Vesselin Velichkov

According to our database1, Vesselin Velichkov authored at least 29 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK.
IACR Cryptol. ePrint Arch., 2024

2023
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak.
IACR Cryptol. ePrint Arch., 2023

New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence.
IACR Cryptol. ePrint Arch., 2022

Meet-in-the-Filter and Dynamic Counting with Applications to Speck.
IACR Cryptol. ePrint Arch., 2022

2021
Automated Truncation of Differential Trails and Trail Clustering in ARX.
IACR Cryptol. ePrint Arch., 2021

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Lightweight AEAD and Hashing using the Sparkle Permutation Family.
IACR Trans. Symmetric Cryptol., 2020

Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Alzette: A 64-bit ARX-box.
IACR Cryptol. ePrint Arch., 2019

2017
Analysis of the NORX Core Permutation.
IACR Cryptol. ePrint Arch., 2017

2016
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptol. ePrint Arch., 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}.
IACR Cryptol. ePrint Arch., 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Analysis of the Authenticated Cipher MORUS (v1).
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Differential Analysis of Block Ciphers SIMON and SPECK.
IACR Cryptol. ePrint Arch., 2014

Automatic Search for Differential Trails in ARX Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
Automatic Search for Differential Trails in ARX Ciphers (Extended Version).
IACR Cryptol. ePrint Arch., 2013

2012
Recent Methods for Cryptanalysis of Symmetric-key Cryptographic Algorithms (Recente Methoden voor de Cryptanalyse van Symmetrische-sleutel Cryptografische Algoritmen).
PhD thesis, 2012

UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

A cross-protocol attack on the TLS protocol.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
The Additive Differential Probability of ARX.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Meet-in-the-Middle Attacks on Reduced-Round XTEA.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

2010
Algebraic cryptanalysis of a small-scale version of stream cipher Lex.
IET Inf. Secur., 2010

The Differential Analysis of S-Functions.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2008
Demonstration of unobservable voice over IP.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On the Practical Performance of Rateless Codes.
Proceedings of the WINSYS 2008, 2008

2004
Adaptive license plate image extraction.
Proceedings of the 5th International Conference on Computer Systems and Technologies, 2004


  Loading...