Tim Beyne

Orcid: 0000-0001-5638-9885

According to our database1, Tim Beyne authored at least 24 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Note on the cryptanalysis of Speedy.
IACR Cryptol. ePrint Arch., 2024

2023
Multidimensional Linear Cryptanalysis of Feistel Ciphers.
IACR Trans. Symmetric Cryptol., 2023

Integral Cryptanalysis Using Algebraic Transition Matrices.
IACR Cryptol. ePrint Arch., 2023

An invariant of the round function of QARMAv2-64.
IACR Cryptol. ePrint Arch., 2023

Poster: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Truncated Differential Attacks on Contracting Feistel Ciphers.
IACR Trans. Symmetric Cryptol., 2022

Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Differential Cryptanalysis in the Fixed-Key Model.
IACR Cryptol. ePrint Arch., 2022

Provably Secure Reflection Ciphers.
IACR Cryptol. ePrint Arch., 2022

An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO".
CoRR, 2022

Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
A Low-Randomness Second-Order Masked AES.
IACR Cryptol. ePrint Arch., 2021

A Geometric Approach to Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

Linear Cryptanalysis of FF3-1 and FEA.
IACR Cryptol. ePrint Arch., 2021

Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
IACR Trans. Symmetric Cryptol., 2020

Block Cipher Invariants as Eigenvectors of Correlation Matrices.
J. Cryptol., 2020

Revisiting the Wrong-Key-Randomization Hypothesis.
J. Cryptol., 2020

Cryptanalysis of the MALICIOUS Framework.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of Masked Ciphers: A not so Random Idea.
IACR Cryptol. ePrint Arch., 2020

On the security of the Rescue hash function.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

2019
Cryptanalysis of the Legendre PRF and generalizations.
IACR Cryptol. ePrint Arch., 2019

2016
Uniform First-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2016


  Loading...