Christoph Dobraunig
Title
Cited by
Cited by
Year
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
151*2016
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
46*2018
SPHINCS+
JP Aumasson, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
44*2019
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
442017
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
42*2016
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
322015
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
312015
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Groß, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
302015
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
282015
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 87-101, 2015
282015
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
272018
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
252015
Statistical ineffective fault attacks on masked AES with fault countermeasures
C Dobraunig, M Eichlseder, H Gross, S Mangard, F Mendel, R Primas
International Conference on the Theory and Application of Cryptology and …, 2018
222018
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
212016
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
202014
Related-key forgeries for Prøst-OTR
C Dobraunig, M Eichlseder, F Mendel
International Workshop on Fast Software Encryption, 282-296, 2015
172015
Ascon hardware implementations and side-channel evaluation
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
Microprocessors and Microsystems 52, 470-479, 2017
162017
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
152016
Leakage resilience of the duplex construction
C Dobraunig, B Mennink
International Conference on the Theory and Application of Cryptology and …, 2019
142019
Analysis of the kupyna-256 hash function
C Dobraunig, M Eichlseder, F Mendel
International conference on fast software encryption, 575-590, 2016
13*2016
The system can't perform the operation now. Try again later.
Articles 1–20