The following pages link to Christoph Dobraunig (Q778912):
Displaying 28 items.
- Algebraic cryptanalysis of variants of \textsc{Frit} (Q778915) (← links)
- Practical forgeries for ORANGE (Q783690) (← links)
- Rasta: a cipher with low ANDdepth and few ANDs per bit (Q1673415) (← links)
- Cryptanalysis of Simpira v1 (Q1698642) (← links)
- Statistical ineffective fault attacks on masked AES with fault countermeasures (Q1710602) (← links)
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje (Q1726679) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Information-combining differential fault attacks on DEFAULT (Q2170087) (← links)
- Leakage resilience of the duplex construction (Q2178854) (← links)
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 (Q2182064) (← links)
- Efficient collision attack frameworks for RIPEMD-160 (Q2304980) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates (Q2795987) (← links)
- Analysis of SHA-512/224 and SHA-512/256 (Q2795992) (← links)
- Differential Cryptanalysis of SipHash (Q2798612) (← links)
- Higher-Order Cryptanalysis of LowMC (Q2806764) (← links)
- Forgery Attacks on Round-Reduced ICEPOLE-128 (Q2807228) (← links)
- Square Attack on 7-Round Kiasu-BC (Q2822691) (← links)
- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA (Q2876947) (← links)
- Key Recovery Attacks on Recent Authenticated Ciphers (Q2946480) (← links)
- Related-Key Forgeries for Prøst-OTR (Q2946947) (← links)
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes (Q2958130) (← links)
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC (Q2975805) (← links)
- Analysis of the Kupyna-256 Hash Function (Q4639499) (← links)
- Multi-user security of the Elephant v2 authenticated encryption mode (Q6618587) (← links)
- \textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions (Q6636119) (← links)