 45-63, 2006
92006
Optimal covering codes for finding near-collisions
M Lamberger, V Rijmen
International Workshop on Selected Areas in Cryptography, 187-197, 2010
72010
WiFi Chipset Fingerprinting
G Lackner, M Lamberger, U Payer, P Teufl
Proceedings zu DA-CH Mobility, 2006
62006
Massive data mining for polymorphic code detection
U Payer, P Teufl, S Kraxberger, M Lamberger
International Workshop on Mathematical Methods, Models, and Architectures …, 2005
62005
Hybrid engine for polymorphic code detection
U Payer, M Lamberger, P Teufl
Proceedings of the Conference on Detection of Intrusions and Malware …, 0
5
The system can't perform the operation now. Try again later.
Articles 1–20