Andrey Bogdanov

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The COLM Authenticated Encryption Scheme
Journal of Cryptology
2024-04-21Paper
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
 
2024-03-14Paper
Higher-order DCA against standard side-channel countermeasures
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography
2020-01-09Paper
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
Fast Software Encryption
2018-05-09Paper
Linear cryptanalysis of DES with asymmetries
 
2018-04-06Paper
Hold your breath, PRIMATEs are lightweight
 
2018-02-16Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
IEEE Transactions on Computers
2017-07-12Paper
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
IEEE Transactions on Computers
2017-07-12Paper
Towards practical whitebox cryptography: optimizing efficiency and space hardness
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Atomic-AES: a compact implementation of the AES encryption/decryption core
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Exploring energy efficiency of lightweight block ciphers
Lecture Notes in Computer Science
2016-05-19Paper
Fast and memory-efficient key recovery in side-channel attacks
Lecture Notes in Computer Science
2016-05-19Paper
\texttt{Midori}: a block cipher for low energy
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
How secure is AES under leakage
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Cryptanalysis of two fault countermeasure schemes
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Twisted Polynomials and Forgery Attacks on GCM
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
Fast Software Encryption
2015-09-18Paper
ALE: AES-based lightweight authenticated encryption
Fast Software Encryption
2015-09-18Paper
Towards Understanding the Known-Key Security of Block Ciphers
Fast Software Encryption
2015-09-18Paper
APE: authenticated permutation-based encryption for lightweight cryptography
Fast Software Encryption
2015-09-18Paper
Comb to pipeline: fast software encryption revisited
Fast Software Encryption
2015-09-18Paper
Key recovery attacks on recent authenticated ciphers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Bicliques with minimal data and time complexity for AES
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
General application of FFT in cryptanalysis and improved attack on CAST-256
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis
Journal of Computational and Applied Mathematics
2015-06-17Paper
How to securely release unverified plaintext in authenticated encryption
Lecture Notes in Computer Science
2015-01-16Paper
Towards the optimality of Feistel ciphers with substitution-permutation functions
Designs, Codes and Cryptography
2014-08-18Paper
Route 66: passively breaking all GSM channels
Information Security and Privacy
2014-07-24Paper
On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers
Applied Cryptography and Network Security
2014-07-07Paper
Multidimensional zero-correlation linear cryptanalysis of E2
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
Information Processing Letters
2014-04-17Paper
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Designs, Codes and Cryptography
2014-03-17Paper
Parallelizable and authenticated online ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Key difference invariant bias in block ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
On the indifferentiability of key-alternating ciphers
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Bounds in shallows and in miseries
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Improved impossible differential attacks on large-block Rijndael
Lecture Notes in Computer Science
2013-06-04Paper
Analysis of \(3\)-line generalized Feistel networks with double SD-functions
Information Processing Letters
2013-04-04Paper
Integral and multidimensional linear distinguishers with correlation zero
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Generalized Feistel networks revisited
Designs, Codes and Cryptography
2013-01-28Paper
Zero correlation linear cryptanalysis with reduced data complexity
Fast Software Encryption
2013-01-08Paper
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
Information Processing Letters
2012-07-25Paper
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Enumerating the \(k\)-tangle projections
Journal of Knot Theory and its Ramifications
2012-04-30Paper
On the differential and linear efficiency of balanced Feistel networks
Information Processing Letters
2012-03-27Paper
Biclique Cryptanalysis of the Full AES
Lecture Notes in Computer Science
2011-12-02Paper
Double SP-functions: enhanced generalized Feistel networks (extended abstract)
Information Security and Privacy
2011-07-07Paper
On unbalanced feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
2011-04-08Paper
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Selected Areas in Cryptography
2011-03-15Paper
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Linear Slide Attacks on the KeeLoq Block Cipher
Information Security and Cryptology
2009-02-10Paper
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Improved Side-Channel Collision Attacks on AES
Selected Areas in Cryptography
2008-03-25Paper
Classification of $k$-tangle projections using cascade representation
 
2007-12-22Paper


Research outcomes over time


This page was built for person: Andrey Bogdanov