What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Christoph Dobraunig
Google Scholar
ORCID:
0000-0002-3816-0187
44
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Preface to Volume 2025, Issue 1.
Christoph Dobraunig
Kazuhiko Minematsu
2025
conf/eurocrypt
Efficient Instances of Docked Double Decker with AES, and Application to Authenticated Encryption.
Christoph Dobraunig
Krystian Matusiewicz
Bart Mennink
Alexander Tereschenko
2024
conf/acns
Generalized Initialization of the Duplex Construction.
Christoph Dobraunig
Bart Mennink
2024
conf/ctrsa
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2023
journals/tches
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions.
Yanis Belkheyar
Joan Daemen
Christoph Dobraunig
Santosh Ghosh
Shahram Rasoolzadeh
2023
journals/tches
Pasta: A Case for Hybrid Homomorphic Encryption.
Christoph Dobraunig
Lorenzo Grassi
Lukas Helminger
Christian Rechberger
Markus Schofnegger
Roman Walch
2023
journals/tosc
EliMAC: Speeding Up LightMAC by around 20%.
Christoph Dobraunig
Bart Mennink
Samuel Neves
2022
conf/ccs
Leakage and Tamper Resilient Permutation-Based Cryptography.
Christoph Dobraunig
Bart Mennink
Robert Primas
2022
conf/ccs
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto.
Christoph Dobraunig
Daniel Kales
Christian Rechberger
Markus Schofnegger
Greg Zaverucha
2022
conf/eurocrypt
Information-Combining Differential Fault Attacks on DEFAULT.
Marcel Nageler
Christoph Dobraunig
Maria Eichlseder
2021
journals/joc
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2021
conf/eurocrypt
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.
Christoph Dobraunig
Lorenzo Grassi
Anna Guinet
Daniël Kuijsters
2021
conf/eurocrypt
Leakage Resilient Value Comparison with Application to Message Authentication.
Christoph Dobraunig
Bart Mennink
2021
conf/sacrypt
Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Tim Beyne
Yu Long Chen
Christoph Dobraunig
Bart Mennink
2020
journals/tches
Protecting against Statistical Ineffective Fault Attacks.
Joan Daemen
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Florian Mendel
Robert Primas
2020
journals/tosc
Isap v2.0.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Bart Mennink
Robert Primas
Thomas Unterluggauer
2020
journals/tosc
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96.
Christoph Dobraunig
Yann Rotella
Jan Schoone
2020
journals/tosc
Tightness of the Suffix Keyed Sponge Bound.
Christoph Dobraunig
Bart Mennink
2020
journals/tosc
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
Tim Beyne
Yu Long Chen
Christoph Dobraunig
Bart Mennink
2019
journals/tosc
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
Ralph Ankele
Christoph Dobraunig
Jian Guo
Eran Lambooij
Gregor Leander
Yosuke Todo
2019
journals/tosc
Security of the Suffix Keyed Sponge.
Christoph Dobraunig
Bart Mennink
2019
journals/tosc
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/crypto
Efficient Collision Attack Frameworks for RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/asiacrypt
Leakage Resilience of the Duplex Construction.
Christoph Dobraunig
Bart Mennink
2019
conf/sacrypt
Algebraic Cryptanalysis of Variants of Frit.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Markus Schofnegger
2018
journals/tches
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Stefan Mangard
Florian Mendel
Robert Primas
2018
conf/crypto
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit.
Christoph Dobraunig
Maria Eichlseder
Lorenzo Grassi
Virginie Lallemand
Gregor Leander
Eik List
Florian Mendel
Christian Rechberger
2018
conf/asiacrypt
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Stefan Mangard
Florian Mendel
Robert Primas
2018
conf/sacrypt
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje.
Christoph Dobraunig
Stefan Mangard
Florian Mendel
Robert Primas
2017
journals/tosc
ISAP - Towards Side-Channel Secure Authenticated Encryption.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Thomas Unterluggauer
2017
conf/ctrsa
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC.
Christoph Dobraunig
Eik List
2016
journals/tosc
Practical Key-Recovery Attack on MANTIS5.
Christoph Dobraunig
Maria Eichlseder
Daniel Kales
Florian Mendel
2016
conf/fse
Analysis of the Kupyna-256 Hash Function.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2016
conf/acns
Square Attack on 7-Round Kiasu-BC.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2016
conf/asiacrypt
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Victor Lomné
Florian Mendel
2016
conf/sacrypt
Cryptanalysis of Simpira v1.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/fse
Related-Key Forgeries for Prøst-OTR.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/icisc
Higher-Order Cryptanalysis of LowMC.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/ctrsa
Cryptanalysis of Ascon.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
Martin Schläffer
2015
conf/asiacrypt
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/asiacrypt
Analysis of SHA-512/224 and SHA-512/256.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
conf/sacrypt
Forgery Attacks on Round-Reduced ICEPOLE-128.
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2014
conf/latincrypt
Key Recovery Attacks on Recent Authenticated Ciphers.
Andrey Bogdanov
Christoph Dobraunig
Maria Eichlseder
Martin M. Lauridsen
Florian Mendel
Martin Schläffer
Elmar Tischhauser
2014
conf/sacrypt
Differential Cryptanalysis of SipHash.
Christoph Dobraunig
Florian Mendel
Martin Schläffer
Coauthors
Alexander Tereschenko
(1)
Andrey Bogdanov
(1)
Anna Guinet
(1)
Bart Mennink
(11)
Christian Rechberger
(3)
Christoph Dobraunig
(44)
Daniel Kales
(2)
Daniël Kuijsters
(1)
Eik List
(2)
Elmar Tischhauser
(1)
Eran Lambooij
(1)
Florian Mendel
(25)
Fukang Liu
(2)
Gaoli Wang
(2)
Greg Zaverucha
(1)
Gregor Leander
(2)
Hannes Groß
(2)
Jan Schoone
(1)
Jian Guo
(1)
Joan Daemen
(2)
Kazuhiko Minematsu
(1)
Krystian Matusiewicz
(1)
Lorenzo Grassi
(3)
Lukas Helminger
(1)
Marcel Nageler
(1)
Maria Eichlseder
(22)
Markus Schofnegger
(3)
Martin M. Lauridsen
(1)
Martin Schläffer
(5)
Ralph Ankele
(1)
Robert Primas
(6)
Roman Walch
(1)
Samuel Neves
(1)
Santosh Ghosh
(1)
Shahram Rasoolzadeh
(1)
Stefan Mangard
(5)
Takanori Isobe
(2)
Thomas Korak
(2)
Thomas Unterluggauer
(2)
Tim Beyne
(2)
Victor Lomné
(1)
Virginie Lallemand
(1)
Yanis Belkheyar
(1)
Yann Rotella
(1)
Yosuke Todo
(1)
Yu Long Chen
(2)
Zhenfu Cao
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to