Publications

Publikationer rss feed

2019
 

The application of Software Defined Networking on securing computer networks

Sahay, Rishikesh ; Meng, Weizhi ; Jensen, Christian D.
in: Journal of Network and Computer Applications, vol: 131, pages: 89-108

Type: Review (Peer reviewed)

Status: Published     |    Year: 2019     |    DOI: https://doi.org/10.1016/j.jnca.2019.01.019

  PDF

Encryption device, encryption method, decryption device, and decryption method

五十部 孝典, Takanori (Inventor) ; ボグダノフ アンドレイ, Andrey
Patent no.: WO2019031026, Date:

Type: Patent

Status: Published     |    Year: 2019

  PDF

Encryption device, encryption method, decryption device, and decryption method

五十部 孝典, Takanori (Inventor) ; 樋渡 玄良, Harunaga (Inventor) ; ボグダノフ アンドレイ, Andrey
Patent no.: WO2019031025, Date: 2018-05-28

Type: Patent

Status: Published     |    Year: 2019

 

Finding Integral Distinguishers with Ease

Eskandari, Zahra ; Kidmose, Andreas Brasen ; Kölbl, Stefan ; Tiessen, Tyge
part of: Selected Areas in Cryptography – SAC 2018 , pages: 115-138, 2019, Springer
Presented at:
25th International Conference on Selected Areas in Cryptography, SAC 2018

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2019     |    DOI: https://doi.org/10.1007/978-3-030-10970-7_6

 

Higher-Order DCA against Standard Side-Channel Countermeasures

Bogdanov, Andrey ; Rivain, Matthieu ; Vejre, Philip S. ; Wang, Junwei
part of: Constructive Side-Channel Analysis and Secure Design - Proceedings of 10th International Workshop, pages: 118-141, 2019, Springer
Presented at:
10th International Workshop on Constructive Side-Channel Analysis and Secure Design

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2019     |    DOI: https://doi.org/10.1007/978-3-030-16350-1_8

 

Compact circuits for combined AES encryption/decryption

Banik, Subhadeep ; Bogdanov, Andrey ; Regazzoni, Francesco
in: Journal of Cryptographic Engineering, vol: 9, issue: 1, pages: 69-83

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2019     |    DOI: https://doi.org/10.1007/s13389-017-0176-3

 

Investigation of effective media applicability for ultrathin multilayer structures

Sukham, Johneph ; Takayama, Osamu ; Mahmoodi, Maryam ; Sychev, Stanislav ; Bogdanov, Andrey ; Tavassoli, Seyed Hassan ; Lavrinenko, Andrei V ; Malureanu, Radu
in: Nanoscale, vol: 11, issue: 26, pages: 12582-12588

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2019     |    DOI: https://doi.org/10.1039/c9nr02471a

 

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

Ankele, Ralph ; Kölbl, Stefan ; Cid, Carlos ; Jacobson, Michael J. (Editor)
part of: Selected Areas in Cryptography – SAC 2018, pages: 163-190, 2019, Springer
Presented at:
SAC 2018: Selected Areas in Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2019     |    DOI: https://doi.org/10.1007/978-3-030-10970-7_8

2018
  PDF

Cryptanalysis of low-data instances of full LowMCv2

Rechberger, Christian ; Soleimany, Hadi ; Tiessen, Tyge
in: Iacr Transactions on Symmetric Cryptology, vol: 2018, issue: 3, pages: 163-181

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.13154/tosc.v2018.i3.163-181

 

Near-Field Observation of Guided-Mode Resonances on a Metasurface via Dielectric Nanosphere Excitation

Walla, Frederik ; Bürkle, Florian ; Sinev, Ivan ; Wiecha, Matthias M. ; Mecklenbeck, Nicolas ; Ladutenko, Konstantin ; Malureanu, Radu ; Komissarenko, Filipp ; Lavrinenko, Andrei ; Bogdanov, Andrey ; Soltani, Amin ; Roskos, Hartmut G.
in: ACS Photonics, vol: 5, issue: 11, pages: 4238-4243

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1021/acsphotonics.8b00900

  PDF

SUNDAE

Banik, Subhadeep ; Bogdanov, Andrey ; Luykx, Atul ; Tischhauser, Elmar
in: Iacr Transactions on Symmetric Cryptology, vol: 2018, issue: 3, pages: 1-35

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.13154/tosc.v2018.i3.1-35

  PDF

Towards low energy stream ciphers

Banik, Subhadeep ; Mikhalev, Vasily ; Armknecht, Frederik ; Isobe, Takanori ; Meier, Willi ; Bogdanov, Andrey ; Watanabe, Yuhei ; Regazzoni, Francesco
in: Iacr Transactions on Symmetric Cryptology, vol: 2018, issue: 2, pages: 1-19

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.13154/tosc.v2018.i2.1-19

  PDF

2π steering of surface plasmon polaritons with silicon nanoantennas

Sinev, Ivan ; Bogdanov, Andrey ; Komissarenko, Filipp ; Mukhin, Ivan ; Samusev, Anton ; Iorsh, Ivan ; Lavrinenko, Andrei
in: Journal of Physics: Conference Series, vol: 1092, issue: 1
Presented at:
International Conference on Metamaterials and Nanophotonics

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1088/1742-6596/1092/1/012140

 

Analyzing the communication security between smartphones and IoT based on CORAS

Bhuyan, Motalib Hossain ; Azad, Nur A. ; Meng, Weizhi ; Jensen, Christian D.
part of: Proceedings of 12th International Conference on Network and System Security, pages: 251-265, 2019, Springer
Presented at:
12th International Conference on Network and System Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1007/978-3-030-02744-5_19

 

CodeTrust

Jensen, Christian ; Nielsen, Michael Bøndergaard
part of: Trust Management XII , pages: 58-74, 2018, Springer
Presented at:
12th IFIP WG 11.11 International Conference on Trust Management

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1007/978-3-319-95276-5_5

  PDF

Correlations Aplenty - Linear Cryptanalysis of Block Ciphers

Vejre, Philip Søgaard

Type: Ph.D. thesis

Status: Published     |    Year: 2018

 

CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems

Sahay, Rishikesh ; Sepúlveda Estay, Daniel Alberto ; Meng, Weizhi ; Jensen, Christian D. ; Barfod, Michael Bruhn
part of: International Conference on Science of Cyber Security, pages: 191-198, 2018, Springer
Presented at:
1st International Conference on Science of Cyber Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1007/978-3-030-03026-1_14

  PDF

Direct imaging of isofrequency contours in all-dielectric optical metasurface

Dmitry, Pidgayko ; Sinev, Ivan ; Permyakov, Dmitry ; Samusev, Anton ; Sychev, Stanislav ; Bogdanov, Andrey ; Lavrinenko, Andrey ; Rutckaia, Viktoriia ; Schilling, Joerg
in: Journal of Physics: Conference Series, vol: 1092, issue: 1
Presented at:
International Conference on Metamaterials and Nanophotonics

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1088/1742-6596/1092/1/012116

  PDF

Generating graphs packed with paths: Estimation of linear approximations and differentials

Hall-Andersen, Mathias ; Vejre, Philip Søgaard
in: Iacr Transactions on Symmetric Cryptology, vol: 2018, issue: 3, pages: 265-289

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.13154/tosc.v2018.i3.265-289

 

Inverse Gating for Low Energy Encryption

Banik, Subhadeep ; Bogdanov, Andrey ; Regazzoni, Francesco ; Isobe, Takanori ; Hiwatari, Harunaga ; Akishita, Toru
part of: Proceedings of 2018 Ieee International Symposium on Hardware Oriented Security and Trust (host). , pages: 173-176, 2018, IEEE
Presented at:
2018 Ieee International Symposium on Hardware Oriented Security and Trust

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1109/HST.2018.8383909

  PDF

Multivariate profiling of hulls for linear cryptanalysis

Bogdanov, Andrey ; Tischhauser, Elmar Wolfgang ; Vejre, Philip Søgaard
in: Iacr Transactions on Symmetric Cryptology, vol: 2018, issue: 1, pages: 101-125

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.13154/tosc.v2018.i1.101-125

  PDF

Plasmonic anisotropic metasurfaces: from far-field measurements to near-field properties

Yermakov, Oleh Y. ; Permyakov, Dmitry V. ; Dmitriev, Pavel A. ; Samusev, Anton K. ; Iorsh, Ivan V. ; Lavrinenko, Andrei V. ; Bogdanov, Andrey A. ; Zayats, Anatoly V.
part of: Proceedings of Spie , 2018, SPIE - International Society for Optical Engineering

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1117/12.2306801

 

Putting Wings on SPHINCS

Kölbl, Stefan
part of: Post-quantum Cryptography, pages: 205-226, 2018, Springer
Presented at:
9th International Workshop on Post-Quantum Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1007/978-3-319-79063-3_10

  PDF

When Intrusion Detection Meets Blockchain Technology: A Review

Meng, Weizhi ; Tischhauser, Elmar Wolfgang ; Wang, Qingju ; Wang, Yu ; Han, Jinguang
in: IEEE Access, vol: 6, pages: 10179 - 10188

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1109/ACCESS.2018.2799854

  PDF

Zero-Sum Partitions of PHOTON Permutations

Wang, Qingju ; Grassi, Lorenzo ; Rechberger, Christian
part of: Topics in Cryptology – CT-RSA 2018, pages: 279-299, 2018, Springer
Presented at:
RSA Conference 2018

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2018     |    DOI: https://doi.org/10.1007/978-3-319-76953-0_15

2017
  PDF

A brief comparison of Simon and Simeck

Kölbl, Stefan ; Roy, Arnab
in: Lecture Notes in Computer Science, vol: 10098, pages: 69-88
Presented at:
Lightweight Cryptography for Security and Privacy

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1007/978-3-319-55714-4_6

  PDF

A New Structural-Differential Property of 5-Round AES

Grassi, Lorenzo ; Rechberger, Christian ; Ronjom, Sondre
in: Lecture Notes in Computer Science, vol: 10211, pages: 289-317

Type: Conference article (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1007/978-3-319-56614-6_10

 

Cache timing attacks on recent microarchitectures

Andreou, Alexandres ; Bogdanov, Andrey ; Tischhauser, Elmar Wolfgang
part of: Proceedings of 2017 IEEE International Symposium on Hardware Oriented Security and Trust, pages: 155-155, 2017, IEEE
Presented at:
2017 IEEE International Symposium on Hardware Oriented Security and Trust

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/HST.2017.7951819

  PDF

Design and analysis of cryptographic algorithms

Kölbl, Stefan

Type: Ph.D. thesis

Status: Published     |    Year: 2017

 

Efficient configurations for block ciphers with unified ENC/DEC paths

Banik, Subhadeep ; Bogdanov, Andrey ; Regazzoni, Francesco
part of: Proceedings of 2017 IEEE International Symposium on Hardware Oriented Security and Trust, pages: 41-46, 2017, IEEE
Presented at:
2017 IEEE International Symposium on Hardware Oriented Security and Trust

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1109/HST.2017.7951795

  PDF

Encryption device, encryption method, decryption device, and decryption method

Isobe, Takanori (Inventor) ; Bogdanov, Andrey
Patent no.: US2017294148 , Date: 2017-10-12

Type: Patent

Status: Published     |    Year: 2017

 

From Higher-Order Differentials to Polytopic Cryptyanalysis

Tiessen, Tyge
part of: Paradigms in Cryptology , pages: 544-552, 2017, Springer
Presented at:
The International Conference on Cryptology & Malicious Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1007/978-3-319-61273-7_29

  PDF

Linear Cryptanalysis of DES with Asymmetries

Bogdanov, Andrey ; Vejre, Philip Søgaard
part of: ASIACRYPT 2017: Advances in Cryptology – ASIACRYPT 2017, pages: 187-216, 2018, Springer
Presented at:
23rd International Conference on the Theory and Applications of Cryptology and Information Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1007/978-3-319-70694-8_7

 

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, Melissa ; Derler, David ; Goldfeder, Steven ; Orlandi, Claudio ; Ramacher, Sebastian ; Rechberger, Christian ; Slamanig, Daniel ; Zaverucha, Greg
part of: CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages: 1825-1842, 2018, Association for Computing Machinery
Presented at:
2017 ACM SIGSAC Conference on Computer and Communications Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1145/3133956.3133997

  PDF

Reflection ciphers

Boura, Christina ; Canteaut, Anne ; Knudsen, Lars Ramkilde ; Leander, Gregor
in: Designs, Codes and Cryptography, vol: 82, pages: 3-25

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2017     |    DOI: https://doi.org/10.1007/s10623-015-0143-x

  PDF

Secure Block Ciphers - Cryptanalysis and Design

Tiessen, Tyge

Type: Ph.D. thesis

Status: Published     |    Year: 2017

2016
 

Adaptable AES implementation with power-gating support

Banik, Subhadeep ; Bogdanov, Andrey ; Fanni, Tiziana ; Sau, Carlo ; Raffo, Luigi ; Palumbo, Francesca ; Regazzoni, Francesco
part of: Proceedings of the ACM International Conference on Computing Frontiers (CF '16), pages: 331-334, 2016, Association for Computing Machinery
Presented at:
ACM International Conference on Computing Frontiers (CF 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1145/2903150.2903488

  PDF

A MAC Mode for Lightweight Block Ciphers

Luykx, Atul ; Preneel, Bart ; Tischhauser, Elmar Wolfgang ; Yasuda, Kan
part of: Revised Selected Papers of the 23rd International Conference on Fast Software Encryption (FSE 2016), pages: 43-59, 2016, Springer
Presented at:
23rd International Conference on Fast Software Encryption (FSE 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-52993-5_3

 

Atomic-AES: A compact implementation of the AES encryption/decryption core

Banik, Subhadeep ; Bogdanov, Andrey ; Regazzoni, Francesco
part of: Progress in Cryptology – INDOCRYPT 2016, pages: 173-190, 2016, Springer
Presented at:
17th International Conference on Cryptology in India

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-319-49890-4_10

 

Building indifferentiable compression functions from the PGV compression functions

Gauravaram, P. ; Bagheri, Nasour ; Knudsen, Lars Ramkilde
in: Designs, Codes and Cryptography, vol: 78, issue: 2, pages: 547-581

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/s10623-014-0020-z

 

Exploring Energy Efficiency of Lightweight Block Ciphers

Banik, Subhadeep ; Bogdanov, Andrey ; Regazzoni, Francesco
part of: 22nd International Conference on Selected Areas in Cryptography (SAC 2015), pages: 178-194, 2016, Springer
Presented at:
22nd International Conference on Selected Areas in Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-319-31301-6_10

 

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Bogdanov, Andrey ; Kizhvatov, Ilya ; Manzoor, Kamran ; Tischhauser, Elmar Wolfgang ; Witteman, Marc
part of: 22nd International Conference on Selected Areas in Cryptography (SAC 2015), pages: 310-327, 2016, Springer
Presented at:
22nd International Conference on Selected Areas in Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-319-31301-6_19

 

Feasibility study of context-awareness device Comfort calculation methods and their application to comfort-based access control

Guo, Jingjing ; Jensen, Christian D. ; Ma, Jianfeng
part of: SAC '16. Proceedings of the 31st Annual ACM Symposium on Applied Computing, pages: 2202-2209, 2017, Association for Computing Machinery
Presented at:
31st Annual ACM Symposium on Applied Computing 2016

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1145/2851613.2851849

 

Identity management for e-government Libya as a case study

Elaswad, Othoman ; Jensen, Christian D.
part of: Proceedings of the 2016 Information Security for South Africa (ISSA), pages: 106-113, 2016, IEEE
Presented at:
2016 Information Security for South Africa (ISSA)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1109/ISSA.2016.7802936

  PDF

Introducing E-Government in Developing Countries Analysis of Egyptian e-Government Services

Elaswad, Othoman ; Jensen, Christian D.
part of: IST-Africa 2016 Conference Proceedings, pages: 1-13, 2016, IEEE
Presented at:
IST-Africa 2016

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1109/ISTAFRICA.2016.7530669

 

Low-area hardware implementations of CLOC, SILC and AES-OTR

Banik, Subhadeep ; Bogdanov, Andrey ; Minematsu, Kazuhiko
part of: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages: 71-74, 2016, IEEE
Presented at:
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1109/HST.2016.7495559

  PDF

MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

Albrecht, Martin ; Grassi, Lorenzo ; Rechberger, Christian ; Roy, Arnab ; Tiessen, Tyge
part of: Advances in Cryptology – ASIACRYPT 2016, pages: 191-219, 2016
Presented at:
22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-53887-6_7

  PDF

Polytopic Cryptanalysis

Tiessen, Tyge
part of: Advances in Cryptology – EUROCRYPT 2016, pages: 214-239, 2016
Presented at:
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-49890-3_9

  PDF

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE

Grassi, Lorenzo ; Rechberger, Christian
part of: Progress in Cryptology – INDOCRYPT 2016, pages: 322-342, 2016, Springer
Presented at:
17th International Conference on Cryptology in India

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-319-49890-4_18

 

Round Gating for Low Energy Block Ciphers

Banik, Subhadeep ; Bogdanov, Andrey ; Regazzoni, Francesco ; Isobe, Takanori ; Hiwatari, Harunaga ; Akishita, Toru
part of: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages: 55-60, 2016, IEEE
Presented at:
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1109/HST.2016.7495556

 

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

Beierle, Christof ; Jean, Jérémy ; Kölbl, Stefan ; Leander, Gregor ; Moradi, Amir ; Peyrin, Thomas ; Sasaki, Yu ; Sasdrich, Pascal ; Sim, Siang Meng
part of: Advances in Cryptology – CRYPTO 2016, pages: 123-153, 2016, Springer
Presented at:
36th International Cryptology Conference (CRYPTO 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-53008-5_5

 

Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness

Bogdanov, Andrey ; Isobe, Takanori ; Tischhauser, Elmar Wolfgang
part of: Advances in Cryptology – ASIACRYPT 2016 , pages: 126-158, 2017, Springer
Presented at:
22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2016     |    DOI: https://doi.org/10.1007/978-3-662-53887-6_5

2015
 

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

Beierle, Christof ; Jovanovic, Philipp ; Lauridsen, Martin Mehl ; Leander, Gregor ; Rechberger, Christian
part of: Topics in Cryptology – CT-RSA 2015, pages: 37-58, 2015, Springer
Presented at:
The RSA Conference Cryptographers' Track (CT-RSA 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-16715-2_3

 

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography

Andreeva, Elena ; Bilgin, Begül ; Bogdanov, Andrey ; Luykx, Atul ; Mennink, Bart ; Mouha, Nicky ; Yasuda, Kan
part of: Revised Selected Papers of the 21st International Workshop Fast Software Encryption (FSE 2014), pages: 168-186, 2015, Springer
Presented at:
21st International Workshop Fast Software Encryption (FSE 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-46706-0_9

  PDF

Attributes Enhanced Role-Based Access Control Model

Mahmood Rajpoot, Qasim ; Jensen, Christian D. ; Krishnan, Ram
part of: Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15), pages: 3-17, 2015, Springer
Presented at:
12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-22906-5_1

 

Ciphers for MPC and FHE

R. Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael
part of: Advances in Cryptology – EUROCRYPT 2015, pages: 430-454, 2015, Springer
Presented at:
34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-46800-5_17

 

Comb to Pipeline: Fast Software Encryption Revisited

Bogdanov, Andrey ; Lauridsen, Martin Mehl ; Tischhauser, Elmar Wolfgang
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 150-171, 2015, Springer
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_8

 

Continuous Context-Aware Device Comfort Evaluation Method

Guo, Jingjing ; Jensen, Christian D. ; Ma, Jianfeng
part of: Proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management IX (IFIPTM 2015), pages: 203-211, 2015, Springer
Presented at:
9th IFIP WG 11.11 International Conference on Trust Management

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-18491-3_16

 

Cryptanalysis of Two Fault Countermeasure Schemes

Banik, Subhadeep ; Bogdanov, Andrey
part of: Progress in Cryptology – INDOCRYPT 2015, pages: 241-252, 2015
Presented at:
16th International Conference on Cryptology in India

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-26617-6_13

 

Exploring the energy consumption of lightweight blockciphers in FPGA

Banik, Subhadeep ; Bogdanov, Andrey ; Regazzoni, Francesco
part of: Proceedings of 2015 International Conference on Reconfigurable Computing and FPGAs (ReConFig15), pages: 1-6, 2016, IEEE
Presented at:
International Conference on Reconfigurable Computing and FPGAs 2015

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/ReConFig.2015.7393308

 

Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures

Coron, Jean-Sébastien ; Roy, Arnab ; Vivek, Srinivas
in: Journal of Cryptographic Engineering, vol: 5, issue: 2, pages: 73-83

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/s13389-015-0099-9

  PDF

Integrating Attributes into Role-Based Access Control

Mahmood Rajpoot, Qasim ; Jensen, Christian D. ; Krishnan, Ram
part of: Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (2015), pages: 242-249, 2015, Springer
Presented at:
29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-20810-7_17

 

Linear Distinguishers in the Key-less Setting: Application to PRESENT

Lauridsen, Martin Mehl ; Rechberger, Christian
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 217-240, 2015, Springer
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_11

 

Observations on the SIMON Block Cipher Family

Kölbl, Stefan ; Leander, Gregor ; Tiessen, Tyge
part of: Advances in Cryptology – CRYPTO 2015, pages: 161-185, 2015, Springer
Presented at:
35th International Cryptology Conference (CRYPTO 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-47989-6_8

 

Physical trust-based persistent authentication

Fujita, Masahiro ; Jensen, Christian D. ; Arimura, Shiori ; Ikeya, Yuki ; Nishigaki, Masakatsu
part of: Proceedings of the 13th Annual Conference on Privacy, Security and Trust (PST 2015), pages: 186-190, 2015, IEEE
Presented at:
13th Annual Conference on Privacy, Security and Trust

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1109/PST.2015.7232972

 

Practical Attacks on AES-like Cryptographic Hash Functions

Kölbl, Stefan ; Rechberger, Christian
part of: Progress in Cryptology - LATINCRYPT 2014, pages: 259-273, 2015, Springer
Presented at:
3rd International Conference on Cryptology and Information Security in Latin America

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-16295-9_14

 

Security of the AES with a Secret S-Box

Tiessen, Tyge ; Knudsen, Lars Ramkilde ; Kölbl, Stefan ; Lauridsen, Martin Mehl
part of: Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015), pages: 175-189, 2015, Springer
Presented at:
22nd International Workshop on Fast Software Encryption (FSE 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-48116-5_9

 

State-Recovery Analysis of Spritz

Ankele, Ralph ; Kölbl, Stefan ; Rechberger, Christian
part of: Progress in Cryptology – LATINCRYPT 2015, pages: 204-221, 2015, Springer
Presented at:
4th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-319-22174-8_12

 

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

Lamberger, Mario ; Mendel, Florian ; Schläffer, Martin ; Rechberger, Christian ; Rijmen, Vincent
in: Journal of Cryptology, vol: 28, issue: 2, pages: 257-296

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/s00145-013-9166-5

 

Twisted Polynomials and Forgery Attacks on GCM

Abdelraheem, Mohamed Ahmed A. M. A. ; Beelen, Peter ; Bogdanov, Andrey ; Tischhauser, Elmar Wolfgang
part of: Advances in Cryptology – EUROCRYPT 2015, pages: 762-786, 2015, Springer
Presented at:
34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2015     |    DOI: https://doi.org/10.1007/978-3-662-46800-5_29

  PDF

Video Surveillance: Privacy Issues and Legal Compliance

Mahmood Rajpoot, Qasim ; Jensen, Christian D.
part of: Promoting Social Change and Democracy through Information Technology, 2015, IGI global

Type: Book chapter (Peer reviewed)

Status: Published     |    Year: 2015

2014
 

ALE: AES-based lightweight authenticated encryption

Bogdanov, Andrey ; Mendel, Florian ; Regazzoni, Francesco ; Rijmen, Vincent ; Tischhauser, Elmar
part of: Fast Software Encryption. Revised Selected Papers, pages: 447-466, 2014, Springer
Presented at:
20th International Workshop on Fast Software Encryption (FSE 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-43933-3_23

  PDF

Editorial: Thematic series on best articles from IFIPTM and PST

Fernandez-Gago, Carmen ; Jensen, Christian D.
in: Journal of Trust Management, vol: 1, issue: 2

Type: Editorial

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1186/2196-064X-1-2

 

Fast Software Encryption

Cid, Carlos (Editor) ; Rechberger, Christian

Type: Book (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-46706-0

 

How to Securely Release Unverified Plaintext in Authenticated Encryption

Andreeva, Elena ; Bogdanov, Andrey ; Luykx, Atul ; Mennink, Bart ; Mouha, Nicky ; Yasuda, Kan
part of: Advances in Cryptology – ASIACRYPT 2014, pages: 105-125, 2014, Springer
Presented at:
20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-45611-8_6

 

Improving Usability of Passphrase Authentication

Nielsen, Glen ; Vedel, Michael ; Jensen, Christian D.
part of: Proceedings of the 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST), pages: 189-198, 2014, IEEE
Presented at:
12th Annual Conference on Privacy, Security and Trust

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014

 

Internal differential collision attacks on the reduced-round Grøstl-0 hash function

Ideguchi, Kota ; Tischhauser, Elmar Wolfgang ; Preneel, Bart
in: Designs, Codes and Cryptography, vol: 70, issue: 3, pages: 251-271

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s10623-012-9674-6

 

Key Recovery Attacks on Recent Authenticated Ciphers

Bogdanov, Andrey ; Dobraunig, Christoph ; Eichlseder, Maria ; Lauridsen, Martin Mehl ; Mendel, Florian ; Schläffer, Martin ; Tischhauser, Elmar Wolfgang
part of: 3rd International Conference on Cryptology and Information Security in Latin America, pages: 274-287, 2014, Springer
Presented at:
3rd International Conference on Cryptology and Information Security in Latin America

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014

 

Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis

Bogdanov, Andrey ; Kavun, Elif Bilge ; Tischhauser, Elmar Wolfgang ; Yalcin, Tolga
in: Journal of Computational and Applied Mathematics, vol: 259, pages: 592-598

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1016/j.cam.2013.10.020

 

Lightweight cryptography for constrained devices

Alippi, Cesare ; Bogdanov, Andrey ; Regazzoni, Francesco
part of: Proceedings of the 14th International Symposium on Integrated Circuits (ISIC 2014), pages: 144-147, 2015, IEEE
Presented at:
14th International Symposium on Integrated Circuits

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1109/ISICIR.2014.7029580

  PDF

Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard

Wen, Long ; Wang, Meiqin ; Bogdanov, Andrey ; Chen, Huaifeng
in: Information Processing Letters, vol: 114, pages: 322–330

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1016/j.ipl.2014.01.007

 

On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers

Blondeau, Celine ; Bogdanov, Andrey ; Wang, Meiqin
part of: Applied Cryptography and Network Security, pages: 271-288, 2014, Springer
Presented at:
12th International Conference on Applied Cryptography and Network Security (ACNS)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-07536-5_17

 

On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2

Bogdanov, Andrey ; Tischhauser, Elmar
part of: Fast Software Encryption. Revised Selected Papers, pages: 19-38, 2014, Springer
Presented at:
20th International Workshop on Fast Software Encryption (FSE 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-43933-3_2

 

Remote Biometrics for Robust Persistent Authentication

Ingwar, Mads Ingerslew ; Jensen, Christian D.
part of: Data Privacy Management and Autonomous Spontaneous Security, pages: 250-267, 2014, Springer
Presented at:
18th European Symposium on Research in Computer Security (ESORICS 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-54568-9_16

 

Rotational Rebound Attacks on Reduced Skein

Khovratovich, Dmitry ; Nikolić, Ivica ; Rechberger, Christian
in: Journal of Cryptology, vol: 27, issue: 3, pages: 452-479

Type: Journal article (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/s00145-013-9150-0

 

Route 66: Passively Breaking All GSM Channels

Vejre, Philip S. ; Bogdanov, Andrey
part of: Information Security and Privacy, pages: 422-429, 2014, Springer
Presented at:
19th Australasian Conference on Information Security and Privacy

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-08344-5_28

 

Security and Privacy in Video Surveillance: Requirements and Challenges

Mahmood Rajpoot, Qasim ; Jensen, Christian D.
part of: ICT Systems Security and Privacy Protection, pages: 169-184, 2014, Springer
Presented at:
29th IFIP TC-11 International Information Security and Privacy Conference 2014

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-642-55415-5_14

 

Security and Trust Management

Mauw, Sjouke (Editor) ; Jensen, Christian D.

Type: Book (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-319-11851-2

 

The importance of trust in computer security

Jensen, Christian D.
part of: Proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2014), pages: 1-12, 2015, Springer
Presented at:
8th IFIP WG 11.11 International Conference on Trust Management

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-43813-8_1

 

The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

Khovratovich, Dmitry ; Rechberger, Christian
part of: Selected Areas in Cryptography - SAC 2013. Revised Selected Papers, pages: 174-184, 2014, Springer
Presented at:
20th International Workshop on Selected Areas of Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-43414-7_9

 

Towards understanding the known-key security of block ciphers

Andreeva, Elena ; Bogdanov, Andrey ; Mennink, Bart
part of: Fast Software Encryption, pages: 348-366, 2014, Springer
Presented at:
20th International Workshop on Fast Software Encryption (FSE 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-43933-3_18

 

Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA

Bogdanov, Andrey ; Geng, Huizheng ; Wang, Meiqin ; Wen, Long ; Collard, Baudoin
part of: Proceedings of the 20th International Conference on Selected Areas in Cryptography -- SAC 2013, pages: 306-323, 2014, Springer
Presented at:
20th International Workshop on Selected Areas of Cryptography

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2014     |    DOI: https://doi.org/10.1007/978-3-662-43414-7_16

2013
 

Differential Cryptanalysis of Keccak Variants

Kölbl, Stefan ; Mendel, Florian ; Nad, Tomislav ; Schläffer, Martin
part of: Cryptography and Coding, pages: 141-157, 2013, Springer
Presented at:
14th IMA International Conference on Cryptography and Coding (IMACC 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/978-3-642-45239-0_9

  PDF

Dynamic encryption method

Knudsen, Lars Ramkilde
Patent no.: WO2013060876 , Date: 2013-05-02

Type: Patent

Status: Published     |    Year: 2013

 

Efficient and side-channel resistant authenticated encryption of FPGA bitstreams

Bogdanov, Andrey ; Moradi, Amir ; Yalcin, Tolga
part of: Proceedings of 2012 International Conference on Reconfigurable Computing and FPGAs (ReConFig), 2013, IEEE
Presented at:
2012 International Conference on Reconfigurable Computing and FPGAs (ReConFig)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1109/ReConFig.2012.6416743

 

Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

Bilgin, Begul ; Bogdanov, Andrey ; Knezevic, Miroslav ; Mendel, Florian ; Wang, Qingju
part of: Cryptographic Hardware and Embedded Systems - CHES 2013, pages: 142-158, 2013, Springer
Presented at:
15th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    Year: 2013     |    DOI: https://doi.org/10.1007/978-3-642-40349-1_9