Follow
Christoph Dobraunig
Title
Cited by
Cited by
Year
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Journal of Cryptology 34, 1-42, 2021
3472021
Ascon v1. 2. Submission to CAESAR: Competition for Authenticated Encryption. Security, Applicability, and Robustness 2016
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
228*
SPHINCS+. Submission to the NIST Post-Quantum Cryptography Standardization Project (2020)
JP Aumasson, DJ Bernstein, W Beullens, C Dobraunig, M Eichlseder, ...
202*
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
1862018
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
118*2018
ISAP v2.0
C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas, ...
104*2019
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Gross, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
95*2015
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
912017
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
912015
Statistical ineffective fault attacks on masked AES with fault countermeasures
C Dobraunig, M Eichlseder, H Groß, S Mangard, F Mendel, R Primas
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
882018
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
852015
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
832016
Ascon v1. 2. Submission to NIST’s Lightweight Cryptography Standardization Process, 2019
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
81*
Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink
74*2019
Protecting against statistical ineffective fault attacks
J Daemen, C Dobraunig, M Eichlseder, H Gross, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 508-543, 2020
602020
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
C Dobraunig, L Grassi, A Guinet, D Kuijsters
Annual International Conference on the Theory and Applications of …, 2021
582021
Pasta: A case for hybrid homomorphic encryption
C Dobraunig, L Grassi, L Helminger, C Rechberger, M Schofnegger, ...
Cryptology ePrint Archive, 2021
562021
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
562016
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
552015
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
542016
The system can't perform the operation now. Try again later.
Articles 1–20