Andrey Bogdanov is an Associate Professor in Cryptology at the Technical University of Denmark. He joined the Technical University of Denmark in 2012. In 2011, he was a Visiting Researcher at Microsoft Research in Redmond, USA. From 2009 to 2012, he was a postdoctoral researcher at KU Leuven, Belgium. In 2009, he obtained his PhD degree from the Ruhr University of Bochum, Germany. From 2005 to 2009, he worked for a start-up in the area of embedded security, automotove security and applied cryptography in Germany. Among others, his interests include the design and cryptanalysis of symmetric-key algorithms, their provable aspects and efficient implementations. He has published over 75 research papers in international conferences and journals. He serves on various program committees. His h-index is 30.
Andrey Bogdanov is most known for the biclique cryptanalysis of the full AES, the lightweight block cipher PRESENT (which is now an ISO/IEC standard), the lightweight hash function SPONGENT (another ISO/IEC standard), the first attack on the KeeLoq automotive access system as well as the co-invention of zero-correlation cryptanalysis, key-invariant bias attacks, and improved/algebraic side-channel collision attacks.
Research interests:
Cryptography for cybersecurity
Whitebox cryptography
Cryptanalysis and design of symmetric-key algorithms
01415 Computational Discrete Mathematics, fall 2012
Publications
Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni. Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol., FSE'19, 2019.
Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser. SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. IACR Trans. Symmetric Cryptol., FSE'19, 2019.
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Toru Akishita, Harunaga Hiwatari. Inverse Gating for Low Energy Encryption. HOST'18, IEEE, 2018.
Andrey Bogdanov, Elmar Tischhauser, Philip Vejre. Multivariate Profiling of Hulls for Linear Cryptanalysis. IACR Trans. Symmetric Cryptol., FSE'18, 2018.
Andrey Bogdanov and Philip Vejre. Linear Cryptanalysis of DES with Asymmetries. ASIACRYPT 2017, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2017.
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni. Compact circuits for combined AES encryption/decryption. Journal of Cryptographic Engineering, 2017.
Subhadeep Banik, Andrey Bogdanov and Francesco Regazzoni. Efficient Configurations for Block Ciphers with Unified ENC/DEC Paths. HOST'17, IEEE, 2017.
Alexandros Andreou, Andrey Bogdanov and Elmar Tischhauser. Cache Timing Attacks on Recent Microarchitectures. HOST'17, IEEE, 2017.
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Jepsen. Analysis of Software Countermeasures for Whitebox Encryption. IACR Trans. Symmetric Cryptol., FSE'17, 2017.
Andrey Bogdanov, Takanori Isobe, Elmar Tischhauser. Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness. Asiacrypt'16, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2016.
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni. Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. INDOCRYPT 2016, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2016.
Danilo Sijacic, Andreas Kidmose, Bohan Yang, Subhadeep Banik, Begul Bilgin, Andrey Bogdanov, Ingrid Verbauwhede. Hold Your Breath, PRIMATEs Are Lightweight. SAC'16, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2016.
Subhadeep Banik, Andrey Bogdanov, Tiziana Fanni, Carlo Sau, Luigi Raffo, Francesca Palumbo, Francesco Regazzoni. Adaptable AES Implementation with Power-Gating Support. ACM International Conference on Computing Frontiers CF'16, ACM, 2016.
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov. Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. FSE'16, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2016.
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Toru Akishita and Harunaga Hiwatari. Round Gating for Low Energy Block Ciphers. HOST'16, IEEE, 2016.
Subhadeep Banik, Andrey Bogdanov and Kazuhiko Minematsu. Low-Area Hardware Implementations of CLOC, SILC and AES-OTR. HOST'16, IEEE, 2016.
Andrey Bogdanov, Takanori Isobe. White-box Cryptography Revisited: Space-hard Ciphers. ACM CCS'15: 22nd ACM Conference on Computer and Communications Security, Christopher Kruegel and Ninghui Li (eds.), ACM, 2015.
Andrey Bogdanov, Subhadeep Banik, Francesco Regazzoni. Exploring the Energy Consumption of Lightweight Blockciphers in FPGA. ReConFig'15: 10th International Conference on ReConFigurable Computing and FPGAs, Maya Gokhale and Michael Huebner (eds.), 2015.
Subhadeep Banik and Andrey Bogdanov. Cryptanalysis of two fault countermeasure schemes. INDOCRYPT'15, Lecture Notes in Computer Science (LNCS), Alex Biryukov and Vipul Goyal (eds.), Springer-Verlag, 2015.
Andrey Bogdanov, Takanori Isobe. How Secure is AES under Leakage. ASIACRYPT'15, Lecture Notes in Computer Science (LNCS), Tetsu Iwata and Jung Hee Cheon (eds.), Springer-Verlag, 2015.
Toru Akishita, Subhadeep Banik, Andrey Bogdanov, Harunaga Hiwatari, Takanori Isobe, Kyoji Shibutani, Francesco Regazzoni. Midori: A Block Cipher for Low Energy. ASIACRYPT'15, Lecture Notes in Computer Science (LNCS), Tetsu Iwata and Jung Hee Cheon (eds.), Springer-Verlag, 2015.
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni. Exploring Energy Efficiency of Lightweight Block Ciphers. SAC'15, Lecture Notes in Computer Science (LNCS), Orr Dunkelman and Liam Keliher (eds.), Springer-Verlag, 2015.
Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. SAC'15, Lecture Notes in Computer Science (LNCS), Orr Dunkelman and Liam Keliher (eds.), Springer-Verlag, 2015.
Andrey Bogdanov, Vincent Rijmen, Elmar Tischhauser. Related-Key Linear Hull Distinguishers for Key-Alternating Block Ciphers. International Workshop on Coding and Cryptography - WCC'15, Pascale Charpin, Nicolas Sendrier, and Jean-Pierre Tillich (eds.), 2015.
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser. Comb To Pipeline: Fast Software Encryption Revisited. FSE'15, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2015.
Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser. Twisted Polynomials and Forgery Attacks on GCM. EUROCRYPT'15, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2015.
Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Sanadhya. Bicliques with Minimal Data and Time Complexity for AES. ICISC'14, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2014.
Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen. General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. Indocrypt'14, Lecture Notes in Computer Science (LNCS), W. Meier and D. Mukhopadhyay (Eds.), pp. 161-176, Springer-Verlag, 2014.
Cesare Alippi, Andrey Bogdanov, Francesco Regazzoni. Lightweight Cryptography for RFIDs and Constrained Devices. ISIC 2014 - International Symposium on Integrated Circuits, IEEE, 2014.
Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser. Key Recovery Attacks on Recent Authenticated Ciphers. Latincrypt'14, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2014..
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda. How to Securely Release Unverified Plaintext in Authenticated Encryption. ASIACRYPT'14, Lecture Notes in Computer Science (LNCS), P. Sarkar and T. Iwata (Eds.), pp. 105-125, Springer-Verlag, 2014.
Philip S. Vejre and Andrey Bogdanov. Route 66: Passively Breaking All GSM Channels. ACISP'14, Lecture Notes in Computer Science (LNCS), pp. 422-429, Springer-Verlag, 2014.
Celine Blondeau, Andrey Bogdanov, Meiqin Wang. On the (In)Equivalence of Impossible Differential and Zero Correlation Distinguishers for Feistel- and Skipjack-type Ciphers. ACNS'14, Lecture Notes in Computer Science (LNCS), pp. 271-288, Springer-Verlag, 2014.
Long Wen, Meiqin Wang, Andrey Bogdanov. Multidimensional Zero-Correlation Linear Cryptanalysis of E2. Africacrypt'14, Lecture Notes in Computer Science (LNCS), pp. 147-164, Springer-Verlag, 2014.
Kyoji Shibutani, Andrey Bogdanov. Towards the Optimality of Feistel Ciphers with Substitution-Permutation Functions. Designs, Codes and Cryptography, 73(2), pp. 369-383, Springer-Verlag, 2014.
Andrey Bogdanov, Vincent Rijmen. Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers. Designs, Codes and Cryptography 70(3), pp. 369-383, Springer-Verlag, 2014.
Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chena. Multidimensional Zero-Correlation Attacks on Lightweight Block Cipher HIGHT: Improved Cryptanalysis of an ISO Standard. Information Processing Letters 114(6), pp. 322-330, Elsevier, 2014.
Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin. Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis. Journal of Computational and Applied Mathematics 259(B), pp. 592-598, Elsevier, 2014.
Elena Andreeva, Begul Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda. APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. FSE'14, Lecture Notes in Computer Science (LNCS), Springer-Verlag, 2014.
Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao. Key-Invariant Bias in Block Ciphers. ASIACRYPT'13, Lecture Notes in Computer Science (LNCS), pp. 357-376, Springer-Verlag, 2013.
Andrey Bogdanov, Kyoji Shibutani. Generalized Feistel Networks Revisited.
Designs, Codes and Cryptography 66(1-3), pp. 75-97, Springer-Verlag, 2013.
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede. SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IEEE Transactions on Computers 62(10), pp. 2041-2053, 2013.
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda. Parallelizable and Authenticated Online Ciphers. ASIACRYPT'13, Lecture Notes in Computer Science (LNCS), pp. 424-443, Springer-Verlag, 2013.
Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard. Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. SAC'13, Lecture Notes in Computer Science (LNCS), Tanja Lange, Kristin Lauter, Petr Lisonek (eds.), Springer-Verlag, 2013.
Begul Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang. FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. CHES'13, Lecture Notes in Computer Science (LNCS), Guido Bertoni and Jean-Sebastien Coron (eds.), pp. 142-158, Springer-Verlag, 2013.
Celine Blondeau, Andrey Bogdanov, Gregor Leander. Bounds in Shallows and in Miseries. CRYPTO'13, Lecture Notes in Computer Science (LNCS), Ran Canetti and Juan Garay (eds.), pp. 204-221, Springer-Verlag, 2013.
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger. On the Indifferentiability of Key-Alternating Ciphers. CRYPTO'13, Lecture Notes in Computer Science (LNCS), Ran Canetti and Juan Garay (eds.), pp. 531-550, Springer-Verlag, 2013.
Kyoji Shibutani, Andrey Bogdanov. Towards the Optimality of Feistel Ciphers with Substitution-Permutation Functions. International Workshop on Coding and Cryptography - WCC'13, Lilya Budaghyan, Tor Helleseth, and Matthew Parker (eds.), 2013.
Andrey Bogdanov, Elmar Tischhauser. On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. FSE'13, Lecture Notes in Computer Science (LNCS), Shiho Moriai (ed.), Springer-Verlag, 2013.
Elena Andreeva, Andrey Bogdanov, Bart Mennink. Towards Understanding the Known-Key Security of Block Ciphers . FSE'13, Lecture Notes in Computer Science (LNCS), Shiho Moriai (ed.), Springer-Verlag, 2013.
Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser. ALE: AES-Based Lightweight Authenticated Encryption. FSE'13, Lecture Notes in Computer Science (LNCS), Shiho Moriai (ed.), Springer-Verlag, 2013.
Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov. Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC'12, Lecture Notes in Computer Science (LNCS), Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.), pp. 126-140, Springer-Verlag, 2013.
Andrey Bogdanov, Elif Kavun, Elmar Tischhauser, Tolga Yalcin. Efficient Reconfigurable Hardware Architecture for Accurately Computing Success Probability and Data Complexity of Linear Attacks. International Conference on ReConFigurable Computing and FPGAs - ReConFig'12, 2012.
Andrey Bogdanov, Amir Moradi and Tolga Yalcin. Efficient and Side-Channel Resistant Authenticated Encryption of FPGA Bitstreams. International Conference on ReConFigurable Computing and FPGAs - ReConFig'12, 2012.
Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang. Integral and Multidimensional Linear Distinguishers with Correlation Zero. ASIACRYPT'12, Lecture Notes in Computer Science (LNCS), Xiaoyun Wang and Kazue Sako (eds.), Springer-Verlag, 2012.
Qingju Wang, Andrey Bogdanov. The Provable Constructive Effect of the Diffusion Switching Mechanism for CLEFIA-type Block Ciphers. Information Processing Letters 112(11), Elsevier, 2012.
Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger. On Security Arguments of the Second Round SHA-3 Candidates. International Journal of Information Security 11(2), pp.103-120, Springer-Verlag, 2012.
Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen. Lightweight AES-Based Authenticated Encryption. DIAC'12 - Directions in Authenticated Ciphers, 2012.
Andrey Bogdanov, Elif Kavun, Elmar Tischhauser, Tolga Yalcin. Experimental Evaluation of Success Probability and Data Complexity of Linear Attacks in Hardware. International Conference on Applied and Computational Mathematics, 2012.
Andrey Bogdanov, Elif Kavun, Dmitry Khovratovich, Christof Paar, Christian Rechberger, Tolga Yalcin. Practical biclique cryptanalysis: Low data complexity key search for AES-128 on FPGA. Special Purpose Hardware for Attacking Cryptographic Systems - SHARCS 2012, 2012.
Andrey Bogdanov, Meiqin Wang. Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. FSE'12, Lecture Notes in Computer Science (LNCS), vol. 7549, Anne Canteaut (ed.), pp. 29-48, Springer-Verlag, 2012.
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser. Key-Alternating Ciphers in a Provable Setting: Encryption Using A Small Number of Public Permutations. EUROCRYPT'12, Lecture Notes in Computer Science (LNCS), vol. 7237, David Pointcheval and Thomas Johansson (eds.), pp.45-62, Springer-Verlag, 2012 (Solicited to the Journal of Cryptology).
Andrey Bogdanov, Ilya Kizhvatov.
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks.
IEEE Transactions on Computers 61(8), pp. 1153-1164, 2012.
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede.SPONGENT: The Design Space of Lightweight Cryptographic Hashing. Lightweight Cryptography 2011. ECRYPT Workshop on Lightweight Cryptography - LC 2011. 2011.
Andrey Bogdanov, Kyoji Shibutani. Analysis of 3-Line Generalized Feistel Networks with Double SD-Functions.
Information Processing Letters 111(13), pp. 656-660, Elsevier, 2011.
Andy Rupp, Thomas Eisenbarth, Andrey Bogdanov, Oliver Grieb. Hardware SLE Solvers: Efficient Building Blocks for Cryptographic and Cryptanalytic Applications.
Integration, the VLSI Journal 44 (2011), pp. 290-304, Elsevier, 2011.
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger. Biclique Cryptanalysis of the Full AES. ASIACRYPT'11, Lecture Notes in Computer Science (LNCS), vol. 7073, Dong Hoon Lee and Xiaoyun Wang (eds.), pp. 344-371, Springer-Verlag, 2011.
Andrey Bogdanov.
On Unbalanced Feistel Networks with Contracting MDS Diffusion.
Designs, Codes and Cryptography 59(1-3), pp. 35-58. Springer-Verlag, 2011.
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede. SPONGENT: A Lightweight Hash Function.
Cryptographic Hardware and Embedded Systems - CHES 2011, Lecture Notes in Computer Science (LNCS), vol. 6917, Bart Preneel and Tsuyoshi Takagi (eds.), pp. 312-327, Springer-Verlag, 2011.
Andrey Bogdanov, Kyoji Shibutani. Double SP-Functions: Enhanced Generalized Feistel Networks.
The 16th Conference on Information Security and Privacy - ACISP 2011, Lecture Notes in Computer Science (LNCS), vol. 6812, Udaya Parampalli and Phillip Hawkes (eds.), pp. 106-119, Springer-Verlag, 2011.
Andrey Bogdanov, Kyoji Shibutani. Generalized Feistel Networks Revisited.
International Workshop on Coding and Cryptography - WCC 2011, A. Canteaut and D. Augot (eds.), 2011.
Andrey Bogdanov. On the Differential and Linear Efficiency of Balanced Feistel Networks.
Information Processing Letters 110(20), pp. 861-866, Elsevier, 2010.
Andrey Bogdanov, Christian Rechberger.
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN.
Selected Areas in Cryptography, 17th Annual International Workshop, SAC 2010, Lecture Notes in Computer Science (LNCS), vol. 6544, A. Biryukov, G. Gong, and D. R. Stinson (eds.), pp. 229-240, Springer-Verlag, 2011.
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, Malte Wienecke.
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.
Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Scienc (LNCS), vol. 5985, J. Pieprzyk (ed.), pp. 235-251, Springer-Verlag, 2010.
Andrey Bogdanov.
On the Differential Trails of Unbalanced Feistel Networks with Contracting MDS Diffusion.
International Workshop on Coding and Cryptography - WCC 2009, 2009.
Andrey Bogdanov, Ilya Kizhvatov, Andrey Pyshkin.
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection.
Progress in Cryptology - INDOCRYPT 2008, Lecture Notes in Computer Science (LNCS), vol. 5365, A. Das, V. Rijmen, D. Roy Chowdhury (eds.), pp. 251-265, Springer-Verlag, 2008.
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Chistopher Wolf.
Time-Area Optimized Public-Key Engines: MQ -Cryptosystems as Replacement for Elliptic Curves?
Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science (LNCS), vol. 5154, E. Oswald, and P. Rohatgi (eds.), pp. 45-61, Springer-Verlag, 2008 (Best Paper Award).
Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. Robshaw, Yanick Seurin.
Hash Functions and RFID Tags: Mind The Gap.
Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science (LNCS), vol. 5154, E. Oswald, and P. Rohatgi (eds.), pp. 283-299, Springer-Verlag, 2008.
Andrey Bogdanov.
Multiple-Differential Side-Channel Collision Attacks on AES.
Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science (LNCS), vol. 5154, E. Oswald, and P. Rohatgi (eds.), pp. 30-44, Springer-Verlag, 2008.
Sundar Balasubramanian, Andrey Bogdanov, Harold W. Carter, Jintai Ding, Andy Rupp.
Fast Multivariate Signature Generation in Hardware: The Case of Rainbow.
16th Annual IEEE Symposium on Field-Programmable Custom Computing Machines - FCCM 2008, pp. 281-282, IEEE, 2008.
Andrey Bogdanov, Christof Paar.
On the Security and Efficiency of Real-World Lightweight Authentication Protocols.
Workshop on Secure Component and System Identification - SECSI 2008, 2008.
Sundar Balasubramanian, Andrey Bogdanov, Harold W. Carter, Jintai Ding, Andy Rupp.
Fast Multivariate Signature Generation in Hardware: The Case of Rainbow.
19th IEEE International Conference on Application-specific Systems, Architectures and Processors - ASAP 2008, pp. 25-30, IEEE, 2008.
Andrey Bogdanov, Thomas Eisenbarth, Marco Wolf, Thomas Wollinger.
Trusted Computing for Automotive Systems: New Approaches to Enforce Security for Electronic Systems in Vehicles.
Automotive Security 2007, VDI-Berichte, vol. 2016, VDI-Verlag, 2007.
Andrey Bogdanov, Jan Pelzl, Thomas Wollinger.
Embedded Security in Automobiles: Chances and Risks.
Automotive Security 2007, VDI-Berichte, vol. 2016, VDI-Verlag, 2007.
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp.
A Hardware-Assisted Realtime Attack on A5/2 without Precomputations.
Cryptographic Hardware and Embedded Systems - CHES 2007, Lecture Notes in Computer Science (LNCS), vol. 4727, P. Paillier and I. Verbauwhede (eds.), pp. 394-412, Springer-Verlag, 2007.
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper.
Collision Attacks on AES-based MAC: Alpha-MAC.
Cryptographic Hardware and Embedded Systems - CHES 2007, Lecture Notes in Computer Science (LNCS), vol. 4727, P. Paillier and I. Verbauwhede (eds.), pp. 166-180, Springer-Verlag, 2007.
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. Robshaw, Yanick Seurin, C. Vikkelsoe.
PRESENT: An Ultra-Lightweight Block Cipher.
Cryptographic Hardware and Embedded Systems - CHES 2007, Lecture Notes in Computer Science (LNCS), vol. 4727, P. Paillier and I. Verbauwhede (eds.), pp. 450-466, Springer-Verlag, 2007 (The Horst Goertz Foundation's German IT-Security Prize 2010, 1st prize).
Andrey Bogdanov.
Linear Slide Attacks on the KeeLoq Block Cipher.
Information Security and Cryptology - Inscrypt 2007, Lecture Notes in Computer Science (LNCS), vol. 4990, D. Pei (ed.), pp. 66-80, Springer-Verlag, 2007.
Andrey Bogdanov.
Improved Side-Channel Collision Attacks on AES.
Selected Areas in Cryptography - SAC 2007, 14th Annual International Workshop, Lecture Notes in Computer Science (LNCS), vol. 4876, C. Adams, A. Miri and M. J. Wiener (eds.), pp. 84-95, Springer-Verlag, 2007.
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. Robshaw, Yanick Seurin, C. Vikkelsoe.
Small-Footprint Block Cipher Design - How far can you go?
Workshop on RFID Security 2007, 14 pages, 2007.
Andrey Bogdanov.
Attacks on the Keeloq Block Cipher and Authentication Systems.
Workshop on RFID Security 2007, 12 pages, 2007.
Nicolas T. Courtois, Gregory V. Bard, Andrey Bogdanov.
Sliding Attacks, Ciphers with Small Blocks and Recent Attacks on KeeLoq.
TATRACRYPT 2007, 1 page, 2007.
Andrey Bogdanov, Marius Mertens, Christof Paar, Jan Pelzl, Andy Rupp.
SMITH - A Parallel Hardware Architecture for Fast Gaussian Elimination over GF(2).
Special Purpose Hardware for Attacking Cryptographic Systems - SHARCS 2006, 12 pages, 2006.
Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov.
Security and Implementation Properties of ABC v.2.
The State of the Art of Stream Ciphers - SASC 2006, 12 pages, 2006.
Andrey Bogdanov, Marius Mertens, Christof Paar, Jan Pelzl, Andy Rupp.
A Parallel Hardware Architecture for Fast Gaussian Elimination over GF(2).
14th Annual IEEE Symposium on Field-Programmable Custom Computing Machines - FCCM 2006, pp. 237 - 248, IEEE, 2006.
Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov, Sandeep Kumar.
ABC: A New Fast Flexible Stream Cipher.
Symmetric Key Encryption Workshop - SKEW 2005, 18 pages, 2006.
Towards Practical Whitebox Cryptography: Optimizing Efficient and Space Hardness.Asiacrypt'16, Hanoi, December 2016
Towards Secure Whitebox Cryptography.WhibOx, Santa Barbara, USA, August 2016
Towards Robust Whitebox Cryptography. Summer School on Real-World Crypto and Privacy, Sibenik, Croatia, June 2016
Round Gating for Low Energy Block Ciphers. IEEE International Symposium on Hardware Oriented Security and Trust (HOST'16'), Washington DC, USA, May 2016
Low-Area Hardware Implementations of CLOC, SILC and AES-OTR. IEEE International Symposium on Hardware Oriented Security and Trust (HOST'16'), Washington DC, USA, May 2016
Low-Energy Symmetric-Key Cryptography. TRUDEVICE Training School, Leukerbad, Switzerland, April 2016
Energy Efficient Block Ciphers. Dagstuhl Seminar on Symmetric Cryptography, Dagstuhl, Germany, January 2016
Invited talk Symmetric-Key Cryptography in Untrusted Environments. 15th Central European Conference on Cryptology, Klagenfurt, Austria, July 2015.
Invited talk Towards Post-Snowden Cryptography. 4th Workshop on Current Trends in Cryptology, CTCrypt 2015, Kazan, Russia, June 2015.
How Secure is AES under Patronizing Trojans? Early Symmetric Crypto (ESC), Clervaux, Luxembourg, January 2015.
Invited talk Advances and Challenges in Authenticated Encryption. 4th Annual Conference on Cryptographic Mathematics of CACR, TCCM'14, Beijing, China, September 2014.
Invited lecture Authenticated Encryption. Summer School on Design and Security of Cryptographic Algorithms and Devices. Sibenik, Croatia, June 2014.
Invited lecture Authenticated Ciphers. Summer School on Design and Security of Cryptographic Algorithms and Devices. Sibenik, Croatia, June 2014.
Invited lecture Authenticated Encryption in High-Performance Parallel Software. NICT and NTT, Tokyo, Japan, April 2014.
Invited lecture Zero-Correlation Cryptanalysis. NICT and NTT, Tokyo, Japan, April 2014.
The Bits of Linear Trails. Dagstuhl Seminar on Symmetric Cryptography, Dagstuhl, Germany, January 2014
Invited lecture Authenticated Encryption and Recent Trends in Cryptanalysis. Winter School in Information Security, Finse, Norway, April 2013.
Towards the Optimality of Feistel Ciphers with Substitution-Permutation Functions. WCC'13, Bergen, Norway, April 2013.
On the Indifferentiability of Key-Alternating Ciphers. Shanghai Normal University, Shanghai, China, April 2013.
Towards Understanding the Known-Key Security of Block Ciphers. FSE'13, Singapore, March 2013.
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. FSE'13, Singapore, March 2013.
Invited talk Even-Mansour Revisited: Buidling Ideal Cipher from a Few Random Permutations. Norwegian Crypto Seminar - NKC'12, Oslo, Norway, November 2012.
Efficient Lightweight AES-Based Authenticated Encryption. DIAC'12 - Directions in Authenticated Ciphers. Stockholm, Sweden, July 2012.
Block Cipher Cryptanalysis: Basic and Advanced Techniques II. ECRYPT II PhD Summer School on Tools for Cryptanalysis. Mykonos, Greece, May 2012.
Block Cipher Cryptanalysis: Basic and Advanced Techniques I. ECRYPT II PhD Summer School on Tools for Cryptanalysis. Mykonos, Greece, May 2012.
On the Practical Impact of the Biclique Key Recovery for AES-128. NXP, Leuven, Belgium, May 2012.
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. FSE'12, Washington D.C., USA, March 2012.
Invited talk Biclique Key Recovery for the Full AES. ICS forum, Aalto University, Finland, February 2012.
Two Recent Topics in Linear Cryptanalysis. Dagstuhl Seminar "Symmetric Cryptography", Dagstuhl, Germany, January 2012.
Biclique Cryptanalysis of the Full AES. ASIACRYPT'11, Seoul, Korea, December 2011.
Invited talk Biclique Cryptanalysis of the Full AES. Ruhr University Bochum, Germany, November 2011.
Invited talk Recent Advances in Symmetric-Key Cryptanalysis: Bicliques and Zero Correlation. Sony Corporation, Tokyo, Japan, October 2011.
SPONGENT: A Lightweight Hash Function. Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, Nara, Japan, October 2011.
Invited talk On the efficiency of code-based block cipher constructions. Belgian Royal Flemish Academy of Sciences Contact Forum "Coding Theory and Cryptography IV", Brussels, Belgium, September 2011.
Zero Correlation Linear Cryptanalysis. Workshop on Symmetric Cryptanalysis, Microsoft Research, Redmond, USA, August 2011.
Invited talk Zero-Correlation Attacks in Linear Cryptanalysis. ENS, Paris, France, July 2011.
Invited lecture Block Cipher Cryptanalysis II: Linear Cryptanalysis. ECRYPT II PhD Summer School on Design and Security
of Cryptographic Algorithms and Devices. Albena, Bulgaria, June 2011.
Invited talk Lightweight Cryptographic Algorithms: Dos and Don'ts. Microsoft Research. Redmond, USA, May 2011.
Invited talk Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. UCL Crypto Seminar. Louvain-la-Neuve, Belgium, January 2011.
Bounds for Balanced and Generalized Feistel Constructions. ECRYPT II Research Retreat on Bounds for Symmetric Constructions. Leuven, Belgium, October 2010.
Universal Related-Key Linear Hull Distinguishers for
Key-Alternating Block Ciphers. CRYPTO 2010 Rump Session, Santa Barbara, USA, August 2010.
Generalized Meet-in-the-Middle Attacks:
Cryptanalysis of the Lightweight Block Cipher KTANTAN. The 17th Annual Workshop on Selected Areas in Cryptography - SAC 2010, Waterloo, Canada, August 2010.
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Progress in Cryptology - INDOCRYPT 2008, Kharagpur, India, December 2008.
Multiple-Differential Side-Channel Collision Attacks on AES.
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2008, Washington D.C., USA, August 2008.
Invited talk IT-Sicherheit im Automobil: Chancen und Schwierigkeiten. Kryptologie in Theorie und Praxis, Informatik 2007, Bremen, Germany, September 2007.
A Hardware-Assisted Realtime Attack on A5/2 without Precomputations. Workshop on Cryptographic Hardware and Embedded Systems - CHES 2007, Vienna, Austria, September 2007.
Improved Side-Channel Collision Attacks on AES.
The 14th Annual Workshop on Selected Areas in Cryptography - SAC 2007, Ottawa, Canada, August 2007.
Small-Footprint Block Cipher Design - How far can you go? The 3rd Conference on RFID Security - RFIDSec 2007, Malaga, Spain, July 2007.
Attacks on the KeeLoq Block Cipher and Authentication Systems. The 3rd Conference on RFID Security - RFIDSec 2007, Malaga, Spain, July 2007.
Program committees:
Eurocrypt 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, April 29-May 3, 2018, Tel Aviv, Israel
Indocrypt 2017: 18th International Conference on Cryptology in India, India
ASIACCS 2017: ACM Asia Conference on Computer and Communications Security, 2-6 April, 2017, Abu Dhabi, UAE
SEMS 2017: Workshop on Security for Embedded and Mobile Systems, 30 April, 2017, Paris, France
Eurocrypt 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 30 April-4 May, 2017, Paris, France
CS2 2017: 4th Workshop on Cryptography and Security in Computing Systems, 24 January 2017, Stockholm, Sweden
LightSec 2016(Program Chair): 5th International Workshop on Lightweight Cryptography and Privacy, September 21-22, 2016, Cappadocia, Turkey
Indocrypt 2016: 17th International Conference on Cryptology in India, December 11-14, 2016, Kolkata, India
ICISC 2016: 19th Annual International Conference on Information Security and Cryptology, November 30-December 2, 2016, EL Tower, Korea
SECRYPT 2016: 13th International Conference on Security and Cryptography, July 26-28, 2016, Lisbon, Portugal
SAC 2016: Selected Areas in Cryptography 2016, August 10-12, 2016, St. John's', Newfoundland and Labrador, Canada
WPES 2016: 15th Workshop on Privacy in the Electronic Society, October 24, 2016, Vienna, Austria
CS2 2016: 3rd Workshop on Cryptography and Security in Computing Systems, January 20, 2016, Prague, Czech Rebuplic
ArcticCrypt 2016: Selected Areas in Cryptography 2016, July 17-22, 2016, Longyearbyen, Svalbard, Norway
ICISC 2015: 18th Annual International Conference on Information Security and Cryptology, November 25-27, 2015, Seoul, Korea
LightSec 2015: 4th International Workshop on Lightweight Cryptography and Privacy, September 10-11, 2015, Bochum, Germany
SECRYPT 2015: 12th International Conference on Security and Cryptography, July 20-22, 2014, Colmar, France
FSE 2015: 22nd International Workshop on Fast Software Encryption, March 8-11, 2015, Istanbul, Turkey
ICISC 2014: 17th Annual International Conference on Information Security and Cryptology, December 3-5, 2014, Seoul, Korea
WESS 2014: 9th Workshop on Embedded Systems Security, October 17, 2014, New Delhi, India
LightSec 2014: Third International Workshop on Lightweight Cryptography for Security and Privacy, September 1-2, 2014, Istanbul, Turkey
SECRYPT 2014: 11th International Conference on Security and Cryptography, August 28-30, 2014, Vienna, Austria
ICISC 2013: 16th Annual International Conference on Information Security and Cryptology, November 27-29, 2013, Seoul, Korea
IWSEC 2013: 8th International Workshop on Security, November 18-20, 2013, Naha City, Okinawa, Japan
WESS 2013: 8th Workshop on Embedded Systems Security, September 29, 2013, Montreal, Canada
SPACE 2013: 3rd International Conference on Security, Privacy, and Applied Cryptography Engineering, October 19-23, 2013, Kharagpur, India
CHES 2013: Workshop on Cryptographic Hardware and Embedded Systems 2013, August 20-23, 2013, Santa Barbara, California, USA
SAC 2013: Selected Areas in Cryptography 2013, August 14-16, 2013, Burnaby, British Columbia, Canada
SECRYPT 2013: 10th International Conference on Security and Cryptography, July 29-31, 2013, Reykjavik, Iceland
EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 26-30, 2013, Athens, Greece
WCC 2013: Workshop on Coding and Cryptography, April 15-19, 2013, Bergen, Norway
SPACE 2012(PC Co-Chair): International Conference on Security, Privacy and Applied Cryptography Engineering, November 2-3, 2012, Chennai, India
IWSEC 2012: 7th International Workshop on Security, November 7-9, 2012, Kyushu University, Japan
SAC 2012: Conference on Selected Areas in Cryptography, August 16-17, 2012, Windsor, Canada
LC 2011: Workshop on Lightweight Cryptography 2011, November 28-29, 2011, Louvain-la-Neuve, Belgium
IWSEC 2011: 6th International Workshop on Security, November 8-10, 2011, Tokyo, Japan