Andrey Bogdanov

  1. 2016
  2. Published

    Exploring Energy Efficiency of Lightweight Block Ciphers. / Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco .

    22nd International Conference on Selected Areas in Cryptography (SAC 2015): Revised Selected Papers. ed. / Orr Dunkelman; Liam Keliher. Springer, 2016. p. 178-194 (Lecture Notes in Computer Science, Vol. 9566).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2016

  3. Published

    Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. / Bogdanov, Andrey; Kizhvatov, Ilya ; Manzoor, Kamran ; Tischhauser, Elmar Wolfgang; Witteman, Marc .

    22nd International Conference on Selected Areas in Cryptography (SAC 2015): Revised Selected Papers. ed. / Orr Dunkelman; Liam Keliher. Springer, 2016. p. 310-327 (Lecture Notes in Computer Science, Vol. 9566).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2016

  4. 2015
  5. Published

    APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. / Andreeva, Elena; Bilgin, Begül; Bogdanov, Andrey; Luykx, Atul; Mennink, Bart; Mouha, Nicky; Yasuda, Kan.

    Revised Selected Papers of the 21st International Workshop Fast Software Encryption (FSE 2014). ed. / Carlos Cid; Christian Rechberger. Springer, 2015. p. 168-186 (Lecture Notes in Computer Science, Vol. 8540).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  6. Published

    Comb to Pipeline: Fast Software Encryption Revisited. / Bogdanov, Andrey; Lauridsen, Martin Mehl; Tischhauser, Elmar Wolfgang.

    Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015). ed. / Gregor Leander. Springer, 2015. p. 150-171 (Lecture Notes in Computer Science, Vol. 9054).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  7. Published

    Cryptanalysis of Two Fault Countermeasure Schemes. / Banik, Subhadeep; Bogdanov, Andrey.

    Progress in Cryptology – INDOCRYPT 2015: Proceedings of the 16th International Conference on Cryptology in India. ed. / Alex Biryukov; Vipul Goyal. 2015. p. 241-252 (Lecture Notes in Computer Science, Vol. 9462).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  8. Published

    Twisted Polynomials and Forgery Attacks on GCM. / Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter ; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang.

    Advances in Cryptology – EUROCRYPT 2015: Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part 1. ed. / Elisabeth v; Marc Fischlin. Springer, 2015. p. 762-786 (Lecture Notes in Computer Science, Vol. 9056).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  9. 2014
  10. Published

    ALE: AES-based lightweight authenticated encryption. / Bogdanov, Andrey; Mendel, Florian; Regazzoni, Francesco; Rijmen, Vincent; Tischhauser, Elmar.

    Fast Software Encryption. Revised Selected Papers. Vol. 8424 Springer, 2014. p. 447-466 (Lecture Notes in Computer Science, Vol. 8424).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  11. Published

    How to Securely Release Unverified Plaintext in Authenticated Encryption. / Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul; Mennink, Bart; Mouha, Nicky; Yasuda, Kan.

    Advances in Cryptology – ASIACRYPT 2014: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security - Part I. ed. / Palash Sarkar; Tetsu Iwata. Springer, 2014. p. 105-125 (Lecture Notes in Computer Science; No. 8873).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  12. Published

    Key Recovery Attacks on Recent Authenticated Ciphers. / Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria; Lauridsen, Martin Mehl; Mendel, Florian; Schläffer, Martin; Tischhauser, Elmar Wolfgang.

    3rd International Conference on Cryptology and Information Security in Latin America. Springer, 2014. p. 274-287 (Lecture Notes in Computer Science, Vol. 8895).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  13. Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis. / Bogdanov, Andrey; Kavun, Elif Bilge; Tischhauser, Elmar Wolfgang; Yalcin, Tolga.

    In: Journal of Computational and Applied Mathematics, Vol. 259, 2014, p. 592-598.

    Publication: Research - peer-reviewJournal article – Annual report year: 2014

Previous 1 2 3 4 5 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word