Ascon v1.2 - Lightweight Authenticated Encryption and Hashing C Dobraunig, M Eichlseder, F Mendel, M Schläffer Journal of Cryptology 34 (33), 2021 | 530* | 2021 |
SIFA: exploiting ineffective fault inductions on symmetric cryptography C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018 | 196 | 2018 |
SPHINCS+ JP Aumasson, DJ Bernstein, C Dobraunig, M Eichlseder, S Fluhrer, ... | 179* | 2019 |
Rasta: A cipher with low ANDdepth and few ANDs per bit C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ... CRYPTO 2018, 2018 | 126 | 2018 |
ISAP v2.0. Submission to NIST C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas, ... Submission to the NIST Lightweight Cryptography Project, 2019 | 103* | 2019 |
Cryptanalysis of Ascon C Dobraunig, M Eichlseder, F Mendel, M Schläffer CT-RSA 2015, 2015 | 99 | 2015 |
ISAP – Towards side-channel secure authenticated encryption C Dobraunig, M Eichlseder, S Mangard, F Mendel, T Unterluggauer IACR Transactions on Symmetric Cryptology, 80-105, 2017 | 92 | 2017 |
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures C Dobraunig, M Eichlseder, H Gross, S Mangard, F Mendel, R Primas ASIACRYPT 2018, 2018 | 91 | 2018 |
Analysis of SHA-512/224 and SHA-512/256 C Dobraunig, M Eichlseder, F Mendel ASIACRYPT 2015, 612-630, 2015 | 87 | 2015 |
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes C Dobraunig, M Eichlseder, T Korak, V Lomné, F Mendel ASIACRYPT 2016, 2016 | 86 | 2016 |
Out of Oddity–New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... | 71 | 2020 |
Ascon v1. 2. submission to the CAESAR competition C Dobraunig, M Eichlseder, F Mendel, M Schläffer Institute for Applied Information Processing and Communications, Graz, 2016 | 65 | 2016 |
Protecting against Statistical Ineffective Fault Attacks J Daemen, C Dobraunig, M Eichlseder, H Gross, F Mendel, R Primas | 61 | 2019 |
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC M Eichlseder, L Grassi, R Lüftenegger, M Øygarden, C Rechberger, ... | 59 | 2020 |
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates C Dobraunig, M Eichlseder, F Mendel ASIACRYPT 2015, 490-509, 2015 | 59 | 2015 |
Higher-order cryptanalysis of LowMC C Dobraunig, M Eichlseder, F Mendel ICISC 2015, 2015 | 59 | 2015 |
-Based Learning of Markov Decision Processes M Tappler, BK Aichernig, G Bacci, M Eichlseder, KG Larsen International Symposium on Formal Methods, 651-669, 2019 | 48* | 2019 |
Malicious Hashing: Eve’s Variant of SHA-1 A Albertini, JP Aumasson, M Eichlseder, F Mendel, M Schläffer SAC 2014, 2014 | 42 | 2014 |
CSI: Rowhammer–Cryptographic security and integrity against rowhammer J Juffinger, L Lamster, A Kogler, M Eichlseder, M Lipp, D Gruss 2023 IEEE Symposium on Security and Privacy (SP), 1702-1718, 2023 | 37 | 2023 |
Square Attack on 7-Round Kiasu-BC C Dobraunig, M Eichlseder, F Mendel ACNS 2016, 2016 | 35 | 2016 |