Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrea Röck is active.

Publication


Featured researches published by Andrea Röck.


international conference on cryptology in india | 2011

Practical analysis of reduced-round keccak

María Naya-Plasencia; Andrea Röck; Willi Meier

Keccak is a finalist of the SHA-3 competition. In this paper we propose a practical distinguisher on 4 rounds of the hash function with the submission parameters. Recently, the designers of Keccak published several challenges on reduced versions of the hash function. With regard to this, we propose a preimage attack on 2 rounds, a collision attack on 2 rounds and a near collision on 3 rounds of


international conference on selected areas in cryptography | 2010

Cryptanalysis of Luffa v2 components

Dmitry Khovratovich; María Naya-Plasencia; Andrea Röck; Martin Schläffer

\lfloor


international conference on progress in cryptology | 2008

Stream ciphers using a random update function: study of the entropy of the inner state

Andrea Röck

Keccak


fast software encryption | 2010

Cryptanalysis of ESSENCE

María Naya-Plasencia; Andrea Röck; Jean-Philippe Aumasson; Yann Laigle-Chapuy; Gaëtan Leurent; Willi Meier; Thomas Peyrin

\rfloor_{224}


Designs, Codes and Cryptography | 2013

Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers

Andrea Röck; Kaisa Nyberg

and


fast software encryption | 2008

Entropy of the Internal State of an FCSR in Galois Representation

Andrea Röck

\lfloor


SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications | 2008

Parallel Generation of l -Sequences

Cédric Lauradoux; Andrea Röck

Keccak


IACR Cryptology ePrint Archive | 2012

The Linux Pseudorandom Number Generator Revisited

Patrick Lacharme; Andrea Röck; Vincent Strubel; Marion Videau

\rfloor_{256}


Archive | 2011

Exploiting Linear Hull in Matsui´s Algorithm 1

Andrea Röck; Kaisa Nyberg

. These are the first practical cryptanalysis results on reduced rounds of the hash function scenario. All of our results have been implemented.


Software Engineering Research and Practice | 2006

On Petri Nets and Predicate-Transition Nets.

Andrea Röck; Ray Kresman

We develop a number of techniques for the cryptanalysis of the SHA-3 candidate Luffa, and apply them to various Luffa components. These techniques include a new variant of the rebound approach taking into account the specifics of Luffa. The main improvements include the construction of good truncated differential paths, the search for differences using multiple inbound phases and a fast final solution search via linear systems. Using these techniques, we are able to construct nontrivial semi-free-start collisions for 7 (out of 8 rounds) of Luffa-256 with a complexity of 2104 in time and 2102 in memory. This is the first analysis of a Luffa component other that the permutation of Luffa v1. Additionally, we provide new and more efficient distinguishers also for the full permutation of Luffa v2. For this permutation distinguisher, we use a new model which applies first a short test on all samples and then a longer test on a smaller subset of the inputs. We demonstrate that a set of right pairs for the given differential path can be found significantly faster than for a random permutation.

Collaboration


Dive into the Andrea Röck's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Martin Schläffer

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Thomas Peyrin

Nanyang Technological University

View shared research outputs
Researchain Logo
Decentralizing Knowledge