Mobile private contact discovery at scale D Kales, C Rechberger, T Schneider, M Senker, C Weinert 28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019 | 138 | 2019 |
An attack on some signature schemes constructed from five-pass identification schemes D Kales, G Zaverucha International Conference on Cryptology and Network Security, 3-22, 2020 | 70 | 2020 |
Banquet: short and fast signatures from AES C Baum, CD de Saint Guilhem, D Kales, E Orsini, P Scholl, G Zaverucha IACR International Conference on Public-Key Cryptography, 266-297, 2021 | 59 | 2021 |
Picnic G Zaverucha, M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, ... NIST Post-Quantum Standardization Project Round 3, 2017 | 50 | 2017 |
Improving the performance of the picnic signature scheme D Kales, G Zaverucha IACR Transactions on Cryptographic Hardware and Embedded Systems, 154-188, 2020 | 49 | 2020 |
Efficient lifting for shorter zero-knowledge proofs and post-quantum signatures D Kales, G Zaverucha Cryptology ePrint Archive, 2022 | 47 | 2022 |
Shorter signatures based on tailor-made minimalist symmetric-key crypto C Dobraunig, D Kales, C Rechberger, M Schofnegger, G Zaverucha Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 45 | 2022 |
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC I Dinur, D Kales, A Promitzer, S Ramacher, C Rechberger Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 37 | 2019 |
Practical key-recovery attack on MANTIS5 C Dobraunig, M Eichlseder, D Kales, F Mendel IACR Transactions on Symmetric Cryptology, 248-260, 2016 | 31 | 2016 |
Revisiting user privacy for certificate transparency D Kales, O Omolola, S Ramacher 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 432-447, 2019 | 29 | 2019 |
Clustering related-tweak characteristics: application to MANTIS-6 M Eichlseder, D Kales IACR Transactions on Symmetric Cryptology, 111-132, 2018 | 27 | 2018 |
Efficient FPGA implementations of LowMC and Picnic D Kales, S Ramacher, C Rechberger, R Walch, M Werner Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020 | 22 | 2020 |
Privately connecting mobility to infectious diseases via applied cryptography A Bampoulidis, A Bruni, L Helminger, D Kales, C Rechberger, R Walch arXiv preprint arXiv:2005.02061, 2020 | 18 | 2020 |
Multi-party revocation in sovrin: Performance through distributed trust L Helminger, D Kales, S Ramacher, R Walch Cryptographers’ Track at the RSA Conference, 527-551, 2021 | 13 | 2021 |
Picnic: a family of post-quantum secure digital signature algorithms M Chase, D Derler, S Goldfeder, D Kales, J Katz, V Kolesnikov, C Orlandi, ... Third round submission to the NIST post-quantum cryptography call. https …, 2020 | 10 | 2020 |
Forgery Attacks on FlexAE and FlexAEAD M Eichlseder, D Kales, M Schofnegger Cryptography and Coding: 17th IMA International Conference, IMACC 2019 …, 2019 | 8 | 2019 |
Improvements to the linear operations of lowmc: A faster picnic D Kales, L Perrin, A Promitzer, S Ramacher, C Rechberger Cryptology ePrint Archive, 2017 | 7 | 2017 |
Note on the robustness of CAESAR candidates D Kales, M Eichlseder, F Mendel Cryptology ePrint Archive, 2017 | 7 | 2017 |
The picnic signature scheme design document (version 3.0) M Chase, D Derler, S Goldfeder, D Kales, J Katz, V Kolesnikov, C Orlandi, ... NIST Post-Quantum Cryptography Standardization Round 3 Submission 9, 2020 | 6 | 2020 |
Privately connecting mobility to infectious diseases via applied cryptography A Bruni, A Bampoulidis, C Rechberger, L Helminger, D Kales, R Walch | 5 | 2021 |