Andrey Bogdanov

From MaRDI portal
Revision as of 12:45, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:398982

Available identifiers

zbMath Open bogdanov.andreyMaRDI QIDQ398982

List of research outcomes





PublicationDate of PublicationType
The COLM Authenticated Encryption Scheme2024-04-21Paper
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure2024-03-14Paper
Higher-order DCA against standard side-channel countermeasures2023-10-20Paper
Troika: a ternary cryptographic hash function2020-01-09Paper
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants2018-05-09Paper
Linear cryptanalysis of DES with asymmetries2018-04-06Paper
Hold your breath, PRIMATEs are lightweight2018-02-16Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing2017-07-12Paper
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks2017-07-12Paper
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness2017-02-01Paper
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core2016-12-21Paper
Exploring Energy Efficiency of Lightweight Block Ciphers2016-05-19Paper
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks2016-05-19Paper
How Secure is AES Under Leakage2016-03-23Paper
Midori: A Block Cipher for Low Energy2016-03-23Paper
Cryptanalysis of Two Fault Countermeasure Schemes2016-01-12Paper
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA2015-10-01Paper
Twisted Polynomials and Forgery Attacks on GCM2015-09-30Paper
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 22015-09-18Paper
Towards Understanding the Known-Key Security of Block Ciphers2015-09-18Paper
ALE: AES-Based Lightweight Authenticated Encryption2015-09-18Paper
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography2015-09-18Paper
Comb to Pipeline: Fast Software Encryption Revisited2015-09-18Paper
Key Recovery Attacks on Recent Authenticated Ciphers2015-09-17Paper
Bicliques with Minimal Data and Time Complexity for AES2015-09-11Paper
General Application of FFT in Cryptanalysis and Improved Attack on CAST-2562015-09-10Paper
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis2015-06-17Paper
How to Securely Release Unverified Plaintext in Authenticated Encryption2015-01-16Paper
Towards the optimality of Feistel ciphers with substitution-permutation functions2014-08-18Paper
Route 66: Passively Breaking All GSM Channels2014-07-24Paper
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers2014-07-07Paper
Multidimensional Zero-Correlation Linear Cryptanalysis of E22014-06-24Paper
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard2014-04-17Paper
Linear hulls with correlation zero and linear cryptanalysis of block ciphers2014-03-17Paper
Key Difference Invariant Bias in Block Ciphers2013-12-10Paper
Parallelizable and Authenticated Online Ciphers2013-12-10Paper
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware2013-10-10Paper
Bounds in Shallows and in Miseries2013-09-02Paper
On the Indifferentiability of Key-Alternating Ciphers2013-09-02Paper
Improved Impossible Differential Attacks on Large-Block Rijndael2013-06-04Paper
Analysis of \(3\)-line generalized Feistel networks with double SD-functions2013-04-04Paper
Integral and Multidimensional Linear Distinguishers with Correlation Zero2013-03-19Paper
Generalized Feistel networks revisited2013-01-28Paper
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity2013-01-08Paper
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers2012-07-25Paper
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations2012-06-29Paper
ENUMERATING THE k-TANGLE PROJECTIONS2012-04-30Paper
On the differential and linear efficiency of balanced Feistel networks2012-03-27Paper
Biclique Cryptanalysis of the Full AES2011-12-02Paper
Double SP-Functions: Enhanced Generalized Feistel Networks2011-07-07Paper
On unbalanced feistel networks with contracting MDS diffusion2011-04-08Paper
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN2011-03-15Paper
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs2010-03-16Paper
Linear Slide Attacks on the KeeLoq Block Cipher2009-02-10Paper
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection2009-01-22Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
Improved Side-Channel Collision Attacks on AES2008-03-25Paper
Classification of $k$-tangle projections using cascade representation2007-12-22Paper

Research outcomes over time

This page was built for person: Andrey Bogdanov