Christoph Dobraunig

From MaRDI portal
Person:778912

Available identifiers

zbMath Open dobraunig.christophMaRDI QIDQ778912

List of research outcomes





PublicationDate of PublicationType
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions2024-11-12Paper
Multi-user security of the Elephant v2 authenticated encryption mode2024-10-14Paper
Information-combining differential fault attacks on DEFAULT2022-08-30Paper
\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields2021-12-08Paper
Leakage resilient value comparison with application to message authentication2021-12-08Paper
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing2021-08-10Paper
Practical forgeries for ORANGE2020-08-04Paper
Algebraic cryptanalysis of variants of \textsc{Frit}2020-07-21Paper
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-1602020-05-21Paper
Leakage resilience of the duplex construction2020-05-11Paper
Efficient collision attack frameworks for RIPEMD-1602020-03-09Paper
Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje2019-02-20Paper
Statistical ineffective fault attacks on masked AES with fault countermeasures2019-01-23Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Analysis of the Kupyna-256 Hash Function2018-05-09Paper
Cryptanalysis of Simpira v12018-02-16Paper
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC2017-04-12Paper
Statistical fault attacks on nonce-based authenticated encryption schemes2017-02-01Paper
Square attack on 7-round Kiasu-BC2016-10-04Paper
Higher-Order Cryptanalysis of LowMC2016-05-19Paper
Forgery Attacks on Round-Reduced ICEPOLE-1282016-05-19Paper
Differential cryptanalysis of SipHash2016-04-13Paper
Analysis of SHA-512/224 and SHA-512/2562016-03-23Paper
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates2016-03-23Paper
Cryptanalysis of Ascon2016-03-02Paper
Related-Key Forgeries for Prøst-OTR2015-09-18Paper
Key recovery attacks on recent authenticated ciphers2015-09-17Paper
Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA2014-08-20Paper

Research outcomes over time

This page was built for person: Christoph Dobraunig