Håvard Raddum

Orcid: 0000-0001-9779-5986

According to our database1, Håvard Raddum authored at least 50 papers between 2001 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Cryptanalysis of Full SCARF.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Improved Resultant Attack Against Arithmetization-Oriented Primitives.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

2024
Analysis of Multivariate Encryption Schemes: Application to Dob and C<sup>*</sup>.
J. Cryptol., September, 2024

Analysis of Multivariate Encryption Schemes: Application to Dob and C.
IACR Cryptol. ePrint Arch., 2024

Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli.
IACR Cryptol. ePrint Arch., 2024

The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
On the IND-CCA1 Security of FHE Schemes.
Cryptogr., 2022

FASTA - A Stream Cipher for Fast FHE Evaluation.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Trail Search with CRHS Equations.
IACR Cryptol. ePrint Arch., 2021

Solving non-linear Boolean equation systems by variable elimination.
Appl. Algebra Eng. Commun. Comput., 2021

A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Analysis of Multivariate Encryption Schemes: Application to Dob.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Obtuse Lattice Bases.
CoRR, 2020

Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Cryptanalysis of the Multivariate Encryption Scheme EFLASH.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
Variable Elimination - a Tool for Algebraic Cryptanalysis.
IACR Cryptol. ePrint Arch., 2019

Factorization using binary decision diagrams.
Cryptogr. Commun., 2019

2018
MRHS Solver Based on Linear Algebra and Exhaustive Search.
IACR Cryptol. ePrint Arch., 2018

Security Notions for Cloud Storage and Deduplication.
Proceedings of the Provable Security, 2018

Definitions for Plaintext-Existence Hiding in Cloud Storage.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Eliminating Variables in Boolean Equation Systems.
IACR Cryptol. ePrint Arch., 2017

2016
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts.
IACR Cryptol. ePrint Arch., 2016

Multidimensional Meet in the Middle Cryptanalysis of KATAN.
IACR Cryptol. ePrint Arch., 2016

Using Cryptography to Control Your Data at a Distance.
ERCIM News, 2016

Influence of addition modulo 2 n on algebraic attacks.
Cryptogr. Commun., 2016

Faster Key Recovery Attack on Round-Reduced PRINCE.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

Cryptanalysis of PRINCE with Minimal Data.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Algebraic Analysis of the Simon Block Cipher Family.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
Algebraic Attacks Using Binary Decision Diagrams.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2012
Solving Compressed Right Hand Side Equation Systems with Linear Absorption.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

2011
Analysis of Trivium Using Compressed Right Hand Side Equations.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
Security Analysis of Mobile Phones Used as OTP Generators.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Solving Equation Systems by Agreeing and Learning.
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010

2009
Algebraic Analysis of LEX.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Solving Multiple Right Hand Sides linear equations.
Des. Codes Cryptogr., 2008

On the Number of Linearly Independent Equations Generated by XL.
Proceedings of the Sequences and Their Applications, 2008

Bit-Pattern Based Integral Attack.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Solving MRHS linear equations.
IACR Cryptol. ePrint Arch., 2007

MRHS Equation Systems.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

An Analysis of the Hermes8 Stream Ciphers.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
New Technique for Solving Sparse Equation Systems.
IACR Cryptol. ePrint Arch., 2006

2004
Weaknesses in the temporal key hash of WPA.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

On the computation of coset leaders with high Hamming weight.
Discret. Math., 2004

More Dual Rijndaels.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Cryptanalysis of IDEA-X/2.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2001
A Differential Attack on Reduced-Round SC2000.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001


  Loading...