default search action
Christoph Dobraunig
Person information
- affiliation: Intel Labs, Hillsboro, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Christoph Dobraunig, Bart Mennink:
Generalized Initialization of the Duplex Construction. ACNS (2) 2024: 460-484 - [c32]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. CT-RSA 2024: 381-403 - [c31]Bharath Namboothiry, David Durham, Christoph Dobraunig, Michael LeMay:
Cryptographic Memory Tagging: Towards Stateless Integrity. HASP@MICRO 2024: 50-58 - [i39]Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko:
Efficient Instances of Docked Double Decker With AES. IACR Cryptol. ePrint Arch. 2024: 84 (2024) - [i38]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Preliminary Analysis of Ascon-Xof and Ascon-Hash. IACR Cryptol. ePrint Arch. 2024: 908 (2024) - 2023
- [j19]Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh:
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 326-368 (2023) - [j18]Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Pasta: A Case for Hybrid Homomorphic Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 30-73 (2023) - [j17]Christoph Dobraunig, Bart Mennink, Samuel Neves:
EliMAC: Speeding Up LightMAC by around 20%. IACR Trans. Symmetric Cryptol. 2023(2): 69-93 (2023) - [i37]Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh:
Introducing two Low-Latency Cipher Families: Sonic and SuperSonic. IACR Cryptol. ePrint Arch. 2023: 878 (2023) - [i36]Christoph Dobraunig, Bart Mennink:
Generalized Initialization of the Duplex Construction. IACR Cryptol. ePrint Arch. 2023: 924 (2023) - 2022
- [c30]Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. CCS 2022: 843-857 - [c29]Christoph Dobraunig, Bart Mennink, Robert Primas:
Leakage and Tamper Resilient Permutation-Based Cryptography. CCS 2022: 859-873 - [c28]Marcel Nageler, Christoph Dobraunig, Maria Eichlseder:
Information-Combining Differential Fault Attacks on DEFAULT. EUROCRYPT (3) 2022: 168-191 - 2021
- [j16]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon v1.2: Lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3): 33 (2021) - [c27]Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters:
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields. EUROCRYPT (2) 2021: 3-34 - [c26]Christoph Dobraunig, Bart Mennink:
Leakage Resilient Value Comparison with Application to Message Authentication. EUROCRYPT (2) 2021: 377-407 - [c25]Tim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink:
Multi-user Security of the Elephant v2 Authenticated Encryption Mode. SAC 2021: 155-178 - [i35]Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters:
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields. IACR Cryptol. ePrint Arch. 2021: 267 (2021) - [i34]Christoph Dobraunig, Bart Mennink:
Leakage Resilient Value Comparison With Application to Message Authentication. IACR Cryptol. ePrint Arch. 2021: 402 (2021) - [i33]Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. IACR Cryptol. ePrint Arch. 2021: 692 (2021) - [i32]Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Pasta: A Case for Hybrid Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2021: 731 (2021) - [i31]Marcel Nageler, Christoph Dobraunig, Maria Eichlseder:
Information-Combining Differential Fault Attacks on DEFAULT. IACR Cryptol. ePrint Arch. 2021: 1374 (2021) - [i30]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon PRF, MAC, and Short-Input MAC. IACR Cryptol. ePrint Arch. 2021: 1574 (2021) - 2020
- [j15]Gaoli Wang, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig:
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. Des. Codes Cryptogr. 88(5): 887-930 (2020) - [j14]Christoph Dobraunig, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany:
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta. IET Inf. Secur. 14(2): 202-209 (2020) - [j13]Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical forgeries for ORANGE. Inf. Process. Lett. 159-160: 105961 (2020) - [j12]Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 508-543 (2020) - [j11]Christoph Dobraunig, Yann Rotella, Jan Schoone:
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96. IACR Trans. Symmetric Cryptol. 2020(1): 289-312 (2020) - [j10]Christoph Dobraunig, Bart Mennink:
Tightness of the Suffix Keyed Sponge Bound. IACR Trans. Symmetric Cryptol. 2020(4): 195-212 (2020) - [j9]Tim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink:
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus. IACR Trans. Symmetric Cryptol. 2020(S1): 5-30 (2020) - [j8]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer:
Isap v2.0. IACR Trans. Symmetric Cryptol. 2020(S1): 390-416 (2020) - [i29]Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical Forgeries for ORANGE. IACR Cryptol. ePrint Arch. 2020: 108 (2020) - [i28]Christoph Dobraunig, Bart Mennink, Robert Primas:
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice. IACR Cryptol. ePrint Arch. 2020: 200 (2020)
2010 – 2019
- 2019
- [j7]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Trans. Symmetric Cryptol. 2019(1): 192-235 (2019) - [j6]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol. 2019(3): 169-192 (2019) - [j5]Christoph Dobraunig, Bart Mennink:
Security of the Suffix Keyed Sponge. IACR Trans. Symmetric Cryptol. 2019(4): 223-248 (2019) - [c24]Christoph Dobraunig, Bart Mennink:
Leakage Resilience of the Duplex Construction. ASIACRYPT (3) 2019: 225-255 - [c23]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO (2) 2019: 117-149 - [c22]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Variants of Frit. SAC 2019: 149-170 - [i27]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Cryptol. ePrint Arch. 2019: 185 (2019) - [i26]Christoph Dobraunig, Bart Mennink:
Leakage Resilience of the Duplex Construction. IACR Cryptol. ePrint Arch. 2019: 225 (2019) - [i25]Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Cryptol. ePrint Arch. 2019: 536 (2019) - [i24]Christoph Dobraunig, Bart Mennink:
Security of the Suffix Keyed Sponge. IACR Cryptol. ePrint Arch. 2019: 573 (2019) - [i23]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2019: 668 (2019) - 2018
- [j4]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 547-572 (2018) - [c21]Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. ASIACRYPT (2) 2018: 315-342 - [c20]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [c19]Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas:
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. SAC 2018: 257-277 - [i22]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2018: 71 (2018) - [i21]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i20]Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. IACR Cryptol. ePrint Arch. 2018: 357 (2018) - [i19]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Frit. IACR Cryptol. ePrint Arch. 2018: 809 (2018) - [i18]Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas:
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje. IACR Cryptol. ePrint Arch. 2018: 852 (2018) - 2017
- [j3]Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Ascon hardware implementations and side-channel evaluation. Microprocess. Microsystems 52: 470-479 (2017) - [j2]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Towards Side-Channel Secure Authenticated Encryption. IACR Trans. Symmetric Cryptol. 2017(1): 80-105 (2017) - [c18]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. COSADE 2017: 138-152 - [c17]Christoph Dobraunig, Eik List:
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC. CT-RSA 2017: 207-222 - 2016
- [j1]Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel:
Practical Key-Recovery Attack on MANTIS5. IACR Trans. Symmetric Cryptol. 2016(2): 248-260 (2016) - [c16]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. ACNS 2016: 500-517 - [c15]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. ASIACRYPT (1) 2016: 369-395 - [c14]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. FSE 2016: 575-590 - [c13]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira v1. SAC 2016: 284-298 - [i17]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira. IACR Cryptol. ePrint Arch. 2016: 244 (2016) - [i16]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. IACR Cryptol. ePrint Arch. 2016: 326 (2016) - [i15]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. IACR Cryptol. ePrint Arch. 2016: 374 (2016) - [i14]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Practical Fault Attacks on Authenticated Encryption Modes for AES. IACR Cryptol. ePrint Arch. 2016: 616 (2016) - [i13]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Key Recovery for MANTIS-5. IACR Cryptol. ePrint Arch. 2016: 754 (2016) - [i12]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. IACR Cryptol. ePrint Arch. 2016: 793 (2016) - [i11]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2016: 952 (2016) - [i10]Christoph Dobraunig, Eik List:
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC. IACR Cryptol. ePrint Arch. 2016: 1170 (2016) - 2015
- [c12]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. ASIACRYPT (2) 2015: 490-509 - [c11]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. ASIACRYPT (2) 2015: 612-630 - [c10]Christoph Dobraunig, François Koeune, Stefan Mangard, Florian Mendel, François-Xavier Standaert:
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. CARDIS 2015: 225-241 - [c9]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. CT-RSA 2015: 371-387 - [c8]Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! - Made-to-Measure Hardware Implementations of ASCON. DSD 2015: 645-652 - [c7]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. FSE 2015: 282-296 - [c6]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-Order Cryptanalysis of LowMC. ICISC 2015: 87-101 - [c5]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on Round-Reduced ICEPOLE-128. SAC 2015: 479-492 - [i9]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. IACR Cryptol. ePrint Arch. 2015: 30 (2015) - [i8]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. IACR Cryptol. ePrint Arch. 2015: 33 (2015) - [i7]Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! Made-to-Measure Hardware Implementations of Ascon. IACR Cryptol. ePrint Arch. 2015: 34 (2015) - [i6]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. IACR Cryptol. ePrint Arch. 2015: 91 (2015) - [i5]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. IACR Cryptol. ePrint Arch. 2015: 392 (2015) - [i4]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. IACR Cryptol. ePrint Arch. 2015: 407 (2015) - [i3]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. IACR Cryptol. ePrint Arch. 2015: 956 (2015) - [i2]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. IACR Cryptol. ePrint Arch. 2015: 1200 (2015) - 2014
- [c4]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. CARDIS 2014: 233-244 - [c3]Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014: 274-287 - [c2]Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. Selected Areas in Cryptography 2014: 165-182 - [i1]Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. IACR Cryptol. ePrint Arch. 2014: 722 (2014) - 2012
- [c1]Thomas Plos, Christoph Dobraunig, Markus Hofinger, Alexander Oprisnik, Christoph Wiesmeier, Johannes Wiesmeier:
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA. INDOCRYPT 2012: 358-377
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint