


default search action
Andrey Bogdanov
Person information
- affiliation: Ruhr University Bochum, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Elena Andreeva
, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda:
The COLM Authenticated Encryption Scheme. J. Cryptol. 37(2): 15 (2024) - 2020
- [j20]Stefan Kölbl, Elmar Tischhauser
, Patrick Derbez
, Andrey Bogdanov
:
Troika: a ternary cryptographic hash function. Des. Codes Cryptogr. 88(1): 91-117 (2020) - [j19]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov
, Sumio Morioka
, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020)
2010 – 2019
- 2019
- [j18]Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
:
Compact circuits for combined AES encryption/decryption. J. Cryptogr. Eng. 9(1): 69-83 (2019) - [c63]Andrey Bogdanov
, Matthieu Rivain, Philip S. Vejre, Junwei Wang:
Higher-Order DCA against Standard Side-Channel Countermeasures. COSADE 2019: 118-141 - [c62]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov
, Sumio Morioka
, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145 - 2018
- [j17]Andrey Bogdanov
, Elmar Tischhauser
, Philip S. Vejre:
Multivariate Profiling of Hulls for Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2018(1): 101-125 (2018) - [j16]Subhadeep Banik
, Vasily Mikhalev, Frederik Armknecht
, Takanori Isobe, Willi Meier, Andrey Bogdanov
, Yuhei Watanabe
, Francesco Regazzoni
:
Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol. 2018(2): 1-19 (2018) - [j15]Subhadeep Banik
, Andrey Bogdanov
, Atul Luykx, Elmar Tischhauser
:
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. IACR Trans. Symmetric Cryptol. 2018(3): 1-35 (2018) - [c61]Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
, Takanori Isobe, Harunaga Hiwatari, Toru Akishita:
Inverse gating for low energy encryption. HOST 2018: 173-176 - [i33]Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang:
Higher-Order DCA against Standard Side-Channel Countermeasures. IACR Cryptol. ePrint Arch. 2018: 869 (2018) - 2017
- [j14]Subhadeep Banik
, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. IACR Trans. Symmetric Cryptol. 2017(1): 307-328 (2017) - [c60]Andrey Bogdanov
, Philip S. Vejre:
Linear Cryptanalysis of DES with Asymmetries. ASIACRYPT (1) 2017: 187-216 - [c59]Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
:
Efficient configurations for block ciphers with unified ENC/DEC paths. HOST 2017: 41-46 - [c58]Alexandres Andreou, Andrey Bogdanov
, Elmar Tischhauser
:
Cache timing attacks on recent microarchitectures. HOST 2017: 155 - [e2]Andrey Bogdanov:
Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10098, Springer 2017, ISBN 978-3-319-55713-7 [contents] - [i32]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. IACR Cryptol. ePrint Arch. 2017: 183 (2017) - [i31]Andrey Bogdanov, Philip S. Vejre:
Linear Cryptanalysis of DES with Asymmetries. IACR Cryptol. ePrint Arch. 2017: 895 (2017) - 2016
- [c57]Andrey Bogdanov
, Takanori Isobe, Elmar Tischhauser
:
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness. ASIACRYPT (1) 2016: 126-158 - [c56]Subhadeep Banik
, Andrey Bogdanov
, Tiziana Fanni
, Carlo Sau
, Luigi Raffo
, Francesca Palumbo
, Francesco Regazzoni
:
Adaptable AES implementation with power-gating support. Conf. Computing Frontiers 2016: 331-334 - [c55]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. FSE 2016: 399-415 - [c54]Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
, Takanori Isobe, Harunaga Hiwatari, Toru Akishita:
Round gating for low energy block ciphers. HOST 2016: 55-60 - [c53]Subhadeep Banik
, Andrey Bogdanov
, Kazuhiko Minematsu:
Low-area hardware implementations of CLOC, SILC and AES-OTR. HOST 2016: 71-74 - [c52]Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
:
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. INDOCRYPT 2016: 173-190 - [c51]Danilo Sijacic, Andreas B. Kidmose
, Bohan Yang, Subhadeep Banik
, Begül Bilgin, Andrey Bogdanov, Ingrid Verbauwhede
:
Hold Your Breath, PRIMATEs Are Lightweight. SAC 2016: 197-216 - [i30]Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:
Comb to Pipeline: Fast Software Encryption Revisited. IACR Cryptol. ePrint Arch. 2016: 47 (2016) - [i29]Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. IACR Cryptol. ePrint Arch. 2016: 178 (2016) - [i28]Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre:
Multivariate Linear Cryptanalysis: The Past and Future of PRESENT. IACR Cryptol. ePrint Arch. 2016: 667 (2016) - [i27]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. IACR Cryptol. ePrint Arch. 2016: 927 (2016) - [i26]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES v 2.0. IACR Cryptol. ePrint Arch. 2016: 1005 (2016) - 2015
- [c50]Andrey Bogdanov, Takanori Isobe:
How Secure is AES Under Leakage. ASIACRYPT (2) 2015: 361-385 - [c49]Subhadeep Banik
, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
:
Midori: A Block Cipher for Low Energy. ASIACRYPT (2) 2015: 411-436 - [c48]Andrey Bogdanov, Takanori Isobe:
White-Box Cryptography Revisited: Space-Hard Ciphers. CCS 2015: 1058-1069 - [c47]Mohamed Ahmed Abdelraheem, Peter Beelen
, Andrey Bogdanov
, Elmar Tischhauser
:
Twisted Polynomials and Forgery Attacks on GCM. EUROCRYPT (1) 2015: 762-786 - [c46]Andrey Bogdanov
, Martin M. Lauridsen, Elmar Tischhauser
:
Comb to Pipeline: Fast Software Encryption Revisited. FSE 2015: 150-171 - [c45]Subhadeep Banik
, Andrey Bogdanov
:
Cryptanalysis of Two Fault Countermeasure Schemes. INDOCRYPT 2015: 241-252 - [c44]Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
:
Exploring the energy consumption of lightweight blockciphers in FPGA. ReConFig 2015: 1-6 - [c43]Subhadeep Banik
, Andrey Bogdanov
, Francesco Regazzoni
:
Exploring Energy Efficiency of Lightweight Block Ciphers. SAC 2015: 178-194 - [c42]Andrey Bogdanov
, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser
, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. SAC 2015: 310-327 - [i25]Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 222 (2015) - [i24]Begül Bilgin
, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. IACR Cryptol. ePrint Arch. 2015: 424 (2015) - [i23]Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman:
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 795 (2015) - [i22]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Exploring Energy Efficiency of Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 847 (2015) - [i21]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni:
Midori: A Block Cipher for Low Energy (Extended Version). IACR Cryptol. ePrint Arch. 2015: 1142 (2015) - [i20]Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser:
Twisted Polynomials and Forgery Attacks on GCM. IACR Cryptol. ePrint Arch. 2015: 1224 (2015) - 2014
- [j13]Andrey Bogdanov, Vincent Rijmen
:
Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70(3): 369-383 (2014) - [j12]Kyoji Shibutani, Andrey Bogdanov:
Towards the optimality of Feistel ciphers with substitution-permutation functions. Des. Codes Cryptogr. 73(2): 667-682 (2014) - [j11]Long Wen, Meiqin Wang, Andrey Bogdanov
, Huaifeng Chen:
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard. Inf. Process. Lett. 114(6): 322-330 (2014) - [j10]Andrey Bogdanov
, Elif Bilge Kavun
, Elmar Tischhauser
, Tolga Yalçin
:
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis. J. Comput. Appl. Math. 259: 592-598 (2014) - [c41]Philip S. Vejre, Andrey Bogdanov
:
Route 66: Passively Breaking All GSM Channels. ACISP 2014: 422-429 - [c40]Céline Blondeau, Andrey Bogdanov
, Meiqin Wang:
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. ACNS 2014: 271-288 - [c39]Long Wen, Meiqin Wang, Andrey Bogdanov:
Multidimensional Zero-Correlation Linear Cryptanalysis of E2. AFRICACRYPT 2014: 147-164 - [c38]Elena Andreeva
, Andrey Bogdanov
, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. ASIACRYPT (1) 2014: 105-125 - [c37]Elena Andreeva
, Begül Bilgin, Andrey Bogdanov
, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. FSE 2014: 168-186 - [c36]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
:
Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014: 160-174 - [c35]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. INDOCRYPT 2014: 161-176 - [c34]Cesare Alippi, Andrey Bogdanov
, Francesco Regazzoni
:
Lightweight cryptography for constrained devices. ISIC 2014: 144-147 - [c33]Andrey Bogdanov, Christoph Dobraunig
, Maria Eichlseder
, Martin M. Lauridsen, Florian Mendel
, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014: 274-287 - [i19]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. IACR Cryptol. ePrint Arch. 2014: 144 (2014) - [i18]Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software. IACR Cryptol. ePrint Arch. 2014: 186 (2014) - [i17]Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser:
Weak-Key Analysis of POET. IACR Cryptol. ePrint Arch. 2014: 226 (2014) - [i16]Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Note of Multidimensional MITM Attack on 25-Round TWINE-128. IACR Cryptol. ePrint Arch. 2014: 425 (2014) - [i15]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Bicliques with Minimal Data and Time Complexity for AES (Extended Version). IACR Cryptol. ePrint Arch. 2014: 932 (2014) - 2013
- [j9]Andrey Bogdanov
, Kyoji Shibutani:
Generalized Feistel networks revisited. Des. Codes Cryptogr. 66(1-3): 75-97 (2013) - [j8]Andrey Bogdanov
, Miroslav Knezevic, Gregor Leander
, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IEEE Trans. Computers 62(10): 2041-2053 (2013) - [c32]Andrey Bogdanov, Christina Boura, Vincent Rijmen
, Meiqin Wang, Long Wen, Jingyuan Zhao:
Key Difference Invariant Bias in Block Ciphers. ASIACRYPT (1) 2013: 357-376 - [c31]Elena Andreeva
, Andrey Bogdanov
, Atul Luykx, Bart Mennink, Elmar Tischhauser
, Kan Yasuda:
Parallelizable and Authenticated Online Ciphers. ASIACRYPT (1) 2013: 424-443 - [c30]Begül Bilgin, Andrey Bogdanov
, Miroslav Knezevic, Florian Mendel
, Qingju Wang
:
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES 2013: 142-158 - [c29]Céline Blondeau, Andrey Bogdanov, Gregor Leander
:
Bounds in Shallows and in Miseries. CRYPTO (1) 2013: 204-221 - [c28]Elena Andreeva
, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. CRYPTO (1) 2013: 531-550 - [c27]Andrey Bogdanov
, Elmar Tischhauser:
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. FSE 2013: 19-38 - [c26]Elena Andreeva
, Andrey Bogdanov
, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. FSE 2013: 348-366 - [c25]Andrey Bogdanov
, Florian Mendel
, Francesco Regazzoni
, Vincent Rijmen
, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. FSE 2013: 447-466 - [c24]Andrey Bogdanov
, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard:
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. Selected Areas in Cryptography 2013: 306-323 - [i14]Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. IACR Cryptol. ePrint Arch. 2013: 61 (2013) - [i13]Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. IACR Cryptol. ePrint Arch. 2013: 482 (2013) - [i12]Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda:
Parallelizable and Authenticated Online Ciphers. IACR Cryptol. ePrint Arch. 2013: 790 (2013) - [i11]Elena Andreeva, Begül Bilgin
, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2013: 791 (2013) - 2012
- [j7]Elena Andreeva
, Andrey Bogdanov
, Bart Mennink, Bart Preneel
, Christian Rechberger:
On security arguments of the second round SHA-3 candidates. Int. J. Inf. Sec. 11(2): 103-120 (2012) - [j6]Qingju Wang
, Andrey Bogdanov
:
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers. Inf. Process. Lett. 112(11): 427-432 (2012) - [j5]Andrey Bogdanov
, Ilya Kizhvatov:
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. IEEE Trans. Computers 61(8): 1153-1164 (2012) - [c23]Andrey Bogdanov, Gregor Leander
, Kaisa Nyberg
, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. ASIACRYPT 2012: 244-261 - [c22]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander
, François-Xavier Standaert
, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). EUROCRYPT 2012: 45-62 - [c21]Andrey Bogdanov
, Meiqin Wang:
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. FSE 2012: 29-48 - [c20]Qingju Wang
, Dawu Gu, Vincent Rijmen
, Ya Liu, Jiazhe Chen
, Andrey Bogdanov
:
Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140 - [c19]Andrey Bogdanov
, Elif Bilge Kavun
, Elmar Tischhauser, Tolga Yalçin
:
Efficient reconfigurable hardware architecture for accurately computing success probability and data complexity of linear attacks. ReConFig 2012: 1-6 - [c18]Andrey Bogdanov
, Amir Moradi
, Tolga Yalçin
:
Efficient and side-channel resistant authenticated encryption of FPGA bitstreams. ReConFig 2012: 1-6 - [e1]Andrey Bogdanov, Somitra Kumar Sanadhya:
Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7644, Springer 2012, ISBN 978-3-642-34415-2 [contents] - [i10]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. IACR Cryptol. ePrint Arch. 2012: 35 (2012) - [i9]Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On Security Arguments of the Second Round SHA-3 Candidates. IACR Cryptol. ePrint Arch. 2012: 147 (2012) - 2011
- [j4]Andrey Bogdanov:
On unbalanced Feistel networks with contracting MDS diffusion. Des. Codes Cryptogr. 59(1-3): 35-58 (2011) - [j3]Andy Rupp
, Thomas Eisenbarth
, Andrey Bogdanov, Oliver Grieb:
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications. Integr. 44(4): 290-304 (2011) - [j2]Andrey Bogdanov
, Kyoji Shibutani:
Analysis of 3-line generalized Feistel networks with double SD-functions. Inf. Process. Lett. 111(13): 656-660 (2011) - [c17]Andrey Bogdanov, Kyoji Shibutani:
Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. ACISP 2011: 106-119 - [c16]Andrey Bogdanov
, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. ASIACRYPT 2011: 344-371 - [c15]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander
, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
:
spongent: A Lightweight Hash Function. CHES 2011: 312-325 - [i8]Andrey Bogdanov, Vincent Rijmen:
Zero-Correlation Linear Cryptanalysis of Block Ciphers. IACR Cryptol. ePrint Arch. 2011: 123 (2011) - [i7]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. IACR Cryptol. ePrint Arch. 2011: 449 (2011) - [i6]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IACR Cryptol. ePrint Arch. 2011: 697 (2011) - 2010
- [b1]Andrey Bogdanov:
Analysis and design of block cipher constructions. Ruhr University Bochum, 2010, ISBN 978-3-89966-354-9, pp. 1-201 - [j1]Andrey Bogdanov
:
On the differential and linear efficiency of balanced Feistel networks. Inf. Process. Lett. 110(20): 861-866 (2010) - [c14]Andrey Bogdanov
, Thomas Eisenbarth
, Christof Paar, Malte Wienecke:
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. CT-RSA 2010: 235-251 - [c13]Andrey Bogdanov
, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. Selected Areas in Cryptography 2010: 229-240 - [i5]Andrey Bogdanov, Christian Rechberger:
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. IACR Cryptol. ePrint Arch. 2010: 532 (2010) - [i4]Andrey Bogdanov, Ilya Kizhvatov:
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. IACR Cryptol. ePrint Arch. 2010: 590 (2010)
2000 – 2009
- 2008
- [c12]Sundar Balasubramanian, Harold W. Carter, Andrey Bogdanov, Andy Rupp
, Jintai Ding:
Fast multivariate signature generation in hardware: The case of rainbow. ASAP 2008: 25-30 - [c11]Andrey Bogdanov:
Multiple-Differential Side-Channel Collision Attacks on AES. CHES 2008: 30-44 - [c10]Andrey Bogdanov
, Thomas Eisenbarth
, Andy Rupp, Christopher Wolf:
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. CHES 2008: 45-61 - [c9]Andrey Bogdanov
, Gregor Leander
, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin:
Hash Functions and RFID Tags: Mind the Gap. CHES 2008: 283-299 - [c8]Sundar Balasubramanian, Andrey Bogdanov
, Andy Rupp
, Jintai Ding, Harold W. Carter:
Fast Multivariate Signature Generation in Hardware: The Case of Rainbow. FCCM 2008: 281-282 - [c7]Andrey Bogdanov
, Ilya Kizhvatov, Andrei Pyshkin:
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. INDOCRYPT 2008: 251-265 - [i3]Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
, Christopher Wolf:
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? IACR Cryptol. ePrint Arch. 2008: 349 (2008) - 2007
- [c6]Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper:
Collision Attacks on AES-Based MAC: Alpha-MAC. CHES 2007: 166-180 - [c5]Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp:
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. CHES 2007: 394-412 - [c4]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander
, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 - [c3]Andrey Bogdanov:
Linear Slide Attacks on the KeeLoq Block Cipher. Inscrypt 2007: 66-80 - [c2]Andrey Bogdanov:
Improved Side-Channel Collision Attacks on AES. Selected Areas in Cryptography 2007: 84-95 - [i2]Andrey Bogdanov:
Cryptanalysis of the KeeLoq block cipher. IACR Cryptol. ePrint Arch. 2007: 55 (2007) - [i1]Andrey Bogdanov, Andrei Pyshkin:
Algebraic Side-Channel Collision Attacks on AES. IACR Cryptol. ePrint Arch. 2007: 477 (2007) - 2006
- [c1]Andrey Bogdanov, M. C. Mertens, Christof Paar, Jan Pelzl, Andy Rupp
:
A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). FCCM 2006: 237-248
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-13 00:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint