Håvard Raddum

Orcid: 0000-0001-9779-5986

According to our database1, Håvard Raddum authored at least 43 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.
IACR Cryptol. ePrint Arch., 2024

2023
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato.
IACR Cryptol. ePrint Arch., 2023

2022
On the IND-CCA1 Security of FHE Schemes.
Cryptogr., 2022

2021
Trail Search with CRHS Equations.
IACR Cryptol. ePrint Arch., 2021

A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem.
IACR Cryptol. ePrint Arch., 2021

FASTA â€" a stream cipher for fast FHE evaluation.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
IACR Cryptol. ePrint Arch., 2021

Solving non-linear Boolean equation systems by variable elimination.
Appl. Algebra Eng. Commun. Comput., 2021

2020
Analysis of Multivariate Encryption Schemes: Application to Dob.
IACR Cryptol. ePrint Arch., 2020

Obtuse Lattice Bases.
CoRR, 2020

Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

2019
Cryptanalysis of the Multivariate Encryption Scheme EFLASH.
IACR Cryptol. ePrint Arch., 2019

Variable Elimination - a Tool for Algebraic Cryptanalysis.
IACR Cryptol. ePrint Arch., 2019

Factorization using binary decision diagrams.
Cryptogr. Commun., 2019

2018
MRHS Solver Based on Linear Algebra and Exhaustive Search.
IACR Cryptol. ePrint Arch., 2018

Definitions for Plaintext-Existence Hiding in Cloud Storage.
IACR Cryptol. ePrint Arch., 2018

2017
Eliminating Variables in Boolean Equation Systems.
IACR Cryptol. ePrint Arch., 2017

Security notions for cloud storage and deduplication.
IACR Cryptol. ePrint Arch., 2017

2016
Faster Key Recovery Attack on Round-Reduced PRINCE.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of PRINCE with Minimal Data.
IACR Cryptol. ePrint Arch., 2016

Multidimensional Meet in the Middle Cryptanalysis of KATAN.
IACR Cryptol. ePrint Arch., 2016

Using Cryptography to Control Your Data at a Distance.
ERCIM News, 2016

Influence of addition modulo 2 n on algebraic attacks.
Cryptogr. Commun., 2016

2015
Algebraic Analysis of the Simon Block Cipher Family.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
Algebraic Attacks Using Binary Decision Diagrams.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2012
Solving Compressed Right Hand Side Equation Systems with Linear Absorption.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

2011
Analysis of Trivium Using Compressed Right Hand Side Equations.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
Security Analysis of Mobile Phones Used as OTP Generators.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Solving Equation Systems by Agreeing and Learning.
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010

2009
Algebraic Analysis of LEX.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
Solving Multiple Right Hand Sides linear equations.
Des. Codes Cryptogr., 2008

On the Number of Linearly Independent Equations Generated by XL.
Proceedings of the Sequences and Their Applications, 2008

Bit-Pattern Based Integral Attack.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Solving MRHS linear equations.
IACR Cryptol. ePrint Arch., 2007

MRHS Equation Systems.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2006
New Technique for Solving Sparse Equation Systems.
IACR Cryptol. ePrint Arch., 2006

An Analysis of the Hermes8 Stream Ciphers.
IACR Cryptol. ePrint Arch., 2006

2004
Weaknesses in the temporal key hash of WPA.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

On the computation of coset leaders with high Hamming weight.
Discret. Math., 2004

More Dual Rijndaels.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Cryptanalysis of IDEA-X/2.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2001
A Differential Attack on Reduced-Round SC2000.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001


  Loading...