Christoph Dobraunig

From MaRDI portal
Revision as of 09:27, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:778912

Available identifiers

zbMath Open dobraunig.christophMaRDI QIDQ778912

List of research outcomes





PublicationDate of PublicationType
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions2024-11-12Paper
Multi-user security of the Elephant v2 authenticated encryption mode2024-10-14Paper
Information-combining differential fault attacks on DEFAULT2022-08-30Paper
\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields2021-12-08Paper
Leakage resilient value comparison with application to message authentication2021-12-08Paper
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing2021-08-10Paper
Practical forgeries for ORANGE2020-08-04Paper
Algebraic cryptanalysis of variants of \textsc{Frit}2020-07-21Paper
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-1602020-05-21Paper
Leakage resilience of the duplex construction2020-05-11Paper
Efficient collision attack frameworks for RIPEMD-1602020-03-09Paper
Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje2019-02-20Paper
Statistical ineffective fault attacks on masked AES with fault countermeasures2019-01-23Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Analysis of the Kupyna-256 Hash Function2018-05-09Paper
Cryptanalysis of Simpira v12018-02-16Paper
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC2017-04-12Paper
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes2017-02-01Paper
Square Attack on 7-Round Kiasu-BC2016-10-04Paper
Higher-Order Cryptanalysis of LowMC2016-05-19Paper
Forgery Attacks on Round-Reduced ICEPOLE-1282016-05-19Paper
Differential Cryptanalysis of SipHash2016-04-13Paper
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates2016-03-23Paper
Analysis of SHA-512/224 and SHA-512/2562016-03-23Paper
Cryptanalysis of Ascon2016-03-02Paper
Related-Key Forgeries for Prøst-OTR2015-09-18Paper
Key Recovery Attacks on Recent Authenticated Ciphers2015-09-17Paper
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA2014-08-20Paper

Research outcomes over time

This page was built for person: Christoph Dobraunig