Christoph Dobraunig
Latest
-
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions
-
Generalized Initialization of the Duplex Construction
-
EliMAC: Speeding Up LightMAC by around 20%
-
Pasta: A Case for Hybrid Homomorphic Encryption
-
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
-
Information-Combining Differential Fault Attacks on DEFAULT
-
Leakage and Tamper Resilient Permutation-Based Cryptography
-
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
-
Leakage Resilient Value Comparison With Application to Message Authentication
-
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
-
Ascon
-
Elephant
-
ISAP
-
Multi-user Security of the Elephant v2 Authenticated Encryption Mode
-
Tightness of the Suffix Keyed Sponge Bound
-
Protecting against Statistical Ineffective Fault Attacks
-
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96
-
ISAP v2.0
-
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
-
Practical Forgeries for ORANGE
-
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
-
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta
-
Security of the Suffix Keyed Sponge
-
Leakage Resilience of the Duplex Construction
-
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
-
Algebraic Cryptanalysis of Variants of Frit
-
Efficient Collision Attack Frameworks for RIPEMD-160
-
SPHINCS+
-
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
-
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
-
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
-
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
-
Rasta: A cipher with low ANDdepth and few ANDs per bit
-
Side-Channel Analysis of Keymill
-
ISAP - Towards Side-Channel Secure Authenticated Encryption
-
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
-
Ascon hardware implementations and side-channel evaluation
-
Practical Key-Recovery Attack on MANTIS 5
-
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
-
Cryptanalysis of Simpira v1
-
Square Attack on 7-Round Kiasu-BC
-
Analysis of the Kupyna-256 Hash Function
-
Analysis of SHA-512/224 and SHA-512/256
-
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
-
Higher-Order Cryptanalysis of LowMC
-
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
-
Forgery Attacks on Round-Reduced ICEPOLE-128
-
Suit up! - Made-to-Measure Hardware Implementations of Ascon
-
Cryptanalysis of Ascon
-
Related-Key Forgeries for Prøst-OTR
-
Security Evaluation of SHA-224, SHA-512/224, and SHA-512/256
-
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
-
Key Recovery Attacks on Recent Authenticated Ciphers
-
Differential Cryptanalysis of SipHash
-
Ascon
-
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA