Andrey Bogdanov

From MaRDI portal
Person:398982

Available identifiers

zbMath Open bogdanov.andreyMaRDI QIDQ398982

List of research outcomes





PublicationDate of PublicationType
The COLM Authenticated Encryption Scheme2024-04-21Paper
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure2024-03-14Paper
Higher-order DCA against standard side-channel countermeasures2023-10-20Paper
Troika: a ternary cryptographic hash function2020-01-09Paper
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants2018-05-09Paper
Linear cryptanalysis of DES with asymmetries2018-04-06Paper
Hold your breath, PRIMATEs are lightweight2018-02-16Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing2017-07-12Paper
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks2017-07-12Paper
Towards practical whitebox cryptography: optimizing efficiency and space hardness2017-02-01Paper
Atomic-AES: a compact implementation of the AES encryption/decryption core2016-12-21Paper
Exploring energy efficiency of lightweight block ciphers2016-05-19Paper
Fast and memory-efficient key recovery in side-channel attacks2016-05-19Paper
\texttt{Midori}: a block cipher for low energy2016-03-23Paper
How secure is AES under leakage2016-03-23Paper
Cryptanalysis of two fault countermeasure schemes2016-01-12Paper
Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA2015-10-01Paper
Twisted Polynomials and Forgery Attacks on GCM2015-09-30Paper
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 22015-09-18Paper
ALE: AES-based lightweight authenticated encryption2015-09-18Paper
Towards Understanding the Known-Key Security of Block Ciphers2015-09-18Paper
APE: authenticated permutation-based encryption for lightweight cryptography2015-09-18Paper
Comb to pipeline: fast software encryption revisited2015-09-18Paper
Key recovery attacks on recent authenticated ciphers2015-09-17Paper
Bicliques with minimal data and time complexity for AES2015-09-11Paper
General application of FFT in cryptanalysis and improved attack on CAST-2562015-09-10Paper
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis2015-06-17Paper
How to securely release unverified plaintext in authenticated encryption2015-01-16Paper
Towards the optimality of Feistel ciphers with substitution-permutation functions2014-08-18Paper
Route 66: passively breaking all GSM channels2014-07-24Paper
On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers2014-07-07Paper
Multidimensional zero-correlation linear cryptanalysis of E22014-06-24Paper
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard2014-04-17Paper
Linear hulls with correlation zero and linear cryptanalysis of block ciphers2014-03-17Paper
Parallelizable and authenticated online ciphers2013-12-10Paper
Key difference invariant bias in block ciphers2013-12-10Paper
FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware2013-10-10Paper
On the indifferentiability of key-alternating ciphers2013-09-02Paper
Bounds in shallows and in miseries2013-09-02Paper
Improved impossible differential attacks on large-block Rijndael2013-06-04Paper
Analysis of \(3\)-line generalized Feistel networks with double SD-functions2013-04-04Paper
Integral and multidimensional linear distinguishers with correlation zero2013-03-19Paper
Generalized Feistel networks revisited2013-01-28Paper
Zero correlation linear cryptanalysis with reduced data complexity2013-01-08Paper
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers2012-07-25Paper
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)2012-06-29Paper
Enumerating the \(k\)-tangle projections2012-04-30Paper
On the differential and linear efficiency of balanced Feistel networks2012-03-27Paper
Biclique Cryptanalysis of the Full AES2011-12-02Paper
Double SP-functions: enhanced generalized Feistel networks (extended abstract)2011-07-07Paper
On unbalanced feistel networks with contracting MDS diffusion2011-04-08Paper
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN2011-03-15Paper
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs2010-03-16Paper
Linear Slide Attacks on the KeeLoq Block Cipher2009-02-10Paper
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection2009-01-22Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
Improved Side-Channel Collision Attacks on AES2008-03-25Paper
Classification of $k$-tangle projections using cascade representation2007-12-22Paper

Research outcomes over time

This page was built for person: Andrey Bogdanov