Profil

VELICHKOV Vesselin

Main Referenced Co-authors
BIRYUKOV, Alex  (7)
UDOVENKO, Aleksei  (4)
GROSZSCHÄDL, Johann  (3)
PERRIN, Léo Paul  (3)
BEIERLE, Christof  (2)
Main Referenced Keywords
ARX (4); cryptanalysis (3); authenticated encryption (2); automatic search (2); CAESAR (2);
Main Referenced Unit & Research Centers
ULHPC - University of Luxembourg: High Performance Computing (2)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX (1)
Main Referenced Disciplines
Computer science (8)

Publications (total 8)

The most downloaded
884 downloads
BIRYUKOV, A., & VELICHKOV, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12 https://hdl.handle.net/10993/17183

The most cited

137 citations (OpenAlex)

BIRYUKOV, A., Roy, A., & VELICHKOV, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28 https://hdl.handle.net/10993/18730

BEIERLE, C., BIRYUKOV, A., CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., & WANG, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261
Peer Reviewed verified by ORBi

BEIERLE, C., BIRYUKOV, A., CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., & WANG, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994.

BIRYUKOV, A., UDOVENKO, A., & VELICHKOV, V. (2017). Analysis of the NORX Core Permutation. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40730.

DINU, D.-D., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., GROSZSCHÄDL, J., & BIRYUKOV, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18
Peer reviewed

BIRYUKOV, A., VELICHKOV, V., & LE CORRE, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. In Fast Software Encryption - FSE 2016.
Peer reviewed

Mileva, A., Dimitrova, V., & VELICHKOV, V. (2015). Analysis of the Authenticated Cipher MORUS (v1). In Cryptography and Information Security in the Balkans: First International Conference, BalkanCryptSec 2015 (Lecture Notes in Computer Science). Springer.
Peer reviewed

BIRYUKOV, A., & VELICHKOV, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12
Peer reviewed

BIRYUKOV, A., Roy, A., & VELICHKOV, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28
Peer reviewed

Contact ORBilu