Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261 Peer Reviewed verified by ORBi |
Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994. |
Biryukov, A., Udovenko, A., & Velichkov, V. (2017). Analysis of the NORX Core Permutation. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40730. |
Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18 Peer reviewed |
Biryukov, A., Velichkov, V., & Le Corre, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. In Fast Software Encryption - FSE 2016. Peer reviewed |
Mileva, A., Dimitrova, V., & Velichkov, V. (2015). Analysis of the Authenticated Cipher MORUS (v1). In Cryptography and Information Security in the Balkans: First International Conference, BalkanCryptSec 2015 (Lecture Notes in Computer Science). Springer. Peer reviewed |
Biryukov, A., & Velichkov, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12 Peer reviewed |
Biryukov, A., Roy, A., & Velichkov, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28 Peer reviewed |