default search action
Håvard Raddum
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob and C*. J. Cryptol. 37(3): 20 (2024) - [c26]Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. CRYPTO (4) 2024: 139-173 - [i25]Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. IACR Cryptol. ePrint Arch. 2024: 347 (2024) - [i24]Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob and C. IACR Cryptol. ePrint Arch. 2024: 595 (2024) - 2023
- [c25]Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang:
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. CRYPTO (3) 2023: 305-339 - [i23]Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang:
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. IACR Cryptol. ePrint Arch. 2023: 822 (2023) - 2022
- [j8]Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:
On the IND-CCA1 Security of FHE Schemes. Cryptogr. 6(1): 13 (2022) - [c24]Carlos Cid, John Petter Indrøy, Håvard Raddum:
FASTA - A Stream Cipher for Fast FHE Evaluation. CT-RSA 2022: 451-483 - 2021
- [j7]Bjørn Møller Greve, Øyvind Ytrehus, Håvard Raddum, Gunnar Fløystad:
Solving non-linear Boolean equation systems by variable elimination. Appl. Algebra Eng. Commun. Comput. 32(1): 3-47 (2021) - [c23]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. EUROCRYPT (2) 2021: 155-183 - [c22]Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob. Public Key Cryptography (1) 2021: 155-183 - [c21]Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. PQCrypto 2021: 483-498 - [i22]Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. IACR Cryptol. ePrint Arch. 2021: 658 (2021) - [i21]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. IACR Cryptol. ePrint Arch. 2021: 819 (2021) - [i20]Carlos Cid, John Petter Indrøy, Håvard Raddum:
FASTA â" a stream cipher for fast FHE evaluation. IACR Cryptol. ePrint Arch. 2021: 1205 (2021) - [i19]John Petter Indrøy, Håvard Raddum:
Trail Search with CRHS Equations. IACR Cryptol. ePrint Arch. 2021: 1329 (2021) - [i18]Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:
On the IND-CCA1 Security of FHE Schemes. IACR Cryptol. ePrint Arch. 2021: 1624 (2021) - 2020
- [c20]Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid:
Cryptanalysis of the Multivariate Encryption Scheme EFLASH. CT-RSA 2020: 85-105 - [c19]John Petter Indrøy, Nicolas Costes, Håvard Raddum:
Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath. SAC 2020: 229-251 - [i17]Kanav Gupta, Mithilesh Kumar, Håvard Raddum:
Obtuse Lattice Bases. CoRR abs/2009.00384 (2020) - [i16]Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob. IACR Cryptol. ePrint Arch. 2020: 1442 (2020)
2010 – 2019
- 2019
- [j6]Håvard Raddum, Srimathi Varadharajan:
Factorization using binary decision diagrams. Cryptogr. Commun. 11(3): 443-460 (2019) - [i15]Bjørn Møller Greve, Øyvind Ytrehus, Håvard Raddum:
Variable Elimination - a Tool for Algebraic Cryptanalysis. IACR Cryptol. ePrint Arch. 2019: 112 (2019) - [i14]Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid:
Cryptanalysis of the Multivariate Encryption Scheme EFLASH. IACR Cryptol. ePrint Arch. 2019: 1160 (2019) - 2018
- [j5]Håvard Raddum, Pavol Zajac:
MRHS solver based on linear algebra and exhaustive search. J. Math. Cryptol. 12(3): 143-157 (2018) - [c18]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. ARES 2018: 41:1-41:7 - [c17]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Security Notions for Cloud Storage and Deduplication. ProvSec 2018: 347-365 - [i13]Håvard Raddum, Pavol Zajac:
MRHS Solver Based on Linear Algebra and Exhaustive Search. IACR Cryptol. ePrint Arch. 2018: 111 (2018) - [i12]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. IACR Cryptol. ePrint Arch. 2018: 748 (2018) - 2017
- [i11]Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus:
Eliminating Variables in Boolean Equation Systems. CoRR abs/1710.08540 (2017) - [i10]Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus:
Eliminating Variables in Boolean Equation Systems. IACR Cryptol. ePrint Arch. 2017: 1027 (2017) - [i9]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum:
Security notions for cloud storage and deduplication. IACR Cryptol. ePrint Arch. 2017: 1208 (2017) - 2016
- [j4]Oleksandr Kazymyrov, Roman Oliynykov, Håvard Raddum:
Influence of addition modulo 2 n on algebraic attacks. Cryptogr. Commun. 8(2): 277-289 (2016) - [c16]Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of PRINCE with Minimal Data. AFRICACRYPT 2016: 109-126 - [c15]Shahram Rasoolzadeh, Håvard Raddum:
Faster Key Recovery Attack on Round-Reduced PRINCE. LightSec 2016: 3-17 - [i8]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016(106) (2016) - [i7]Shahram Rasoolzadeh, Håvard Raddum:
Multidimensional Meet in the Middle Cryptanalysis of KATAN. IACR Cryptol. ePrint Arch. 2016: 77 (2016) - [i6]Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of PRINCE with Minimal Data. IACR Cryptol. ePrint Arch. 2016: 80 (2016) - [i5]Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts. IACR Cryptol. ePrint Arch. 2016: 132 (2016) - [i4]Shahram Rasoolzadeh, Håvard Raddum:
Faster Key Recovery Attack on Round-Reduced PRINCE. IACR Cryptol. ePrint Arch. 2016: 828 (2016) - 2015
- [c14]Håvard Raddum:
Algebraic Analysis of the Simon Block Cipher Family. LATINCRYPT 2015: 157-169 - 2014
- [c13]Håvard Raddum, Oleksandr Kazymyrov:
Algebraic Attacks Using Binary Decision Diagrams. BalkanCryptSec 2014: 40-54 - 2012
- [c12]Thorsten Ernst Schilling, Håvard Raddum:
Solving Compressed Right Hand Side Equation Systems with Linear Absorption. SETA 2012: 291-302 - 2011
- [c11]Thorsten Ernst Schilling, Håvard Raddum:
Analysis of Trivium Using Compressed Right Hand Side Equations. ICISC 2011: 18-32 - 2010
- [c10]Thorsten Ernst Schilling, Håvard Raddum:
Solving Equation Systems by Agreeing and Learning. WAIFI 2010: 151-165 - [c9]Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole:
Security Analysis of Mobile Phones Used as OTP Generators. WISTP 2010: 324-331
2000 – 2009
- 2009
- [c8]Muhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong:
Algebraic Analysis of LEX. AISC 2009: 33-45 - 2008
- [j3]Håvard Raddum, Igor A. Semaev:
Solving Multiple Right Hand Sides linear equations. Des. Codes Cryptogr. 49(1-3): 147-160 (2008) - [c7]Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack. FSE 2008: 363-381 - [c6]Sondre Rønjom, Håvard Raddum:
On the Number of Linearly Independent Equations Generated by XL. SETA 2008: 239-251 - 2007
- [c5]Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. ACISP 2007: 1-10 - [c4]Håvard Raddum:
MRHS Equation Systems. Selected Areas in Cryptography 2007: 232-245 - [i3]Håvard Raddum, Igor A. Semaev:
Solving MRHS linear equations. IACR Cryptol. ePrint Arch. 2007: 285 (2007) - 2006
- [i2]Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. IACR Cryptol. ePrint Arch. 2006: 269 (2006) - [i1]Håvard Raddum, Igor A. Semaev:
New Technique for Solving Sparse Equation Systems. IACR Cryptol. ePrint Arch. 2006: 475 (2006) - 2004
- [j2]Håvard Raddum:
On the computation of coset leaders with high Hamming weight. Discret. Math. 274(1-3): 213-231 (2004) - [j1]Vebjørn Moen, Håvard Raddum, Kjell Jørgen Hole:
Weaknesses in the temporal key hash of WPA. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(2): 76-83 (2004) - [c3]Håvard Raddum:
More Dual Rijndaels. AES Conference 2004: 142-147 - 2003
- [c2]Håvard Raddum:
Cryptanalysis of IDEA-X/2. FSE 2003: 1-8 - 2001
- [c1]Håvard Raddum, Lars R. Knudsen:
A Differential Attack on Reduced-Round SC2000. Selected Areas in Cryptography 2001: 190-198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint