default search action
Andrey Bogdanov
Person information
- affiliation: Ruhr University Bochum, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j21]Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda:
The COLM Authenticated Encryption Scheme. J. Cryptol. 37(2): 15 (2024) - 2020
- [j20]Stefan Kölbl, Elmar Tischhauser, Patrick Derbez, Andrey Bogdanov:
Troika: a ternary cryptographic hash function. Des. Codes Cryptogr. 88(1): 91-117 (2020) - [j19]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020)
2010 – 2019
- 2019
- [j18]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Compact circuits for combined AES encryption/decryption. J. Cryptogr. Eng. 9(1): 69-83 (2019) - [c63]Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang:
Higher-Order DCA against Standard Side-Channel Countermeasures. COSADE 2019: 118-141 - [c62]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145 - 2018
- [j17]Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre:
Multivariate Profiling of Hulls for Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2018(1): 101-125 (2018) - [j16]Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni:
Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol. 2018(2): 1-19 (2018) - [j15]Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser:
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. IACR Trans. Symmetric Cryptol. 2018(3): 1-35 (2018) - [c61]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita:
Inverse gating for low energy encryption. HOST 2018: 173-176 - [i33]Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang:
Higher-Order DCA against Standard Side-Channel Countermeasures. IACR Cryptol. ePrint Arch. 2018: 869 (2018) - 2017
- [j14]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. IACR Trans. Symmetric Cryptol. 2017(1): 307-328 (2017) - [c60]Andrey Bogdanov, Philip S. Vejre:
Linear Cryptanalysis of DES with Asymmetries. ASIACRYPT (1) 2017: 187-216 - [c59]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Efficient configurations for block ciphers with unified ENC/DEC paths. HOST 2017: 41-46 - [c58]Alexandres Andreou, Andrey Bogdanov, Elmar Tischhauser:
Cache timing attacks on recent microarchitectures. HOST 2017: 155 - [e2]Andrey Bogdanov:
Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10098, Springer 2017, ISBN 978-3-319-55713-7 [contents] - [i32]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. IACR Cryptol. ePrint Arch. 2017: 183 (2017) - [i31]Andrey Bogdanov, Philip S. Vejre:
Linear Cryptanalysis of DES with Asymmetries. IACR Cryptol. ePrint Arch. 2017: 895 (2017) - 2016
- [c57]Andrey Bogdanov, Takanori Isobe, Elmar Tischhauser:
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness. ASIACRYPT (1) 2016: 126-158 - [c56]Subhadeep Banik, Andrey Bogdanov, Tiziana Fanni, Carlo Sau, Luigi Raffo, Francesca Palumbo, Francesco Regazzoni:
Adaptable AES implementation with power-gating support. Conf. Computing Frontiers 2016: 331-334 - [c55]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. FSE 2016: 399-415 - [c54]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita:
Round gating for low energy block ciphers. HOST 2016: 55-60 - [c53]Subhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu:
Low-area hardware implementations of CLOC, SILC and AES-OTR. HOST 2016: 71-74 - [c52]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. INDOCRYPT 2016: 173-190 - [c51]Danilo Sijacic, Andreas B. Kidmose, Bohan Yang, Subhadeep Banik, Begül Bilgin, Andrey Bogdanov, Ingrid Verbauwhede:
Hold Your Breath, PRIMATEs Are Lightweight. SAC 2016: 197-216 - [i30]Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:
Comb to Pipeline: Fast Software Encryption Revisited. IACR Cryptol. ePrint Arch. 2016: 47 (2016) - [i29]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. IACR Cryptol. ePrint Arch. 2016: 178 (2016) - [i28]Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre:
Multivariate Linear Cryptanalysis: The Past and Future of PRESENT. IACR Cryptol. ePrint Arch. 2016: 667 (2016) - [i27]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. IACR Cryptol. ePrint Arch. 2016: 927 (2016) - [i26]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES v 2.0. IACR Cryptol. ePrint Arch. 2016: 1005 (2016) - 2015
- [c50]Andrey Bogdanov, Takanori Isobe:
How Secure is AES Under Leakage. ASIACRYPT (2) 2015: 361-385 - [c49]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni:
Midori: A Block Cipher for Low Energy. ASIACRYPT (2) 2015: 411-436 - [c48]Andrey Bogdanov, Takanori Isobe:
White-Box Cryptography Revisited: Space-Hard Ciphers. CCS 2015: 1058-1069 - [c47]Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser:
Twisted Polynomials and Forgery Attacks on GCM. EUROCRYPT (1) 2015: 762-786 - [c46]Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:
Comb to Pipeline: Fast Software Encryption Revisited. FSE 2015: 150-171 - [c45]Subhadeep Banik, Andrey Bogdanov:
Cryptanalysis of Two Fault Countermeasure Schemes. INDOCRYPT 2015: 241-252 - [c44]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Exploring the energy consumption of lightweight blockciphers in FPGA. ReConFig 2015: 1-6 - [c43]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Exploring Energy Efficiency of Lightweight Block Ciphers. SAC 2015: 178-194 - [c42]Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. SAC 2015: 310-327 - [i25]Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 222 (2015) - [i24]Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. IACR Cryptol. ePrint Arch. 2015: 424 (2015) - [i23]Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 795 (2015) - [i22]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Exploring Energy Efficiency of Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 847 (2015) - [i21]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni:
Midori: A Block Cipher for Low Energy (Extended Version). IACR Cryptol. ePrint Arch. 2015: 1142 (2015) - [i20]Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser:
Twisted Polynomials and Forgery Attacks on GCM. IACR Cryptol. ePrint Arch. 2015: 1224 (2015) - 2014
- [j13]Andrey Bogdanov, Vincent Rijmen:
Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70(3): 369-383 (2014) - [j12]Kyoji Shibutani, Andrey Bogdanov:
Towards the optimality of Feistel ciphers with substitution-permutation functions. Des. Codes Cryptogr. 73(2): 667-682 (2014) - [j11]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard. Inf. Process. Lett. 114(6): 322-330 (2014) - [j10]Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalçin:
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis. J. Comput. Appl. Math. 259: 592-598 (2014) - [c41]Philip S. Vejre, Andrey Bogdanov:
Route 66: Passively Breaking All GSM Channels. ACISP 2014: 422-429 - [c40]Céline Blondeau, Andrey Bogdanov, Meiqin Wang:
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. ACNS 2014: 271-288 - [c39]Long Wen, Meiqin Wang, Andrey Bogdanov:
Multidimensional Zero-Correlation Linear Cryptanalysis of E2. AFRICACRYPT 2014: 147-164 - [c38]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. ASIACRYPT (1) 2014: 105-125 - [c37]Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. FSE 2014: 168-186 - [c36]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014: 160-174 - [c35]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. INDOCRYPT 2014: 161-176 - [c34]Cesare Alippi, Andrey Bogdanov, Francesco Regazzoni:
Lightweight cryptography for constrained devices. ISIC 2014: 144-147 - [c33]Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014: 274-287 - [i19]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. IACR Cryptol. ePrint Arch. 2014: 144 (2014) - [i18]Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software. IACR Cryptol. ePrint Arch. 2014: 186 (2014) - [i17]Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser:
Weak-Key Analysis of POET. IACR Cryptol. ePrint Arch. 2014: 226 (2014) - [i16]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Note of Multidimensional MITM Attack on 25-Round TWINE-128. IACR Cryptol. ePrint Arch. 2014: 425 (2014) - [i15]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Bicliques with Minimal Data and Time Complexity for AES (Extended Version). IACR Cryptol. ePrint Arch. 2014: 932 (2014) - 2013
- [j9]Andrey Bogdanov, Kyoji Shibutani:
Generalized Feistel networks revisited. Des. Codes Cryptogr. 66(1-3): 75-97 (2013) - [j8]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IEEE Trans. Computers 62(10): 2041-2053 (2013) - [c32]Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao:
Key Difference Invariant Bias in Block Ciphers. ASIACRYPT (1) 2013: 357-376 - [c31]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda:
Parallelizable and Authenticated Online Ciphers. ASIACRYPT (1) 2013: 424-443 - [c30]Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES 2013: 142-158 - [c29]Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. CRYPTO (1) 2013: 204-221 - [c28]Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. CRYPTO (1) 2013: 531-550 - [c27]Andrey Bogdanov, Elmar Tischhauser:
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. FSE 2013: 19-38 - [c26]Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. FSE 2013: 348-366 - [c25]Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. FSE 2013: 447-466 - [c24]Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard:
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. Selected Areas in Cryptography 2013: 306-323 - [i14]Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. IACR Cryptol. ePrint Arch. 2013: 61 (2013) - [i13]Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. IACR Cryptol. ePrint Arch. 2013: 482 (2013) - [i12]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda:
Parallelizable and Authenticated Online Ciphers. IACR Cryptol. ePrint Arch. 2013: 790 (2013) - [i11]Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2013: 791 (2013) - 2012
- [j7]Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On security arguments of the second round SHA-3 candidates. Int. J. Inf. Sec. 11(2): 103-120 (2012) - [j6]Qingju Wang, Andrey Bogdanov:
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers. Inf. Process. Lett. 112(11): 427-432 (2012) - [j5]Andrey Bogdanov, Ilya Kizhvatov:
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. IEEE Trans. Computers 61(8): 1153-1164 (2012) - [c23]Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. ASIACRYPT 2012: 244-261 - [c22]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). EUROCRYPT 2012: 45-62 - [c21]Andrey Bogdanov, Meiqin Wang:
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. FSE 2012: 29-48 - [c20]Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov:
Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140 - [c19]Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalçin:
Efficient reconfigurable hardware architecture for accurately computing success probability and data complexity of linear attacks. ReConFig 2012: 1-6 - [c18]Andrey Bogdanov, Amir Moradi, Tolga Yalçin:
Efficient and side-channel resistant authenticated encryption of FPGA bitstreams. ReConFig 2012: 1-6 - [e1]Andrey Bogdanov, Somitra Kumar Sanadhya:
Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7644, Springer 2012, ISBN 978-3-642-34415-2 [contents] - [i10]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. IACR Cryptol. ePrint Arch. 2012: 35 (2012) - [i9]Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On Security Arguments of the Second Round SHA-3 Candidates. IACR Cryptol. ePrint Arch. 2012: 147 (2012) - 2011
- [j4]Andrey Bogdanov:
On unbalanced Feistel networks with contracting MDS diffusion. Des. Codes Cryptogr. 59(1-3): 35-58 (2011) - [j3]Andy Rupp, Thomas Eisenbarth, Andrey Bogdanov, Oliver Grieb:
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications. Integr. 44(4): 290-304 (2011) - [j2]Andrey Bogdanov, Kyoji Shibutani:
Analysis of 3-line generalized Feistel networks with double SD-functions. Inf. Process. Lett. 111(13): 656-660 (2011) - [c17]Andrey Bogdanov, Kyoji Shibutani:
Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. ACISP 2011: 106-119 - [c16]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. ASIACRYPT 2011: 344-371 - [c15]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
spongent: A Lightweight Hash Function. CHES 2011: 312-325 - [i8]Andrey Bogdanov, Vincent Rijmen:
Zero-Correlation Linear Cryptanalysis of Block Ciphers. IACR Cryptol. ePrint Arch. 2011: 123 (2011) - [i7]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. IACR Cryptol. ePrint Arch. 2011: 449 (2011) - [i6]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IACR Cryptol. ePrint Arch. 2011: 697 (2011) - 2010
- [b1]Andrey Bogdanov:
Analysis and design of block cipher constructions. Ruhr University Bochum, 2010, ISBN 978-3-89966-354-9, pp. 1-201 - [j1]Andrey Bogdanov:
On the differential and linear efficiency of balanced Feistel networks. Inf. Process. Lett. 110(20): 861-866 (2010) - [c14]Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, Malte Wienecke:
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. CT-RSA 2010: 235-251 - [c13]Andrey Bogdanov, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. Selected Areas in Cryptography 2010: 229-240 - [i5]Andrey Bogdanov, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. IACR Cryptol. ePrint Arch. 2010: 532 (2010) - [i4]Andrey Bogdanov, Ilya Kizhvatov:
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. IACR Cryptol. ePrint Arch. 2010: 590 (2010)
2000 – 2009
- 2008
- [c12]Sundar Balasubramanian, Harold W. Carter, Andrey Bogdanov, Andy Rupp, Jintai Ding:
Fast multivariate signature generation in hardware: The case of rainbow. ASAP 2008: 25-30 - [c11]Andrey Bogdanov:
Multiple-Differential Side-Channel Collision Attacks on AES. CHES 2008: 30-44 - [c10]Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf:
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. CHES 2008: 45-61 - [c9]Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin:
Hash Functions and RFID Tags: Mind the Gap. CHES 2008: 283-299 - [c8]Sundar Balasubramanian, Andrey Bogdanov, Andy Rupp, Jintai Ding, Harold W. Carter:
Fast Multivariate Signature Generation in Hardware: The Case of Rainbow. FCCM 2008: 281-282 - [c7]Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin:
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. INDOCRYPT 2008: 251-265 - [i3]Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf:
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? IACR Cryptol. ePrint Arch. 2008: 349 (2008) - 2007
- [c6]Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper:
Collision Attacks on AES-Based MAC: Alpha-MAC. CHES 2007: 166-180 - [c5]Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp:
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. CHES 2007: 394-412 - [c4]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 - [c3]