Design Strategies for ARX with Provable Bounds: Sparx and LAX D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 187 | 2016 |
Reverse-engineering the S-box of Streebog, Kuznyechik and STRIBOBr1 A Biryukov, L Perrin, A Udovenko Annual international conference on the theory and applications of …, 2016 | 96* | 2016 |
Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... | 81 | 2019 |
Lightweight AEAD and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... IACR Transactions on Symmetric Cryptology 2020 (S1), 208-261, 2020 | 75 | 2020 |
Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem L Perrin, A Udovenko, A Biryukov Annual International Cryptology Conference, 93-122, 2016 | 65 | 2016 |
Alzette: A 64-bit ARX-box C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... | 60* | 2019 |
Attacks and countermeasures for white-box designs A Biryukov, A Udovenko Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 57 | 2018 |
Optimal first-order Boolean masking for embedded IoT devices A Biryukov, D Dinu, Y Le Corre, A Udovenko Smart Card Research and Advanced Applications: 16th International Conference …, 2018 | 43 | 2018 |
Cryptanalysis of the Legendre PRF and generalizations W Beullens, T Beyne, A Udovenko, G Vitto IACR Transactions on Symmetric Cryptology 2020 (1), 313-330, 2020 | 33 | 2020 |
Exponential s-boxes: a link between the s-boxes of BelT and Kuznyechik/Streebog LP Perrin, A Udovenko IACR Transactions on Symmetric Cryptology 2016 (2), 2017 | 17 | 2017 |
Sparx: a family of ARX-based lightweight block ciphers provably secure against linear and differential attacks D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov NIST Lightweight Cryptography Workshop 2016, 2016 | 17 | 2016 |
MILP modeling of Boolean functions by minimum number of inequalities A Udovenko Cryptology ePrint Archive, 2021 | 15 | 2021 |
The secret structure of the S-box of Streebog, Kuznechik and Stribob A Biryukov, L Perrin, A Udovenko Cryptology ePrint Archive, 2015 | 15 | 2015 |
Algebraic insights into the secret Feistel network L Perrin, A Udovenko International Conference on Fast Software Encryption, 378-398, 2016 | 14 | 2016 |
Dummy shuffling against algebraic attacks in white-box implementations A Biryukov, A Udovenko Annual International Conference on the Theory and Applications of …, 2021 | 13 | 2021 |
Meet-in-the-Filter and Dynamic Counting with Applications to Speck A Biryukov, L Cardoso dos Santos, JS Teh, A Udovenko, V Velichkov International Conference on Applied Cryptography and Network Security, 149-177, 2023 | 11 | 2023 |
Analysis of the NORX core permutation A Biryukov, A Udovenko, V Velichkov Cryptology ePrint Archive, 2017 | 11 | 2017 |
Convexity of division property transitions: theory, algorithms and compact models A Udovenko Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 9 | 2021 |
Breaking the $ IKEp182 Challenge. A Udovenko, G Vitto IACR Cryptol. ePrint Arch. 2021, 1421, 2021 | 7 | 2021 |
On the sixth international olympiad in cryptography NSUCRYPTO AA Gorodilova, NN Tokareva, SV Agievich, C Carlet, EV Gorkunov, ... Journal of Applied and Industrial Mathematics 14, 623-647, 2020 | 7 | 2020 |