![]() ![]() | BEIERLE, C., BIRYUKOV, A., CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., & WANG, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261 ![]() |
![]() ![]() | BEIERLE, C., BIRYUKOV, A., CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., & WANG, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994. |
![]() ![]() | BIRYUKOV, A., UDOVENKO, A., & VELICHKOV, V. (2017). Analysis of the NORX Core Permutation. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40730. |
![]() ![]() | DINU, D.-D., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., GROSZSCHÄDL, J., & BIRYUKOV, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18 ![]() |
![]() ![]() | BIRYUKOV, A., VELICHKOV, V., & LE CORRE, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. In Fast Software Encryption - FSE 2016. ![]() |
![]() ![]() | Mileva, A., Dimitrova, V., & VELICHKOV, V. (2015). Analysis of the Authenticated Cipher MORUS (v1). In Cryptography and Information Security in the Balkans: First International Conference, BalkanCryptSec 2015 (Lecture Notes in Computer Science). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., & VELICHKOV, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12 ![]() |
![]() ![]() | BIRYUKOV, A., Roy, A., & VELICHKOV, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28 ![]() |