Mobile Private Contact Discovery at Scale. D Kales, C Rechberger, T Schneider, M Senker, C Weinert USENIX Security Symposium, 1447-1464, 2019 | 77 | 2019 |
Improving the performance of the picnic signature scheme D Kales, G Zaverucha IACR Transactions on Cryptographic Hardware and Embedded Systems, 154-188, 2020 | 37 | 2020 |
Picnic G Zaverucha, M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, ... National Institute of Standards and Technology, Tech. Rep, 2020 | 35 | 2020 |
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC I Dinur, D Kales, A Promitzer, S Ramacher, C Rechberger Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 34 | 2019 |
An attack on some signature schemes constructed from five-pass identification schemes D Kales, G Zaverucha Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020 | 33* | 2020 |
Banquet: short and fast signatures from AES C Baum, CD de Saint Guilhem, D Kales, E Orsini, P Scholl, G Zaverucha Public-Key Cryptography–PKC 2021: 24th IACR International Conference on …, 2021 | 30 | 2021 |
Revisiting user privacy for certificate transparency D Kales, O Omolola, S Ramacher 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 432-447, 2019 | 25 | 2019 |
Clustering related-tweak characteristics: application to MANTIS-6 M Eichlseder, D Kales IACR Transactions on Symmetric Cryptology, 111-132, 2018 | 23 | 2018 |
Practical key-recovery attack on MANTIS5 C Dobraunig, M Eichlseder, D Kales, F Mendel IACR Transactions on Symmetric Cryptology, 248-260, 2016 | 23 | 2016 |
Efficient FPGA implementations of LowMC and Picnic D Kales, S Ramacher, C Rechberger, R Walch, M Werner Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020 | 19 | 2020 |
Privately connecting mobility to infectious diseases via applied cryptography A Bampoulidis, A Bruni, L Helminger, D Kales, C Rechberger, R Walch arXiv preprint arXiv:2005.02061, 2020 | 14 | 2020 |
Shorter signatures based on tailor-made minimalist symmetric-key crypto C Dobraunig, D Kales, C Rechberger, M Schofnegger, G Zaverucha Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
Forgery Attacks on FlexAE and FlexAEAD M Eichlseder, D Kales, M Schofnegger Cryptography and Coding: 17th IMA International Conference, IMACC 2019 …, 2019 | 8 | 2019 |
Efficient lifting for shorter zero-knowledge proofs and post-quantum signatures D Kales, G Zaverucha Cryptology ePrint Archive, 2022 | 7 | 2022 |
Multi-party revocation in sovrin: Performance through distributed trust L Helminger, D Kales, S Ramacher, R Walch Topics in Cryptology–CT-RSA 2021: Cryptographers’ Track at the RSA …, 2021 | 6 | 2021 |
Improvements to the linear operations of lowmc: A faster picnic D Kales, L Perrin, A Promitzer, S Ramacher, C Rechberger Cryptology ePrint Archive, 2017 | 6 | 2017 |
Note on the robustness of CAESAR candidates D Kales, M Eichlseder, F Mendel Cryptology ePrint Archive, 2017 | 6 | 2017 |
Survey of key-recovery attacks on lowmc in a single plaintext/ciphertext scenario L Grassi, D Kales, C Rechberger, M Schofnegger September, 2020 | 4 | 2020 |
PRIORIS: Enabling Secure Detection of Suicidal Ideation from Speech Using Homomorphic Encryption D Natarajan, A Dalskov, D Kales, S Khanna Protecting Privacy through Homomorphic Encryption, 133-146, 2021 | 2 | 2021 |
Practical key recovery attacks on FlexAEAD O Dunkelman, M Eichlseder, D Kales, N Keller, G Leurent, M Schofnegger Designs, Codes and Cryptography 90 (4), 983-1007, 2022 | | 2022 |