Christoph Dobraunig

Orcid: 0000-0002-3816-0187

Affiliations:
  • Intel Labs, Hillsboro, USA


According to our database1, Christoph Dobraunig authored at least 60 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Instances of Docked Double Decker With AES.
IACR Cryptol. ePrint Arch., 2024

2023
EliMAC: Speeding Up LightMAC by around 20%.
IACR Trans. Symmetric Cryptol., 2023

Pasta: A Case for Hybrid Homomorphic Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Generalized Initialization of the Duplex Construction.
IACR Cryptol. ePrint Arch., 2023

Introducing two Low-Latency Cipher Families: Sonic and SuperSonic.
IACR Cryptol. ePrint Arch., 2023

2022
Leakage and Tamper Resilient Permutation-Based Cryptography.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Ascon v1.2: Lightweight Authenticated Encryption and Hashing.
J. Cryptol., 2021

Information-Combining Differential Fault Attacks on DEFAULT.
IACR Cryptol. ePrint Arch., 2021

Leakage Resilient Value Comparison With Application to Message Authentication.
IACR Cryptol. ePrint Arch., 2021

Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto.
IACR Cryptol. ePrint Arch., 2021

Ascon PRF, MAC, and Short-Input MAC.
IACR Cryptol. ePrint Arch., 2021

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.
IACR Cryptol. ePrint Arch., 2021

Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96.
IACR Trans. Symmetric Cryptol., 2020

Tightness of the Suffix Keyed Sponge Bound.
IACR Trans. Symmetric Cryptol., 2020

Isap v2.0.
IACR Trans. Symmetric Cryptol., 2020

Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
IACR Trans. Symmetric Cryptol., 2020

Protecting against Statistical Ineffective Fault Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Practical forgeries for ORANGE.
Inf. Process. Lett., 2020

Framework for faster key search using related-key higher-order differential properties: applications to Agrasta.
IET Inf. Secur., 2020

Exploring the Golden Mean Between Leakage and Fault Resilience and Practice.
IACR Cryptol. ePrint Arch., 2020

Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160.
Des. Codes Cryptogr., 2020

2019
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
IACR Cryptol. ePrint Arch., 2019

Security of the Suffix Keyed Sponge.
IACR Cryptol. ePrint Arch., 2019

Leakage Resilience of the Duplex Construction.
IACR Cryptol. ePrint Arch., 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Cryptol. ePrint Arch., 2019

Algebraic Cryptanalysis of Variants of Frit.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Efficient Collision Attack Frameworks for RIPEMD-160.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje.
IACR Cryptol. ePrint Arch., 2018

Algebraic Cryptanalysis of Frit.
IACR Cryptol. ePrint Arch., 2018

Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2018

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
IACR Cryptol. ePrint Arch., 2018

Rasta: A cipher with low ANDdepth and few ANDs per bit.
IACR Cryptol. ePrint Arch., 2018

2017
ISAP - Towards Side-Channel Secure Authenticated Encryption.
IACR Trans. Symmetric Cryptol., 2017

Ascon hardware implementations and side-channel evaluation.
Microprocess. Microsystems, 2017

2016
Practical Key-Recovery Attack on MANTIS5.
IACR Trans. Symmetric Cryptol., 2016

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC.
IACR Cryptol. ePrint Arch., 2016

ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2016

Key Recovery for MANTIS-5.
IACR Cryptol. ePrint Arch., 2016

Analysis of SHA-512/224 and SHA-512/256.
IACR Cryptol. ePrint Arch., 2016

Square Attack on 7-Round Kiasu-BC.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Simpira.
IACR Cryptol. ePrint Arch., 2016

Side-Channel Analysis of Keymill.
IACR Cryptol. ePrint Arch., 2016

Practical Fault Attacks on Authenticated Encryption Modes for AES.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Simpira v1.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Suit up! Made-to-Measure Hardware Implementations of Ascon.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Ascon.
IACR Cryptol. ePrint Arch., 2015

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2015

Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates.
IACR Cryptol. ePrint Arch., 2015

Analysis of the Kupyna-256 Hash Function.
IACR Cryptol. ePrint Arch., 2015

Higher-order cryptanalysis of LowMC.
IACR Cryptol. ePrint Arch., 2015

Forgery Attacks on round-reduced ICEPOLE-128.
IACR Cryptol. ePrint Arch., 2015

Related-Key Forgeries for Prøst-OTR.
IACR Cryptol. ePrint Arch., 2015

Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Differential Cryptanalysis of SipHash.
IACR Cryptol. ePrint Arch., 2014

Key Recovery Attacks on Recent Authenticated Ciphers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2012
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA.
Proceedings of the Progress in Cryptology, 2012


  Loading...