Christoph Dobraunig
Christoph Dobraunig
Digital Security Group, Radboud University, Nijmegen
Verified email at ru.nl - Homepage
TitleCited byYear
Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR competition: http://competitions. cr. yp. to/round1 …, 2014
79*2014
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
23*2016
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
202015
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
192015
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
172015
Related-key forgeries for Prøst-OTR
C Dobraunig, M Eichlseder, F Mendel
International Workshop on Fast Software Encryption, 282-296, 2015
172015
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2014
172014
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology 2017 (1), 80-105, 2017
16*2017
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Information Security and Cryptology, 87-101, 2015
162015
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Groß, E Wenger, C Dobraunig, C Ehrenhöfer
Digital System Design (DSD), 2015 Euromicro Conference on, 645-652, 2015
162015
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
152014
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
102016
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
9*2016
Compact hardware implementations of the block ciphers mCrypton, NOEKEON, and SEA
T Plos, C Dobraunig, M Hofinger, A Oprisnik, C Wiesmeier, J Wiesmeier
International Conference on Cryptology in India, 358-377, 2012
82012
Sifa: Exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
7*2018
Cryptanalysis of simpira v1
C Dobraunig, M Eichlseder, F Mendel
International Conference on Selected Areas in Cryptography, 284-298, 2016
72016
Analysis of the kupyna-256 hash function
C Dobraunig, M Eichlseder, F Mendel
International conference on fast software encryption, 575-590, 2016
62016
Ascon hardware implementations and side-channel evaluation
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
Microprocessors and Microsystems 52, 470-479, 2017
52017
Forgery and key recovery attacks on calico. Cryptographic Competitions Mailing List, 2014
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
5
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20