Christoph Dobraunig
Christoph Dobraunig
Digital Security Group, Radboud University, Nijmegen
Verified email at ru.nl - Homepage
TitleCited byYear
Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR competition: http://ascon. iaik. tugraz. at, 2014
84*2014
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
25*2016
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
232015
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
20*2017
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
202015
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
192015
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Groß, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
182015
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
182014
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
172015
Related-key forgeries for Prøst-OTR
C Dobraunig, M Eichlseder, F Mendel
International Workshop on Fast Software Encryption, 282-296, 2015
172015
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 87-101, 2015
162015
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
13*2018
SPHINCS+. Submission to the NIST’s post-quantum cryptography standardization process.(2018)
A Hulsing, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
13*2018
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
112016
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
102016
Compact hardware implementations of the block ciphers mCrypton, NOEKEON, and SEA
T Plos, C Dobraunig, M Hofinger, A Oprisnik, C Wiesmeier, J Wiesmeier
International Conference on Cryptology in India, 358-377, 2012
82012
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
72018
Cryptanalysis of simpira v1
C Dobraunig, M Eichlseder, F Mendel
International Conference on Selected Areas in Cryptography, 284-298, 2016
72016
Ascon hardware implementations and side-channel evaluation
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
Microprocessors and Microsystems 52, 470-479, 2017
62017
Analysis of the kupyna-256 hash function
C Dobraunig, M Eichlseder, F Mendel
International conference on fast software encryption, 575-590, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20