- haavardr@simula.no
Publications
2024
Journal Articles
M. Øygarden, P. Felke and H. Raddum
Analysis of Multivariate Encryption Schemes: Application to Dob and C*
Journal of Cryptology
2023
Proceedings, refereed
L. Grassi, I. M. Ayala, M. N. Hovd, M. Øygarden, H. Raddum and Q. Wang
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato
Advances in Cryptology – CRYPTO 2023
Talks, contributed
H. Raddum and H. F. Våge
Factoring RSA Keys Found in Certificate Transparency Logs
Linz, Austria
2022
Journal Articles
M. N. Hovd, H. Raddum and P. Fauzi
On the IND-CCA1 Security of FHE Schemes
MDPI Cryptography
Proceedings, refereed
C. Cid, J. P. Indrøy and H. Raddum
FASTA – a stream cipher for fast FHE evaluation
Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022
2021
Proceedings, refereed
M. Øygarden, P. Felke and H. Raddum
Analysis of Multivariate Encryption Schemes: Application to Dob
Public-Key Cryptography (PKC 2021)
P. Fauzi, M. N. Hovd and H. Raddum
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
International Conference on Post-Quantum Cryptography
J. P. Indrøy, N. Costes and H. Raddum
Boolean Polynomials, BDDs and CRHS Equations – Connecting the Dots with CryptaPath
Selected Areas in Cryptography
P. Derbez, G. Leander, G. Leurent, H. Raddum, Y. Rotella, D. Rupprecht, C. Beierle and L. Stennes
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Eurocrypt
2020
Proceedings, refereed
M. Øygarden, P. Felke, H. Raddum and C. Cid
Cryptanalysis of the Multivariate Encryption Scheme EFLASH
RSA Conference Cryptographers' Track 2020
2019
Journal Articles
M. Kumar, H. Raddum and S. Varadharajan
Reducing Lattice Enumeration Search Trees
Infocommunications Journal
B. Greve, Ø. Ytrehus, H. Raddum and G. Fløystad
Solving non-linear Boolean equation systems by variable elimination
Applicable Algebra in Engineering, Communication and Computing
Proceedings, refereed
M. Kumar, S. Varadharajan and H. Raddum
Graphs and Self-dual additive codes over GF(4)
The Eleventh International Workshop on Coding and Cryptography
2018
Journal Articles
H. Raddum and P. Zajac
MRHS solver based on linear algebra and exhaustive search
Journal of Mathematical Cryptology
H. Raddum and S. Varadharajan
Factorization using binary decision diagrams
Cryptography and Communications
Proceedings, refereed
C. Boyd, G. T. Davies, K. Gjøsteen, H. Raddum and M. Toorani
Definitions for Plaintext-Existence Hiding in Cloud Storage
Proceedings of the 13th International Conference on Availability, Reliability and Security
H. Raddum, M. Toorani, K. Gjøsteen, C. Boyd and G. T. Davies
Security Notions for Cloud Storage and Deduplication
ProvSec 2018: Provable Security
2017
Journal Articles
S. Rasoolzadeh and H. Raddum
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
Cryptography and Communications
S. Rasoolzadeh and H. Raddum
Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN
Tatra Mountains Mathematical Publications
Proceedings, refereed
S. Rasoolzadeh and H. Raddum
Faster Key Recovery Attack on Round-Reduced PRINCE
LightSec 2016
2016
Proceedings, refereed
S. Rasoolzadeh and H. Raddum
Cryptanalysis of PRINCE with Minimal Data
Africacrypt 2016
2015
Journal Articles
O. Kazymyrov, R. Oliynykov and H. Raddum
Influence of addition modulo 2^n on algebraic attacks
Cryptography and Communications
Proceedings, refereed
H. Raddum and O. Kazymyrov
Algebraic Attacks Using Binary Decision Diagrams
BalkanCryptSec 2014
H. Raddum
Algebraic Analysis of the Simon Block Cipher Family
LatinCrypt 2015
2014
Public outreach
H. Raddum and K. J. Hole
Dømt til dårlig sikkerhet
Chronicle in Bergens Tidende
H. Raddum
Snowden-stormen har stilnet. Hva nå?
Chronicle on NRK Ytring
2012
Proceedings, refereed
T. E. Schilling and H. Raddum
Solving Compressed Right Hand Side Equation Systems with Linear Absorption
7th International Conference on Sequences and Their Applications, SETA 2012
2011
Proceedings, refereed
T. E. Schilling and H. Raddum
Analysis of Trivium Using Compressed Right Hand Side Equations
14th International Conference on Information Security and Cryptology - ICISC 2011
Talks, contributed
M. R. S. Abyaneh, S. M. M. Hassanzadeh and H. Raddum
Tutorial Paper on Quantitative Risk Assessment
Norsk Informasjonssikkerhetskonferanse (NISK) 2011, Tromsø
2010
Journal Articles
H. Raddum and M. Sys
The Zodiac Killer Ciphers
Tatra Mountains Mathematical Publications
Proceedings, refereed
H. Raddum, L. H. Nestås and K. J. Hole
Security Analysis of Mobile Phones Used as OTP Generators
International Workshop on Security Theory and Practice, WISTP 2010
T. E. Schilling and H. Raddum
Solving Equation Systems by Agreeing and Learning
Third International Workshop on the Arithmetic of Finite Fields, WAIFI 2010
Talks, contributed
H. Raddum
Coercion-Resistant Receipts in Electronic Elections
Norsk Informasjonssikkerhetskonferanse, NISK 2010, Gjøvik
2009
Proceedings, refereed
M. R. Z'aba, H. Raddum, L. Simpson, E. Dawson, M. Henricksen and K. Wong
Algebraic Analysis of LEX
Australasian Information Security Conference, AISC2009
Public outreach
H. Raddum, L. Nestas and K. J. Hole
Når folk stemmer hjemme
Feature article in HUBRO
2008
Journal Articles
H. Raddum and I. Semaev
Solving Multiple Right Hand Sides linear equations
Designs, Codes and Cryptography
Proceedings, refereed
M. R. Z'aba, H. Raddum, M. Henricksen and E. Dawson
Bit-Pattern Based Integral Attack
Fast Software Encryption, FSE 2008
S. Rønjom and H. Raddum
On the Number of Linearly Independent Equations Generated by XL
Sequences and Their Applications, SETA 2008
2007
Proceedings, refereed
S. Babbage, C. Cid, N. Pramstaller and H. Raddum
An Analysis of the Hermes8 Stream Ciphers
12th Australasian Conference on Information Security and Privacy, ACISP 2007
H. Raddum
MRHS Equation Systems
14th International Workshop on Selected Areas in Cryptography, SAC 2007
2005
Proceedings, refereed
H. Raddum
More Dual Rijndaels
4th International Conference, AES 2004
2004
Journal Articles
H. Raddum
On the computation of coset leaders with high Hamming weight
Discrete Mathematics
V. Moen, H. Raddum and K. J. Hole
Weaknesses in the temporal key hash of WPA
Mobile Computing and Communications Review
2003
Journal Articles
L. Knudsen and H. Raddum
Distinguishing attack on five-round Feistel networks
Electronic Letters
Proceedings, refereed
H. Raddum
Cryptanalysis of IDEA-X/2
Fast Software Encryption
2001
Proceedings, refereed
H. Raddum and L. Knudsen
A Differential Attack on Reduced-Round SC2000
Selected Areas in Cryptography 2001
H. Raddum and L. Knudsen
On Noekeon
Second Open NESSIE workshop