Daniel Kales
Daniel Kales
Verified email at
Cited by
Cited by
Mobile Private Contact Discovery at Scale.
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
USENIX Security Symposium, 1447-1464, 2019
Improving the performance of the picnic signature scheme
D Kales, G Zaverucha
IACR Transactions on Cryptographic Hardware and Embedded Systems, 154-188, 2020
G Zaverucha, M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, ...
National Institute of Standards and Technology, Tech. Rep, 2020
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC
I Dinur, D Kales, A Promitzer, S Ramacher, C Rechberger
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
An attack on some signature schemes constructed from five-pass identification schemes
D Kales, G Zaverucha
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
Banquet: short and fast signatures from AES
C Baum, CD de Saint Guilhem, D Kales, E Orsini, P Scholl, G Zaverucha
Public-Key Cryptography–PKC 2021: 24th IACR International Conference on …, 2021
Revisiting user privacy for certificate transparency
D Kales, O Omolola, S Ramacher
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 432-447, 2019
Clustering related-tweak characteristics: application to MANTIS-6
M Eichlseder, D Kales
IACR Transactions on Symmetric Cryptology, 111-132, 2018
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
Efficient FPGA implementations of LowMC and Picnic
D Kales, S Ramacher, C Rechberger, R Walch, M Werner
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
Privately connecting mobility to infectious diseases via applied cryptography
A Bampoulidis, A Bruni, L Helminger, D Kales, C Rechberger, R Walch
arXiv preprint arXiv:2005.02061, 2020
Shorter signatures based on tailor-made minimalist symmetric-key crypto
C Dobraunig, D Kales, C Rechberger, M Schofnegger, G Zaverucha
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Forgery Attacks on FlexAE and FlexAEAD
M Eichlseder, D Kales, M Schofnegger
Cryptography and Coding: 17th IMA International Conference, IMACC 2019 …, 2019
Efficient lifting for shorter zero-knowledge proofs and post-quantum signatures
D Kales, G Zaverucha
Cryptology ePrint Archive, 2022
Multi-party revocation in sovrin: Performance through distributed trust
L Helminger, D Kales, S Ramacher, R Walch
Topics in Cryptology–CT-RSA 2021: Cryptographers’ Track at the RSA …, 2021
Improvements to the linear operations of lowmc: A faster picnic
D Kales, L Perrin, A Promitzer, S Ramacher, C Rechberger
Cryptology ePrint Archive, 2017
Note on the robustness of CAESAR candidates
D Kales, M Eichlseder, F Mendel
Cryptology ePrint Archive, 2017
Survey of key-recovery attacks on lowmc in a single plaintext/ciphertext scenario
L Grassi, D Kales, C Rechberger, M Schofnegger
September, 2020
PRIORIS: Enabling Secure Detection of Suicidal Ideation from Speech Using Homomorphic Encryption
D Natarajan, A Dalskov, D Kales, S Khanna
Protecting Privacy through Homomorphic Encryption, 133-146, 2021
Practical key recovery attacks on FlexAEAD
O Dunkelman, M Eichlseder, D Kales, N Keller, G Leurent, M Schofnegger
Designs, Codes and Cryptography 90 (4), 983-1007, 2022
The system can't perform the operation now. Try again later.
Articles 1–20