Vesselin Velichkov

According to our database1, Vesselin Velichkov authored at least 19 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Alzette: A 64-bit ARX-box.
IACR Cryptology ePrint Archive, 2019

2017
Analysis of the NORX Core Permutation.
IACR Cryptology ePrint Archive, 2017

2016
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptology ePrint Archive, 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}.
IACR Cryptology ePrint Archive, 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Analysis of the Authenticated Cipher MORUS (v1).
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Differential Analysis of Block Ciphers SIMON and SPECK.
IACR Cryptology ePrint Archive, 2014

Automatic Search for Differential Trails in ARX Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
Automatic Search for Differential Trails in ARX Ciphers (Extended Version).
IACR Cryptology ePrint Archive, 2013

2012
Recent Methods for Cryptanalysis of Symmetric-key Cryptographic Algorithms (Recente Methoden voor de Cryptanalyse van Symmetrische-sleutel Cryptografische Algoritmen).
PhD thesis, 2012

UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

A cross-protocol attack on the TLS protocol.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
The Additive Differential Probability of ARX.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Meet-in-the-Middle Attacks on Reduced-Round XTEA.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

2010
Algebraic cryptanalysis of a small-scale version of stream cipher Lex.
IET Information Security, 2010

The Differential Analysis of S-Functions.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2008
Demonstration of unobservable voice over IP.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On the Practical Performance of Rateless Codes.
Proceedings of the WINSYS 2008, 2008


  Loading...