Andrey Bogdanov

From MaRDI portal
(Redirected from Person:398982)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The COLM Authenticated Encryption Scheme
Journal of Cryptology
2024-04-21Paper
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure2024-03-14Paper
Higher-order DCA against standard side-channel countermeasures
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography
2020-01-09Paper
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
Fast Software Encryption
2018-05-09Paper
Linear cryptanalysis of DES with asymmetries2018-04-06Paper
Hold your breath, PRIMATEs are lightweight2018-02-16Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
IEEE Transactions on Computers
2017-07-12Paper
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
IEEE Transactions on Computers
2017-07-12Paper
Towards practical whitebox cryptography: optimizing efficiency and space hardness
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Atomic-AES: a compact implementation of the AES encryption/decryption core
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Exploring energy efficiency of lightweight block ciphers
Lecture Notes in Computer Science
2016-05-19Paper
Fast and memory-efficient key recovery in side-channel attacks
Lecture Notes in Computer Science
2016-05-19Paper
\texttt{Midori}: a block cipher for low energy
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
How secure is AES under leakage
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Cryptanalysis of two fault countermeasure schemes
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Twisted Polynomials and Forgery Attacks on GCM
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
Fast Software Encryption
2015-09-18Paper
ALE: AES-based lightweight authenticated encryption
Fast Software Encryption
2015-09-18Paper
Towards Understanding the Known-Key Security of Block Ciphers
Fast Software Encryption
2015-09-18Paper
APE: authenticated permutation-based encryption for lightweight cryptography
Fast Software Encryption
2015-09-18Paper
Comb to pipeline: fast software encryption revisited
Fast Software Encryption
2015-09-18Paper
Key recovery attacks on recent authenticated ciphers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Bicliques with minimal data and time complexity for AES
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
General application of FFT in cryptanalysis and improved attack on CAST-256
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis
Journal of Computational and Applied Mathematics
2015-06-17Paper
How to securely release unverified plaintext in authenticated encryption
Lecture Notes in Computer Science
2015-01-16Paper
Towards the optimality of Feistel ciphers with substitution-permutation functions
Designs, Codes and Cryptography
2014-08-18Paper
Route 66: passively breaking all GSM channels
Information Security and Privacy
2014-07-24Paper
On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers
Applied Cryptography and Network Security
2014-07-07Paper
Multidimensional zero-correlation linear cryptanalysis of E2
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
Information Processing Letters
2014-04-17Paper
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Designs, Codes and Cryptography
2014-03-17Paper
Parallelizable and authenticated online ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Key difference invariant bias in block ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
On the indifferentiability of key-alternating ciphers
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Bounds in shallows and in miseries
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Improved impossible differential attacks on large-block Rijndael
Lecture Notes in Computer Science
2013-06-04Paper
Analysis of \(3\)-line generalized Feistel networks with double SD-functions
Information Processing Letters
2013-04-04Paper
Integral and multidimensional linear distinguishers with correlation zero
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Generalized Feistel networks revisited
Designs, Codes and Cryptography
2013-01-28Paper
Zero correlation linear cryptanalysis with reduced data complexity
Fast Software Encryption
2013-01-08Paper
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
Information Processing Letters
2012-07-25Paper
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Enumerating the \(k\)-tangle projections
Journal of Knot Theory and its Ramifications
2012-04-30Paper
On the differential and linear efficiency of balanced Feistel networks
Information Processing Letters
2012-03-27Paper
Biclique Cryptanalysis of the Full AES
Lecture Notes in Computer Science
2011-12-02Paper
Double SP-functions: enhanced generalized Feistel networks (extended abstract)
Information Security and Privacy
2011-07-07Paper
On unbalanced feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
2011-04-08Paper
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Selected Areas in Cryptography
2011-03-15Paper
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Linear Slide Attacks on the KeeLoq Block Cipher
Information Security and Cryptology
2009-02-10Paper
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Improved Side-Channel Collision Attacks on AES
Selected Areas in Cryptography
2008-03-25Paper
Classification of $k$-tangle projections using cascade representation2007-12-22Paper


Research outcomes over time


This page was built for person: Andrey Bogdanov