Christoph Dobraunig
Christoph Dobraunig
Lamarr Security Research
Verified email at lamarr.at - Homepage
Title
Cited by
Cited by
Year
Ascon v1.2
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
221*2016
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
772018
SPHINCS . Submission to the 3rd round of the NIST post-quantum cryptography standardization process (2020)
JP Aumasson, DJ Bernstein, W Beullens, C Dobraunig, M Eichlseder, ...
69*
Suit up!--Made-to-Measure Hardware Implementations of ASCON
H Groß, E Wenger, C Dobraunig, C Ehrenhöfer
2015 Euromicro Conference on Digital System Design, 645-652, 2015
60*2015
ISAP–towards side-channel secure authenticated encryption
C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer
IACR Transactions on Symmetric Cryptology, 80-105, 2017
572017
Statistical fault attacks on nonce-based authenticated encryption schemes
C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2016
552016
Analysis of SHA-512/224 and SHA-512/256
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
512015
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
422018
Cryptanalysis of Ascon
C Dobraunig, M Eichlseder, F Mendel, M Schläffer
Cryptographers’ Track at the RSA Conference, 371-387, 2015
372015
Higher-order cryptanalysis of LowMC
C Dobraunig, M Eichlseder, F Mendel
ICISC 2015, 87-101, 2015
362015
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
352015
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
C Dobraunig, M Eichlseder, F Mendel
International Conference on the Theory and Application of Cryptology and …, 2015
342015
Statistical ineffective fault attacks on masked AES with fault countermeasures
C Dobraunig, M Eichlseder, H Groß, S Mangard, F Mendel, R Primas
International Conference on the Theory and Application of Cryptology and …, 2018
312018
Protecting against statistical ineffective fault attacks
J Daemen, CE Dobraunig, M Eichlseder, H Gross, F Mendel, R Primas
232020
On the security of fresh re-keying to counteract side-channel and fault attacks
C Dobraunig, M Eichlseder, S Mangard, F Mendel
International Conference on Smart Card Research and Advanced Applications …, 2014
222014
Square attack on 7-round Kiasu-BC
C Dobraunig, M Eichlseder, F Mendel
International Conference on Applied Cryptography and Network Security, 500-517, 2016
212016
Leakage resilience of the duplex construction
C Dobraunig, B Mennink
International Conference on the Theory and Application of Cryptology and …, 2019
202019
ISAP v2.0
C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas, ...
19*2019
Practical key-recovery attack on MANTIS5
C Dobraunig, M Eichlseder, D Kales, F Mendel
IACR Transactions on Symmetric Cryptology, 248-260, 2016
182016
Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje
C Dobraunig, S Mangard, F Mendel, R Primas
International Conference on Selected Areas in Cryptography, 257-277, 2018
172018
The system can't perform the operation now. Try again later.
Articles 1–20