Andrey Bogdanov

From MaRDI portal
Person:398982

Available identifiers

zbMath Open bogdanov.andreyMaRDI QIDQ398982

List of research outcomes

PublicationDate of PublicationType
The COLM Authenticated Encryption Scheme2024-04-21Paper
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure2024-03-14Paper
Higher-order DCA against standard side-channel countermeasures2023-10-20Paper
Troika: a ternary cryptographic hash function2020-01-09Paper
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants2018-05-09Paper
Linear cryptanalysis of DES with asymmetries2018-04-06Paper
Hold your breath, PRIMATEs are lightweight2018-02-16Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing2017-07-12Paper
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks2017-07-12Paper
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness2017-02-01Paper
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core2016-12-21Paper
Exploring Energy Efficiency of Lightweight Block Ciphers2016-05-19Paper
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks2016-05-19Paper
How Secure is AES Under Leakage2016-03-23Paper
Midori: A Block Cipher for Low Energy2016-03-23Paper
Cryptanalysis of Two Fault Countermeasure Schemes2016-01-12Paper
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA2015-10-01Paper
Twisted Polynomials and Forgery Attacks on GCM2015-09-30Paper
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 22015-09-18Paper
Towards Understanding the Known-Key Security of Block Ciphers2015-09-18Paper
ALE: AES-Based Lightweight Authenticated Encryption2015-09-18Paper
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography2015-09-18Paper
Comb to Pipeline: Fast Software Encryption Revisited2015-09-18Paper
Key Recovery Attacks on Recent Authenticated Ciphers2015-09-17Paper
Bicliques with Minimal Data and Time Complexity for AES2015-09-11Paper
General Application of FFT in Cryptanalysis and Improved Attack on CAST-2562015-09-10Paper
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis2015-06-17Paper
How to Securely Release Unverified Plaintext in Authenticated Encryption2015-01-16Paper
Towards the optimality of Feistel ciphers with substitution-permutation functions2014-08-18Paper
Route 66: Passively Breaking All GSM Channels2014-07-24Paper
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers2014-07-07Paper
Multidimensional Zero-Correlation Linear Cryptanalysis of E22014-06-24Paper
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard2014-04-17Paper
Linear hulls with correlation zero and linear cryptanalysis of block ciphers2014-03-17Paper
Key Difference Invariant Bias in Block Ciphers2013-12-10Paper
Parallelizable and Authenticated Online Ciphers2013-12-10Paper
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware2013-10-10Paper
Bounds in Shallows and in Miseries2013-09-02Paper
On the Indifferentiability of Key-Alternating Ciphers2013-09-02Paper
Improved Impossible Differential Attacks on Large-Block Rijndael2013-06-04Paper
Analysis of \(3\)-line generalized Feistel networks with double SD-functions2013-04-04Paper
Integral and Multidimensional Linear Distinguishers with Correlation Zero2013-03-19Paper
Generalized Feistel networks revisited2013-01-28Paper
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity2013-01-08Paper
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers2012-07-25Paper
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations2012-06-29Paper
ENUMERATING THE k-TANGLE PROJECTIONS2012-04-30Paper
On the differential and linear efficiency of balanced Feistel networks2012-03-27Paper
Biclique Cryptanalysis of the Full AES2011-12-02Paper
Double SP-Functions: Enhanced Generalized Feistel Networks2011-07-07Paper
On unbalanced feistel networks with contracting MDS diffusion2011-04-08Paper
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN2011-03-15Paper
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs2010-03-16Paper
Linear Slide Attacks on the KeeLoq Block Cipher2009-02-10Paper
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection2009-01-22Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
Improved Side-Channel Collision Attacks on AES2008-03-25Paper
Classification of $k$-tangle projections using cascade representation2007-12-22Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Andrey Bogdanov