Christoph Dobraunig
Home
Publications
Service
Contact
Maria Eichlseder
Latest
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions
Information-Combining Differential Fault Attacks on DEFAULT
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Ascon
ISAP
Protecting against Statistical Ineffective Fault Attacks
ISAP v2.0
Algebraic Cryptanalysis of Variants of Frit
SPHINCS+
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Rasta: A cipher with low ANDdepth and few ANDs per bit
Side-Channel Analysis of Keymill
ISAP - Towards Side-Channel Secure Authenticated Encryption
Practical Key-Recovery Attack on MANTIS 5
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Cryptanalysis of Simpira v1
Square Attack on 7-Round Kiasu-BC
Analysis of the Kupyna-256 Hash Function
Analysis of SHA-512/224 and SHA-512/256
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Higher-Order Cryptanalysis of LowMC
Forgery Attacks on Round-Reduced ICEPOLE-128
Cryptanalysis of Ascon
Related-Key Forgeries for Prøst-OTR
Security Evaluation of SHA-224, SHA-512/224, and SHA-512/256
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Key Recovery Attacks on Recent Authenticated Ciphers
Ascon
Cite
×