Folgen
Christoph Dobraunig
Christoph Dobraunig
Bestätigte E-Mail-Adresse bei intel.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
329*2016
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
1252018
SPHINCS+. Submission to the NIST Post-Quantum Cryptography Standardization Project (2020)
JP Aumasson, DJ Bernstein, W Beullens, C Dobraunig, M Eichlseder, ...
99*
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
712017
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
70*2015
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
67*2018
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
672015
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
642016
Statistical ineffective fault attacks on masked AES with fault countermeasures
C Dobraunig, M Eichlseder, H Gross, S Mangard, F Mendel, R Primas
International Conference on the Theory and Application of Cryptology and …, 2018
572018
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
562015
ISAP v2.0
C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas, ...
48*2019
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 87-101, 2015
442015
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
422015
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
422015
Protecting against statistical ineffective fault attacks
J Daemen, CE Dobraunig, M Eichlseder, H Gross, F Mendel, R Primas
412020
Leakage resilience of the duplex construction
C Dobraunig, B Mennink
International Conference on the Theory and Application of Cryptology and …, 2019
262019
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
262016
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
252014
Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink
22*2019
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
C Dobraunig, L Grassi, A Guinet, D Kuijsters
Annual International Conference on the Theory and Applications of …, 2021
212021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20