Christoph Dobraunig
Christoph Dobraunig
Digital Security Group, Radboud University, Nijmegen
Verified email at ru.nl - Homepage
TitleCited byYear
Ascon v1. 2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Submission to the CAESAR Competition, 2016
105*2016
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
31*2016
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
29*2017
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
282015
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
25*2018
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
252015
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
242015
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Groß, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
232015
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
222015
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
192014
SPHINCS+
A Hulsing, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ...
Tech. rep. available at https://csrc. nist. gov/projects/post-quantum …, 2018
18*2018
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 87-101, 2015
182015
Related-key forgeries for Prøst-OTR
C Dobraunig, M Eichlseder, F Mendel
International Workshop on Fast Software Encryption, 282-296, 2015
172015
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
162016
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
142016
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
122018
Statistical ineffective fault attacks on masked aes with fault countermeasures
C Dobraunig, M Eichlseder, H Gross, S Mangard, F Mendel, R Primas
International Conference on the Theory and Application of Cryptology and …, 2018
112018
Analysis of the kupyna-256 hash function
C Dobraunig, M Eichlseder, F Mendel
International conference on fast software encryption, 575-590, 2016
11*2016
Ascon hardware implementations and side-channel evaluation
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
Microprocessors and Microsystems 52, 470-479, 2017
102017
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
C Dobraunig, E List
Cryptographers’ Track at the RSA Conference, 207-222, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20