Publications and Conferences

Michael Gorski
How to Detect and React Faster on Cyber Attacks?
Digital Finance World 2019

Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel:
Mars Attacks! Revisited: – Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule. INDOCRYPT 2011: 94-113

Michael Gorski:
Cryptanalysis and design of symmetric primitives. Bauhaus University, Weimar 2010, pp. 1-146

Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
TWISTERpi – a framework for secure and fast hash functions. IJACT 2(1): 68-81 (2010)

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Some Observations on Indifferentiability. ACISP 2010: 117-134

Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
New Boomerang Attacks on ARIA. INDOCRYPT 2010: 163-175

Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
Collision Resistant Double-Length Hashing. ProvSec 2010: 102-118

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Some Observations on Indifferentiability. IACR Cryptology ePrint Archive 2010: 222 (2010)

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Attacking 9 and 10 Rounds of AES-256. ACISP 2009: 60-72

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
On the Security of Tandem-DM. FSE 2009: 84-103

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Security of Cyclic Double Block Length Hash Functions. IMA Int. Conf. 2009: 153-175

Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. INDOCRYPT 2009: 157-168

Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
Twister- A Framework for Secure and Fast Hash Functions. ISPEC 2009: 257-273

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. ISPEC 2009: 298-309

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. ISPEC 2009: 310-323

Ewan Fleischmann, Christian Forler, Michael Gorski:
Classification of the SHA-3 Candidates. Symmetric Cryptography 2009

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
On the Security of Tandem-DM. IACR Cryptology ePrint Archive 2009: 54 (2009)

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Security of Cyclic Double Block Length Hash Functions including Abreast-DM. IACR Cryptology ePrint Archive 2009: 261 (2009)

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Attacking Reduced Rounds of the ARIA Block Cipher. IACR Cryptology ePrint Archive 2009: 334 (2009)

Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode. IACR Cryptology ePrint Archive 2009: 335 (2009)

Michael Gorski, Stefan Lucks, Thomas Peyrin:
Slide Attacks on a Class of Hash Functions. ASIACRYPT 2008: 143-160

Michael Gorski, Stefan Lucks:
New Related-Key Boomerang Attacks on AES. INDOCRYPT 2008: 266-278

Michael Gorski, Stefan Lucks, Thomas Peyrin:
Slide Attacks on a Class of Hash Functions. IACR Cryptology ePrint Archive 2008: 263 (2008)

Michael Gorski, Stefan Lucks:
New Related-Key Boomerang Attacks on AES. IACR Cryptology ePrint Archive 2008: 438 (2008)

Ewan Fleischmann, Michael Gorski:
Some Observations on SHAMATA. IACR Cryptology ePrint Archive 2008: 501 (2008)

Ewan Fleischmann, Christian Forler, Michael Gorski:
Classification of the SHA-3 Candidates. IACR Cryptology ePrint Archive 2008: 511 (2008)