Daniel Kales
Daniel Kales
Verified email at
Cited by
Cited by
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC
I Dinur, D Kales, A Promitzer, S Ramacher, C Rechberger
Annual International Conference on the Theory and Applications of …, 2019
G Zaverucha, M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, ...
NIST Post-Quantum Standardization Project Round 3, 2017
Improving the performance of the picnic signature scheme
D Kales, G Zaverucha
IACR Transactions on Cryptographic Hardware and Embedded Systems, 154-188, 2020
An attack on some signature schemes constructed from five-pass identification schemes
D Kales, G Zaverucha
International Conference on Cryptology and Network Security, 3-22, 2020
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
Banquet: Short and fast signatures from AES
C Baum, CD Saint Guilhem, D Kales, E Orsini, P Scholl, G Zaverucha
IACR International Conference on Public-Key Cryptography, 266-297, 2021
Revisiting user privacy for certificate transparency
D Kales, O Omolola, S Ramacher
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 432-447, 2019
Clustering related-tweak characteristics: application to MANTIS-6
M Eichlseder, D Kales
IACR Transactions on Symmetric Cryptology, 111-132, 2018
Efficient FPGA implementations of LowMC and Picnic
D Kales, S Ramacher, C Rechberger, R Walch, M Werner
Cryptographers’ Track at the RSA Conference, 417-441, 2020
Privately connecting mobility to infectious diseases via applied cryptography
A Bampoulidis, A Bruni, L Helminger, D Kales, C Rechberger, R Walch
arXiv preprint arXiv:2005.02061, 2020
Forgery Attacks on FlexAE and FlexAEAD
M Eichlseder, D Kales, M Schofnegger
IMA International Conference on Cryptography and Coding, 200-214, 2019
Note on the robustness of CAESAR candidates
D Kales, M Eichlseder, F Mendel
Cryptology ePrint Archive, 2017
Multi-party revocation in sovrin: Performance through distributed trust
L Helminger, D Kales, S Ramacher, R Walch
Cryptographers’ Track at the RSA Conference, 527-551, 2021
Improvements to the linear operations of LowMC: a faster Picnic
D Kales, L Perrin, A Promitzer, S Ramacher, C Rechberger
Cryptology ePrint Archive, 2017
Shorter signatures based on tailor-made minimalist symmetric-key crypto
C Dobraunig, D Kales, C Rechberger, M Schofnegger, G Zaverucha
Cryptology ePrint Archive, 2021
Survey of key-recovery attacks on lowmc in a single plaintext/ciphertext scenario
L Grassi, D Kales, C Rechberger, M Schofnegger
September, 2020
Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures
D Kales, G Zaverucha
Cryptology ePrint Archive, 2022
PRIORIS: Enabling Secure Detection of Suicidal Ideation from Speech Using Homomorphic Encryption
D Natarajan, A Dalskov, D Kales, S Khanna
Protecting Privacy through Homomorphic Encryption, 133-146, 2021
Practical key recovery attacks on FlexAEAD
O Dunkelman, M Eichlseder, D Kales, N Keller, G Leurent, M Schofnegger
Designs, Codes and Cryptography 90 (4), 983-1007, 2022
The system can't perform the operation now. Try again later.
Articles 1–20