What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Andrey Bogdanov
Google Scholar
ORCID:
0000-0003-1449-3099
54
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/joc
The COLM Authenticated Encryption Scheme.
Elena Andreeva
Andrey Bogdanov
Nilanjan Datta
Atul Luykx
Bart Mennink
Mridul Nandi
Elmar Tischhauser
Kan Yasuda
2019
conf/iwsec
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.
Kosei Sakamoto
Kazuhiko Minematsu
Nao Shibata
Maki Shigeri
Hiroyasu Kubo
Yuki Funabiki
Andrey Bogdanov
Sumio Morioka
Takanori Isobe
2018
journals/tosc
Multivariate Profiling of Hulls for Linear Cryptanalysis.
Andrey Bogdanov
Elmar Tischhauser
Philip S. Vejre
2018
journals/tosc
Towards Low Energy Stream Ciphers.
Subhadeep Banik
Vasily Mikhalev
Frederik Armknecht
Takanori Isobe
Willi Meier
Andrey Bogdanov
Yuhei Watanabe
Francesco Regazzoni
2018
journals/tosc
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things.
Subhadeep Banik
Andrey Bogdanov
Atul Luykx
Elmar Tischhauser
2018
conf/host
Inverse gating for low energy encryption.
Subhadeep Banik
Andrey Bogdanov
Francesco Regazzoni
Takanori Isobe
Harunaga Hiwatari
Toru Akishita
2017
journals/tosc
Analysis of Software Countermeasures for Whitebox Encryption.
Subhadeep Banik
Andrey Bogdanov
Takanori Isobe
Martin Bjerregaard Jepsen
2017
conf/host
Efficient configurations for block ciphers with unified ENC/DEC paths.
Subhadeep Banik
Andrey Bogdanov
Francesco Regazzoni
2017
conf/host
Cache timing attacks on recent microarchitectures.
Alexandres Andreou
Andrey Bogdanov
Elmar Tischhauser
2017
conf/asiacrypt
Linear Cryptanalysis of DES with Asymmetries.
Andrey Bogdanov
Philip S. Vejre
2016
conf/fse
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants.
Meiqin Wang
Tingting Cui
Huaifeng Chen
Ling Sun
Long Wen
Andrey Bogdanov
2016
conf/host
Low-area hardware implementations of CLOC, SILC and AES-OTR.
Subhadeep Banik
Andrey Bogdanov
Kazuhiko Minematsu
2016
conf/host
Round gating for low energy block ciphers.
Subhadeep Banik
Andrey Bogdanov
Francesco Regazzoni
Takanori Isobe
Harunaga Hiwatari
Toru Akishita
2016
conf/asiacrypt
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness.
Andrey Bogdanov
Takanori Isobe
Elmar Tischhauser
2016
conf/sacrypt
Hold Your Breath, PRIMATEs Are Lightweight.
Danilo Sijacic
Andreas B. Kidmose
Bohan Yang
Subhadeep Banik
Begül Bilgin
Andrey Bogdanov
Ingrid Verbauwhede
2015
conf/fse
Comb to Pipeline: Fast Software Encryption Revisited.
Andrey Bogdanov
Martin M. Lauridsen
Elmar Tischhauser
2015
conf/ccs
White-Box Cryptography Revisited: Space-Hard Ciphers.
Andrey Bogdanov
Takanori Isobe
2015
conf/eurocrypt
Twisted Polynomials and Forgery Attacks on GCM.
Mohamed Ahmed Abdelraheem
Peter Beelen
Andrey Bogdanov
Elmar Tischhauser
2015
conf/asiacrypt
Midori: A Block Cipher for Low Energy.
Subhadeep Banik
Andrey Bogdanov
Takanori Isobe
Kyoji Shibutani
Harunaga Hiwatari
Toru Akishita
Francesco Regazzoni
2015
conf/asiacrypt
How Secure is AES Under Leakage.
Andrey Bogdanov
Takanori Isobe
2015
conf/sacrypt
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks.
Andrey Bogdanov
Ilya Kizhvatov
Kamran Manzoor
Elmar Tischhauser
Marc Witteman
2015
conf/sacrypt
Exploring Energy Efficiency of Lightweight Block Ciphers.
Subhadeep Banik
Andrey Bogdanov
Francesco Regazzoni
2014
conf/fse
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
Elena Andreeva
Begül Bilgin
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2014
conf/latincrypt
Key Recovery Attacks on Recent Authenticated Ciphers.
Andrey Bogdanov
Christoph Dobraunig
Maria Eichlseder
Martin M. Lauridsen
Florian Mendel
Martin Schläffer
Elmar Tischhauser
2014
conf/acisp
Route 66: Passively Breaking All GSM Channels.
Philip S. Vejre
Andrey Bogdanov
2014
conf/acns
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers.
Céline Blondeau
Andrey Bogdanov
Meiqin Wang
2014
conf/icisc
Bicliques with Minimal Data and Time Complexity for AES.
Andrey Bogdanov
Donghoon Chang
Mohona Ghosh
Somitra Kumar Sanadhya
2014
conf/asiacrypt
How to Securely Release Unverified Plaintext in Authenticated Encryption.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2014
conf/africacrypt
Multidimensional Zero-Correlation Linear Cryptanalysis of E2.
Long Wen
Meiqin Wang
Andrey Bogdanov
2013
conf/fse
Towards Understanding the Known-Key Security of Block Ciphers.
Elena Andreeva
Andrey Bogdanov
Bart Mennink
2013
conf/fse
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.
Andrey Bogdanov
Elmar Tischhauser
2013
conf/fse
ALE: AES-Based Lightweight Authenticated Encryption.
Andrey Bogdanov
Florian Mendel
Francesco Regazzoni
Vincent Rijmen
Elmar Tischhauser
2013
conf/crypto
On the Indifferentiability of Key-Alternating Ciphers.
Elena Andreeva
Andrey Bogdanov
Yevgeniy Dodis
Bart Mennink
John P. Steinberger
2013
conf/crypto
Bounds in Shallows and in Miseries.
Céline Blondeau
Andrey Bogdanov
Gregor Leander
2013
conf/ches
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
Begül Bilgin
Andrey Bogdanov
Miroslav Knezevic
Florian Mendel
Qingju Wang
2013
conf/asiacrypt
Parallelizable and Authenticated Online Ciphers.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Elmar Tischhauser
Kan Yasuda
2013
conf/asiacrypt
Key Difference Invariant Bias in Block Ciphers.
Andrey Bogdanov
Christina Boura
Vincent Rijmen
Meiqin Wang
Long Wen
Jingyuan Zhao
2013
conf/sacrypt
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.
Andrey Bogdanov
Huizheng Geng
Meiqin Wang
Long Wen
Baudoin Collard
2012
conf/fse
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity.
Andrey Bogdanov
Meiqin Wang
2012
conf/icisc
Improved Impossible Differential Attacks on Large-Block Rijndael.
Qingju Wang
Dawu Gu
Vincent Rijmen
Ya Liu
Jiazhe Chen
Andrey Bogdanov
2012
conf/eurocrypt
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
François-Xavier Standaert
John P. Steinberger
Elmar Tischhauser
2012
conf/asiacrypt
Integral and Multidimensional Linear Distinguishers with Correlation Zero.
Andrey Bogdanov
Gregor Leander
Kaisa Nyberg
Meiqin Wang
2011
conf/acisp
Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract.
Andrey Bogdanov
Kyoji Shibutani
2011
conf/ches
spongent: A Lightweight Hash Function.
Andrey Bogdanov
Miroslav Knezevic
Gregor Leander
Deniz Toz
Kerem Varici
Ingrid Verbauwhede
2011
conf/asiacrypt
Biclique Cryptanalysis of the Full AES.
Andrey Bogdanov
Dmitry Khovratovich
Christian Rechberger
2010
conf/ctrsa
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.
Andrey Bogdanov
Thomas Eisenbarth
Christof Paar
Malte Wienecke
2010
conf/sacrypt
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN.
Andrey Bogdanov
Christian Rechberger
2008
conf/ches
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Andrey Bogdanov
Thomas Eisenbarth
Andy Rupp
Christopher Wolf
2008
conf/ches
Multiple-Differential Side-Channel Collision Attacks on AES.
Andrey Bogdanov
2008
conf/ches
Hash Functions and RFID Tags: Mind the Gap.
Andrey Bogdanov
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
2007
conf/ches
Collision Attacks on AES-Based MAC: Alpha-MAC.
Alex Biryukov
Andrey Bogdanov
Dmitry Khovratovich
Timo Kasper
2007
conf/ches
PRESENT: An Ultra-Lightweight Block Cipher.
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
C. Vikkelsoe
2007
conf/ches
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations.
Andrey Bogdanov
Thomas Eisenbarth
Andy Rupp
2007
conf/sacrypt
Improved Side-Channel Collision Attacks on AES.
Andrey Bogdanov
Coauthors
Alex Biryukov
(1)
Alexandres Andreou
(1)
Andreas B. Kidmose
(1)
Andrey Bogdanov
(54)
Andy Rupp
(2)
Atul Luykx
(5)
Axel Poschmann
(2)
Bart Mennink
(6)
Baudoin Collard
(1)
Begül Bilgin
(3)
Bohan Yang
(1)
C. Vikkelsoe
(1)
Céline Blondeau
(2)
Christian Rechberger
(2)
Christina Boura
(1)
Christof Paar
(3)
Christoph Dobraunig
(1)
Christopher Wolf
(1)
Danilo Sijacic
(1)
Dawu Gu
(1)
Deniz Toz
(1)
Dmitry Khovratovich
(2)
Donghoon Chang
(1)
Elena Andreeva
(6)
Elmar Tischhauser
(13)
Florian Mendel
(3)
Francesco Regazzoni
(7)
François-Xavier Standaert
(1)
Frederik Armknecht
(1)
Gregor Leander
(6)
Harunaga Hiwatari
(3)
Hiroyasu Kubo
(1)
Huaifeng Chen
(1)
Huizheng Geng
(1)
Ilya Kizhvatov
(1)
Ingrid Verbauwhede
(2)
Jiazhe Chen
(1)
Jingyuan Zhao
(1)
John P. Steinberger
(2)
Kaisa Nyberg
(1)
Kamran Manzoor
(1)
Kan Yasuda
(4)
Kazuhiko Minematsu
(2)
Kerem Varici
(1)
Kosei Sakamoto
(1)
Kyoji Shibutani
(2)
Lars R. Knudsen
(2)
Ling Sun
(1)
Long Wen
(4)
Maki Shigeri
(1)
Malte Wienecke
(1)
Marc Witteman
(1)
Maria Eichlseder
(1)
Martin Bjerregaard Jepsen
(1)
Martin M. Lauridsen
(2)
Martin Schläffer
(1)
Matthew J. B. Robshaw
(2)
Meiqin Wang
(7)
Miroslav Knezevic
(2)
Mohamed Ahmed Abdelraheem
(1)
Mohona Ghosh
(1)
Mridul Nandi
(1)
Nao Shibata
(1)
Nicky Mouha
(2)
Nilanjan Datta
(1)
Peter Beelen
(1)
Philip S. Vejre
(3)
Qingju Wang
(2)
Somitra Kumar Sanadhya
(1)
Subhadeep Banik
(10)
Sumio Morioka
(1)
Takanori Isobe
(9)
Thomas Eisenbarth
(3)
Timo Kasper
(1)
Tingting Cui
(1)
Toru Akishita
(3)
Vasily Mikhalev
(1)
Vincent Rijmen
(3)
Willi Meier
(1)
Ya Liu
(1)
Yannick Seurin
(2)
Yevgeniy Dodis
(1)
Yuhei Watanabe
(1)
Yuki Funabiki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to