Profil

UDOVENKO Aleksei

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Cryptolux

ORCID
0000-0001-8318-6274
Main Referenced Co-authors
BIRYUKOV, Alex  (15)
PERRIN, Léo Paul  (7)
BEIERLE, Christof  (4)
VELICHKOV, Vesselin  (4)
Agievich, Sergey (3)
Main Referenced Keywords
Cryptanalysis (8); Boolean functions (4); ARX (3); cryptanalysis (3); Feistel Network (3);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX (5)
ULHPC - University of Luxembourg: High Performance Computing (3)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography (1)
Main Referenced Disciplines
Computer science (33)

Publications (total 33)

The most downloaded
954 downloads
Biryukov, A., Perrin, L. P., & Udovenko, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In C. J.-S. Fischlin, Marc (Ed.), Advances in Cryptology – EUROCRYPT 2016 (pp. 372-402). Springer Berlin Heidelberg. doi:10.1007/978-3-662-49890-3_15 https://hdl.handle.net/10993/23895

The most cited

89 citations (Scopus®)

Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18 https://hdl.handle.net/10993/29917

The most significant

Biryukov, A., & Udovenko, A. (2021). Dummy Shuffling Against Algebraic Attacks in White-Box Implementations. In A. Canteaut & F.-X. Standaert (Eds.), Advances in Cryptology -- EUROCRYPT 2021 (pp. 219--248). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-77886-6_8
Peer reviewed

Udovenko, A. (2021). Convexity of Division Property Transitions: Theory, Algorithms and Compact Models. In H. Wang & M. Tibouchi (Ed.), Advances in Cryptology -- ASIACRYPT 2021 (pp. 332--361). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-92062-3_12
Peer reviewed

Udovenko, A. (2021). MILP modeling of Boolean functions by minimum number of inequalities. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49434.

Biryukov, A., & Udovenko, A. (2018). Attacks and Countermeasures for White-box Designs. In T. Peyrin & S. Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing. doi:10.1007/978-3-030-03329-3
Peer reviewed

Perrin, L. P., Udovenko, A., & Biryukov, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (pp. 93-122). Berlin, Germany: Springer Berlin Heidelberg. doi:10.1007/978-3-662-53008-5_4
Peer reviewed


Biryukov, A., Teh, J. S., & Udovenko, A. (2024). Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. In B. Smith & H. Wu (Eds.), Selected Areas in Cryptography 2022. Springer International Publishing. doi:10.1007/978-3-031-58411-4_16
Peer reviewed

Udovenko, A., & Vitto, G. (2024). Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge. In B. Smith & H. Wu (Eds.), Selected Areas in Cryptography 2022. Springer. doi:10.1007/978-3-031-58411-4_10
Peer reviewed

Idrisova, V. A., Tokareva, N. N., Gorodilova, A. A., Beterov, I. I., Bonich, T. A., Ishchukova, E. A., Kolomeec, N. A., Kutsenko, A. V., Malygina, E. S., Pankratova, I. A., Pudovkina, M. A., & UDOVENKO, A. (2023). Mathematical problems and solutions of the Ninth International Olympiad in Cryptography NSUCRYPTO. doi:10.48550/arXiv.2310.05641

Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Teh, J. S., UDOVENKO, A., Cong Wang, Leo Zhang, & Yury Zhauniarovich (Eds.). (2023). Applied Cryptography and Network Security Workshops. Springer Cham. doi:10.1007/978-3-031-41181-6
Peer reviewed

CHARLÈS, A., & UDOVENKO, A. (31 August 2023). LPN-based Attacks in the White-box Setting. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (4), 318 - 343. doi:10.46586/tches.v2023.i4.318-343
Peer Reviewed verified by ORBi

Biryukov, A., Lambin, B., & Udovenko, A. (09 June 2023). Cryptanalysis of ARX-based White-box Implementations. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (3), 97-135. doi:10.46586/tches.v2023.i3.97-135
Peer reviewed

Hebborn, P., Leander, G., & Udovenko, A. (2023). Mathematical Aspects of Division Property. Cryptography and Communications. doi:10.1007/s12095-022-00622-2
Peer Reviewed verified by ORBi

Udovenko, A. (2023). DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/54526.

Biryukov, A., Cardoso Dos Santos, L., Teh, J. S., Udovenko, A., & Velichkov, V. (2023). Meet-in-the-Filter and Dynamic Counting with Applications to Speck. In M. Tibouchi & X. Wang (Eds.), Applied Cryptography and Network Security, 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I (pp. 149-177). Springer. doi:10.1007/978-3-031-33488-7_6
Peer reviewed

UDOVENKO, A. (2023). Cryptanalysis of TS-Hash. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/59621.

Gorodilova, A., Tokareva, N., Agievich, S., Beterov, I., Beyne, T., Budaghyan, L., Carlet, C., Dhooghe, S., Idrisova, V., Kolomeec, N., Kutsenko, A., Malygina, E., Mouha, N., Pudovkina, M., Sica, F., & Udovenko, A. (2022). An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO". ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/53225.

Biryukov, A., & Udovenko, A. (2021). Dummy Shuffling Against Algebraic Attacks in White-Box Implementations. In A. Canteaut & F.-X. Standaert (Eds.), Advances in Cryptology -- EUROCRYPT 2021 (pp. 219--248). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-77886-6_8
Peer reviewed

Udovenko, A. (2021). Convexity of Division Property Transitions: Theory, Algorithms and Compact Models. In H. Wang & M. Tibouchi (Ed.), Advances in Cryptology -- ASIACRYPT 2021 (pp. 332--361). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-92062-3_12
Peer reviewed

Udovenko, A. (2021). MILP modeling of Boolean functions by minimum number of inequalities. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49434.

Gorodilova, A., Tokareva, N. N., Agievich, S., Carlet, C., Idrisova, V., Kalgin, K., Kolegov, D., Kutsenko, A., Mouha, N., Pudovkina, M., & Udovenko, A. (2021). The Seventh International Olympiad in Cryptography NSUCRYPTO: problems and solutions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49474. doi:10.33048/semi.2021.18.063

Biryukov, A., Udovenko, A., & Vitto, G. (2021). Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups. In Topics in Cryptology – CT-RSA 2021. doi:10.1007/978-3-030-75539-3_12
Peer reviewed

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261
Peer Reviewed verified by ORBi

Udovenko, A. (2020). Optimized Collision Search for STARK-Friendly Hash Challenge Candidates. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/42379.

Gorodilova, A., Tokareva, N. N., Agievich, S., Carlet, C., Gorkunov, E., Idrisova, V., Kolomeec, N., Kutsenko, A., Lebedev, R., Nikova, S., Oblaukhov, A., Pankratova, I., Pudovkina, M., Rijmen, V., & Udovenko, A. (2020). On the Sixth International Olympiad in Cryptography NSUCRYPTO. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/49475.

Beullens, W., Beyne, T., Udovenko, A., & Vitto, G. (2020). Cryptanalysis of the Legendre PRF and generalizations. IACR Transactions on Symmetric Cryptology, 2020 (1). doi:10.13154/tosc.v2020.i1.313-330
Peer reviewed

Beierle, C., Biryukov, A., & Udovenko, A. (2019). On degree-d zero-sum sets of full rank. Cryptography and Communications, 1-26. doi:10.1007/s12095-019-00415-0
Peer Reviewed verified by ORBi

Udovenko, A. N. (2019). Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/39350

Derbez, P., Lallemand, V., & Udovenko, A. (2019). Cryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition. In K. G. Patterson & D. Stebila (Eds.), Selected Areas in Cryptography -- SAC 2019 (pp. 124-145). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-38471-5_6
Peer reviewed

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994.

Beierle, C., Biryukov, A., & Udovenko, A. (2018). On Degree-d Zero-Sum Sets of Full Rank. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40729.

Biryukov, A., & Udovenko, A. (2018). Attacks and Countermeasures for White-box Designs. In T. Peyrin & S. Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing. doi:10.1007/978-3-030-03329-3
Peer reviewed

Biryukov, A., Dinu, D.-D., Le Corre, Y., & Udovenko, A. (2018). Optimal First-Order Boolean Masking for Embedded IoT Devices. In CARDIS 2017: Smart Card Research and Advanced Applications (pp. 22-41). Springer, Cham. doi:10.1007/978-3-319-75208-2_2
Peer reviewed

Biryukov, A., Udovenko, A., & Velichkov, V. (2017). Analysis of the NORX Core Permutation. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40730.

Perrin, L. P., & Udovenko, A. (January 2017). Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog. IACR Transactions on Symmetric Cryptology, 2016 (2), 99-124. doi:10.13154/tosc.v2016.i2.99-124
Peer Reviewed verified by ORBi

Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18
Peer reviewed

Perrin, L. P., Udovenko, A., & Biryukov, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (pp. 93-122). Berlin, Germany: Springer Berlin Heidelberg. doi:10.1007/978-3-662-53008-5_4
Peer reviewed

Biryukov, A., Perrin, L. P., & Udovenko, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In C. J.-S. Fischlin, Marc (Ed.), Advances in Cryptology – EUROCRYPT 2016 (pp. 372-402). Springer Berlin Heidelberg. doi:10.1007/978-3-662-49890-3_15
Peer reviewed

Perrin, L. P., & Udovenko, A. (2016). Algebraic Insights into the Secret Feistel Network. In T. Peyrin (Ed.), Fast Software Encryption - 23rd International Workshop, FSE 2016, Bochum, March 20-23, 2016 (pp. 378-398). Springer-Verlag Berlin Heidelberg.
Peer reviewed

Contact ORBilu