Christoph Dobraunig
Christoph Dobraunig
Digital Security Group, Radboud University, Nijmegen
Bestätigte E-Mail-Adresse bei ru.nl - Startseite
TitelZitiert vonJahr
Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR competition: http://ascon. iaik. tugraz. at, 2014
98*2014
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
29*2016
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
272015
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
25*2017
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
242015
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
21*2018
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
212015
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Groß, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
212015
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
202015
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
192014
Related-key forgeries for Prøst-OTR
C Dobraunig, M Eichlseder, F Mendel
International Workshop on Fast Software Encryption, 282-296, 2015
172015
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 87-101, 2015
162015
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
152016
SPHINCS+
A Hulsing, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
Tech. rep. available at https://csrc. nist. gov/projects/post-quantum …, 2018
14*2018
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
142016
Statistical ineffective fault attacks on masked aes with fault countermeasures
C Dobraunig, M Eichlseder, H Gross, S Mangard, F Mendel, R Primas
International Conference on the Theory and Application of Cryptology and …, 2018
92018
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
92018
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
C Dobraunig, E List
Cryptographers’ Track at the RSA Conference, 207-222, 2017
92017
Ascon hardware implementations and side-channel evaluation
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
Microprocessors and Microsystems 52, 470-479, 2017
82017
Compact hardware implementations of the block ciphers mCrypton, NOEKEON, and SEA
T Plos, C Dobraunig, M Hofinger, A Oprisnik, C Wiesmeier, J Wiesmeier
International Conference on Cryptology in India, 358-377, 2012
82012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20