Differential analysis of block ciphers SIMON and SPECK A Biryukov, A Roy, V Velichkov Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015 | 210 | 2015 |
Design Strategies for ARX with Provable Bounds: Sparx and LAX D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 173 | 2016 |
Automatic search for differential trails in ARX ciphers A Biryukov, V Velichkov Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014 | 128 | 2014 |
A cross-protocol attack on the TLS protocol N Mavrogiannopoulos, F Vercauteren, V Velichkov, B Preneel Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 111 | 2012 |
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck A Biryukov, V Velichkov, Y Le Corre Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 105 | 2016 |
Meet-in-the-middle attacks on reduced-round XTEA G Sekar, N Mouha, V Velichkov, B Preneel Cryptographers’ Track at the RSA Conference, 250-267, 2011 | 90 | 2011 |
Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... NIST round 2, 2019 | 79 | 2019 |
Lightweight AEAD and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... IACR Transactions on Symmetric Cryptology 2020 (S1), 208-261, 2020 | 73 | 2020 |
The differential analysis of S-functions N Mouha, V Velichkov, C De Canniere, B Preneel International Workshop on Selected Areas in Cryptography, 36-56, 2010 | 68 | 2010 |
Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX) C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 58 | 2020 |
New design techniques for efficient arithmetization-oriented hash functions: anemoi permutations and jive compression mode C Bouvier, P Briaud, P Chaidos, L Perrin, R Salen, V Velichkov, D Willems Annual International Cryptology Conference, 507-539, 2023 | 47 | 2023 |
The additive differential probability of ARX V Velichkov, N Mouha, C De Canniere, B Preneel International Workshop on Fast Software Encryption, 342-358, 2011 | 29 | 2011 |
Analysis of the authenticated cipher MORUS (v1) A Mileva, V Dimitrova, V Velichkov International Conference on Cryptography and Information Security in the …, 2015 | 25 | 2015 |
Sparx: a family of ARX-based lightweight block ciphers provably secure against linear and differential attacks D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov NIST Lightweight Cryptography Workshop 2016, 2016 | 17 | 2016 |
Design strategies for ARX with provable bounds: SPARX and LAX (Full Version) D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov Cryptology ePrint Archive, 2016 | 16 | 2016 |
UNAF: A special set of additive differences with application to the differential analysis of ARX V Velichkov, N Mouha, C De Cannière, B Preneel International Workshop on Fast Software Encryption, 287-305, 2012 | 13 | 2012 |
Meet-in-the-Filter and Dynamic Counting with Applications to Speck A Biryukov, L Cardoso dos Santos, JS Teh, A Udovenko, V Velichkov International Conference on Applied Cryptography and Network Security, 149-177, 2023 | 11 | 2023 |
Analysis of the NORX core permutation A Biryukov, A Udovenko, V Velichkov Cryptology ePrint Archive, 2017 | 11 | 2017 |
Algebraic cryptanalysis of a small-scale version of stream cipher Lex V Velichkov, V Rijmen, B Preneel IET Information Security 4 (2), 49-61, 2010 | 10 | 2010 |
Security evaluation of the K2 stream cipher A Bogdanov, B Preneel, V Rijmen Internal report., 2011 | 9 | 2011 |