Profil

VELICHKOV Vesselin

Main Referenced Co-authors
BIRYUKOV, Alex  (7)
UDOVENKO, Aleksei  (4)
GROSZSCHÄDL, Johann  (3)
PERRIN, Léo Paul  (3)
BEIERLE, Christof  (2)
Main Referenced Keywords
ARX (4); cryptanalysis (3); authenticated encryption (2); automatic search (2); CAESAR (2);
Main Referenced Unit & Research Centers
ULHPC - University of Luxembourg: High Performance Computing (2)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX (1)
Main Referenced Disciplines
Computer science (8)

Publications (total 8)

The most downloaded
838 downloads
Biryukov, A., & Velichkov, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12 https://hdl.handle.net/10993/17183

The most cited

101 citations (Scopus®)

Biryukov, A., Roy, A., & Velichkov, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28 https://hdl.handle.net/10993/18730

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261
Peer Reviewed verified by ORBi

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994.

Biryukov, A., Udovenko, A., & Velichkov, V. (2017). Analysis of the NORX Core Permutation. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40730.

Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18
Peer reviewed

Biryukov, A., Velichkov, V., & Le Corre, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. In Fast Software Encryption - FSE 2016.
Peer reviewed

Mileva, A., Dimitrova, V., & Velichkov, V. (2015). Analysis of the Authenticated Cipher MORUS (v1). In Cryptography and Information Security in the Balkans: First International Conference, BalkanCryptSec 2015 (Lecture Notes in Computer Science). Springer.
Peer reviewed

Biryukov, A., & Velichkov, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12
Peer reviewed

Biryukov, A., Roy, A., & Velichkov, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28
Peer reviewed

Contact ORBilu