Search results

  • 2023

    Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak

    Vaziri, M. & Velichkov, V., 4 Oct 2023, Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings. Springer, Vol. 13907. p. 43-62 20 p. (Lecture Notes in Computer Science; vol. 13907).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: Anemoi Permutations and Jive Compression Mode

    Bouvier, C., Briaud, P., Chaidos, P., Perrin, L., Salen, R., Velichkov, V. & Willems, D., 9 Aug 2023, Advances in Cryptology – CRYPTO 2023. Springer, Vol. 14083. p. 507-539 (Lecture Notes in Computer Science; vol. 14083).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Meet-in-the-Filter and Dynamic Counting with Applications to Speck

    Biryukov, A., Cardoso dos Santos, L., Teh, J. S., Udovenko, A. & Velichkov, V., 29 May 2023, Applied Cryptography and Network Security : 21st International Conference, ACNS 2023, Proceedings. Tibouchi, M. & Wang, X. (eds.). Springer, Vol. 13905. p. 149-177 29 p. (Lecture Notes in Computer Science; vol. 13905).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2022

    Automated Truncation of Differential Trails and Trail Clustering in ARX

    Biryukov, A., Cardoso dos Santos, L., Feher, D., Velichkov, V. & Vitto, G., 27 Mar 2022, Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers. Al Tawy, R. & Hülsing, A. (eds.). Springer, 31 p. (Lecture Notes in Computer Science; vol. 13203).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2021

    On The Cost of ASIC Hardware Crackers: A SHA-1 Case Study

    Chattopadhyay, A., Khairallah, M., Leurent, G., Najm, Z., Peyrin, T. & Velichkov, V., 11 May 2021, Topics in Cryptology – CT-RSA 2021. Springer, p. 657 – 681 25 p. (Lecture Notes in Computer Science; vol. 12704).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2020

    Alzette: A 64-Bit ARX-box (Feat. CRAX and TRAX)

    Beierle, C., Biryukov, A., Cardoso dos Santos, L., Großschädl, J., Perrin, L., Udovenko, A., Velichkov, V. & Wang, Q., 10 Aug 2020, Advances in Cryptology -- CRYPTO 2020. Micciancio, D. & Ristenpart, T. (eds.). Cham: Springer, p. 419-448 30 p. (Lecture Notes in Computer Science ; vol. 12172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Lightweight AEAD and Hashing using the Sparkle Permutation Family

    Beierle, C., Biryukov, A., Cardoso dos Santos, L., Großschädl, J., Perrin, L., Udovenko, A., Velichkov, V. & Wang, Q., 22 Jun 2020, In: IACR Transactions on Symmetric Cryptology. 2020, S1, p. 208-261 54 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • 2016

    Design Strategies for ARX with Provable Bounds: Sparx and LAX

    Dinu, D., Perrin, L., Udovenko, A., Velichkov, V., Großschädl, J. & Biryukov, A., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology -- ASIACRYPT 2016. Cheon, J. H. & Takagi, T. (eds.). Berlin, Heidelberg: Springer, p. 484-513 30 p. (Lecture Notes in Computer Science; vol. 10031)(Security and Cryptology; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

    Biryukov, A., Velichkov, V. & Le Corre, Y., 20 Jul 2016, (E-pub ahead of print) Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. Peyrin, T. (ed.). Berlin, Heidelberg: Springer, p. 289-310 22 p. (Lecture Notes in Computer Science; vol. 9783)(Security and Cryptology; vol. 9783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Analysis of the Authenticated Cipher MORUS (v1)

    Mileva, A., Dimitrova, V. & Velichkov, V., 2016, Cryptography and Information Security in the Balkans. Pasalic, E. & Knudsen, L. R. (eds.). Cham: Springer, p. 45-59 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SPARX: A Family of ARX-based Lightweight Block Ciphers Provably Secure Against Linear and Differential Attacks

    Dinu, D., Perrin, L., Udovenko, A., Velichkov, V., Großschädl, J. & Biryukov, A., 2016. 21 p.

    Research output: Contribution to conferencePaperpeer-review

    Open Access
  • 2015

    Differential Analysis of Block Ciphers SIMON and SPECK

    Biryukov, A., Roy, A. & Velichkov, V., 2015, FSE 2014: Fast Software Encryption. Cid, C. & Rechberger, C. (eds.). Berlin, Heidelberg: Springer, p. 546-570 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved Data Complexity of Attacks on RC5

    Biryukov, A. & Velichkov, V., 2015, p. 96-103. 8 p.

    Research output: Contribution to conferencePaperpeer-review

    Open Access
  • 2014

    Automatic Search for Differential Trails in ARX Ciphers

    Biryukov, A. & Velichkov, V., 2014, Topics in Cryptology -- CT-RSA 2014. Benaloh, J. (ed.). Cham: Springer, p. 227-250 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    A Cross-protocol Attack on the TLS Protocol

    Mavrogiannopoulos, N., Vercauteren, F., Velichkov, V. & Preneel, B., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 62-72 11 p. (CCS '12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX

    Velichkov, V., Mouha, N., De Cannière, C. & Preneel, B., 2012, Fast Software Encryption. Canteaut, A. (ed.). Berlin, Heidelberg: Springer, p. 287-305 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Meet-in-the-Middle Attacks on Reduced-Round XTEA

    Sekar, G., Mouha, N., Velichkov, V. & Preneel, B., 2011, Topics in Cryptology -- CT-RSA 2011. Kiayias, A. (ed.). Berlin, Heidelberg: Springer, p. 250-267 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security Evaluation of the K2 Stream Cipher

    Bogdanov, A., Preneel, B. (ed.), Rijmen, V. (ed.), Mouha, N., Sekar, G., Tischhauser, E., Toz, D., Varici, K., Velichkov, V. & Wang, M., 2011, 46 p.

    Research output: Book/ReportOther report

    Open Access
  • The Additive Differential Probability of ARX

    Velichkov, V., Mouha, N., De Cannière, C. & Preneel, B., 2011, Fast Software Encryption. Joux, A. (ed.). Berlin, Heidelberg: Springer, p. 342-358 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The Differential Analysis of S-Functions

    Mouha, N., Velichkov, V., De Cannière, C. & Preneel, B., 2011, Selected Areas in Cryptography. Biryukov, A., Gong, G. & Stinson, D. R. (eds.). Berlin, Heidelberg: Springer, p. 36-56 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    Algebraic cryptanalysis of a small-scale version of stream cipher Lex

    Velichkov, V., Rijmen, V. & Preneel, B., 1 Jun 2010, In: IET Information Security. 4, 2, p. 49-61 13 p.

    Research output: Contribution to journalArticlepeer-review

  • Analysis of the Hash Function BMW

    Velichkov, V., Rijmen, V. & Preneel, B., 2010.

    Research output: Contribution to conferenceOtherpeer-review

  • SYMAES: A Fully Symbolic Polynomial System Generator for AES-128

    Velichkov, V., Rijmen, V. & Preneel, B., 2010, p. 51-52. 2 p.

    Research output: Contribution to conferenceAbstractpeer-review

    Open Access
  • Toolkit for the Differential Cryptanalysis of ARX-based Cryptographic Constructions

    Mouha, N., Velichkov, V., De Cannière, C. & Preneel, B., 2010, p. 125-126. 2 p.

    Research output: Contribution to conferenceAbstractpeer-review

  • 2008

    Demonstration of unobservable voice over IP

    Knezevic, M. & Velichkov, V., 1 Jun 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks. p. 1-3 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the Practical Performance of Rateless Codes

    Knezevic, M., Velichkov, V., Preneel, B. & Verbauwhede, I., 2008, WINSYS 2008 - Proceedings of the International Conference on Wireless Information Networks and Systems: Porto, Portugal, July 26-29, 2008, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications. p. 173-176 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution