Follow
Christoph Dobraunig
Title
Cited by
Cited by
Year
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Journal of Cryptology 34, 1-42, 2021
4922021
SPHINCS+. Submission to the NIST Post-Quantum Cryptography Standardization Project (2020)
JP Aumasson, DJ Bernstein, W Beullens, C Dobraunig, M Eichlseder, ...
267*
Ascon v1. 2. Submission to CAESAR: Competition for Authenticated Encryption. Security, Applicability, and Robustness 2016
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
240*
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
2142018
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
138*2018
Suit up!--made-to-measure hardware implementations of ASCON
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
110*2015
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
1072015
Isap v2. 0
C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas, ...
IACR Transactions on Symmetric Cryptology, 390-416, 2020
1022020
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
1002017
Statistical ineffective fault attacks on masked AES with fault countermeasures
C Dobraunig, M Eichlseder, H Groß, S Mangard, F Mendel, R Primas
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
982018
Ascon v1. 2. Submission to NIST’s Lightweight Cryptography Standardization Process, 2019
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
94*
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
902015
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
892016
Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink
84*2019
Pasta: A case for hybrid homomorphic encryption
C Dobraunig, L Grassi, L Helminger, C Rechberger, M Schofnegger, ...
782023
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
C Dobraunig, L Grassi, A Guinet, D Kuijsters
Annual International Conference on the Theory and Applications of …, 2021
702021
Protecting against statistical ineffective fault attacks
J Daemen, C Dobraunig, M Eichlseder, H Gross, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 508-543, 2020
632020
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
632015
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
602016
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
552016
The system can't perform the operation now. Try again later.
Articles 1–20