No photo of Christoph Erwin Dobraunig

Christoph Erwin Dobraunig

Dipl.-Ing. Dr.techn.

19952020
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Christoph Erwin Dobraunig is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 7 Similar Profiles
Correlation Attack Mathematics
Authenticated Encryption Mathematics
Fault Attacks Mathematics
Zero correlation Mathematics
Collision Attack Mathematics
Block Ciphers Mathematics
Cryptography Engineering & Materials Science
Hardware Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2020

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., Jan 2020, Selected Areas in Cryptography - SAC 2019. Springer, p. 149-170 (Lecture Notes in Computer Science; no. 11959).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient Collision Attack Frameworks for RIPEMD-160

Liu, F., Dobraunig, C., Mendel, F., Isobe, T., Wang, G. & Cao, Z., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer-Verlag Italia, p. 117-149 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Collision Attack
Data storage equipment
Time Complexity
Framework
Guess

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Zero-correlation attacks on tweakable block ciphers with linear tweakey expansion

Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 19 Mar 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 1, p. 192-235 44 p.

Research output: Contribution to journalArticleResearchpeer-review

Correlation Attack
Zero correlation
Block Ciphers
Schedule
Linear Cryptanalysis

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C., 2018, Advances in Cryptology – CRYPTO 2018. Springer, p. 662-692 (Lecture Notes in Computer Science; vol. 10991).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Projects 1995 2019

Cryptography

Schläffer, M., Oswald, M. E., Lipp, P., Dobraunig, C. E., Mendel, F., Eichlseder, M., Nad, T., Posch, R., Lamberger, M., Rijmen, V. & Rechberger, C.

1/01/9531/01/19

Project: Research area