Christoph Dobraunig
Christoph Dobraunig
Digital Security Group, Radboud University, Nijmegen
Verified email at ru.nl - Homepage
TitleCited byYear
Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR competition: http://ascon. iaik. tugraz. at, 2014
99*2014
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
27*2016
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
272015
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
252015
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
24*2017
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
21*2018
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
212015
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Groß, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
212015
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
202015
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
192014
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 87-101, 2015
172015
Related-key forgeries for Prøst-OTR
C Dobraunig, M Eichlseder, F Mendel
International Workshop on Fast Software Encryption, 282-296, 2015
172015
SPHINCS+. Submission to the NIST’s post-quantum cryptography standardization process.(2018)
A Hulsing, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
15*2018
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
142016
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
132016
Statistical ineffective fault attacks on masked AES with fault countermeasures
C Dobraunig, M Eichlseder, H Groß, S Mangard, F Mendel, R Primas
International Conference on the Theory and Application of Cryptology and …, 2018
92018
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
92018
Compact hardware implementations of the block ciphers mCrypton, NOEKEON, and SEA
T Plos, C Dobraunig, M Hofinger, A Oprisnik, C Wiesmeier, J Wiesmeier
International Conference on Cryptology in India, 358-377, 2012
82012
Impossible-differential and boomerang cryptanalysis of round-reduced KIASU-BC
C Dobraunig, E List
Cryptographers’ Track at the RSA Conference, 207-222, 2017
72017
Cryptanalysis of simpira v1
C Dobraunig, M Eichlseder, F Mendel
International Conference on Selected Areas in Cryptography, 284-298, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20