Sondre Rønjom

According to our database1, Sondre Rønjom authored at least 25 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel.
IACR Trans. Symmetric Cryptol., 2022

Decomposing Linear Layers.
IACR Cryptol. ePrint Arch., 2022

2021
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n.
IACR Cryptol. ePrint Arch., 2021

A Side-Channel Assisted Attack on NTRU.
IACR Cryptol. ePrint Arch., 2021

2019
A Short Note on a Weight Probability Distribution Related to SPNs.
IACR Cryptol. ePrint Arch., 2019

Practical Attacks on Reduced-Round AES.
IACR Cryptol. ePrint Arch., 2019

The Exchange Attack: How to Distinguish 6 Rounds of AES with 2<sup>88.2</sup> chosen plaintexts.
IACR Cryptol. ePrint Arch., 2019

The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2017
Yoyo Tricks with AES.
IACR Cryptol. ePrint Arch., 2017

A New Structural-Differential Property of 5-Round AES.
IACR Cryptol. ePrint Arch., 2017

Improving algebraic attacks on stream ciphers based on linear feedback shift register over $$\mathbb {F}_{2^k}$$ F 2 k.
Des. Codes Cryptogr., 2017

2016
Invariant subspaces in Simpira.
IACR Cryptol. ePrint Arch., 2016

Subspace Trail Cryptanalysis and its Applications to AES.
IACR Cryptol. ePrint Arch., 2016

2015
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015

A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
IACR Cryptol. ePrint Arch., 2015

2011
Fast Discrete Fourier Spectra Attacks on Stream Ciphers.
IEEE Trans. Inf. Theory, 2011

Simplifying algebraic attacks with univariate analysis.
Proceedings of the Information Theory and Applications Workshop, 2011

2010
Nonlinear Equivalence of Stream Ciphers.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Algebraic Attacks on Filter and Combiner Generators.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

2008
On the Number of Linearly Independent Equations Generated by XL.
Proceedings of the Sequences and Their Applications, 2008

2007
A New Attack on the Filter Generator.
IEEE Trans. Inf. Theory, 2007

Attacking the Filter Generator over <i>GF</i> (2<sup> <i>m</i> </sup>).
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

The Linear Vector Space Spanned by the Nonlinear Filter Generator.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007

On Attacks on Filtering Generators Using Linear Subspace Structures.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007

A Survey of Recent Attacks on the Filter Generator.
Proceedings of the Applied Algebra, 2007


  Loading...