Christoph Dobraunig
Home
Publications
Service
Contact
Christoph Dobraunig
Latest
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Information-Combining Differential Fault Attacks on DEFAULT
Leakage and Tamper Resilient Permutation-Based Cryptography
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Leakage Resilient Value Comparison With Application to Message Authentication
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Ascon
Elephant
ISAP
Multi-user Security of the Elephant v2 Authenticated Encryption Mode
Tightness of the Suffix Keyed Sponge Bound
Protecting against Statistical Ineffective Fault Attacks
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96
ISAP v2.0
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
Practical Forgeries for ORANGE
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta
Security of the Suffix Keyed Sponge
Leakage Resilience of the Duplex Construction
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
Algebraic Cryptanalysis of Variants of Frit
Efficient Collision Attack Frameworks for RIPEMD-160
SPHINCS+
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Rasta: A cipher with low ANDdepth and few ANDs per bit
Side-Channel Analysis of Keymill
ISAP - Towards Side-Channel Secure Authenticated Encryption
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
Ascon hardware implementations and side-channel evaluation
Practical Key-Recovery Attack on MANTIS 5
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Cryptanalysis of Simpira v1
Square Attack on 7-Round Kiasu-BC
Analysis of the Kupyna-256 Hash Function
Analysis of SHA-512/224 and SHA-512/256
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Higher-Order Cryptanalysis of LowMC
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Forgery Attacks on Round-Reduced ICEPOLE-128
Suit up! - Made-to-Measure Hardware Implementations of Ascon
Cryptanalysis of Ascon
Related-Key Forgeries for Prøst-OTR
Security Evaluation of SHA-224, SHA-512/224, and SHA-512/256
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Key Recovery Attacks on Recent Authenticated Ciphers
Differential Cryptanalysis of SipHash
Ascon
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA
Cite
×