default search action
Vesselin Velichkov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i11]Oana Ciobotaru, Maxim Peter, Vesselin Velichkov:
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK. IACR Cryptol. ePrint Arch. 2024: 398 (2024) - 2023
- [c19]Mohammad Vaziri, Vesselin Velichkov:
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak. ACNS Workshops 2023: 43-62 - [c18]Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. ACNS (1) 2023: 149-177 - [c17]Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems:
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode. CRYPTO (3) 2023: 507-539 - [i10]Mohammad Vaziri, Vesselin Velichkov:
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak. IACR Cryptol. ePrint Arch. 2023: 936 (2023) - 2022
- [i9]Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. IACR Cryptol. ePrint Arch. 2022: 673 (2022) - [i8]Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Vesselin Velichkov:
Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence. IACR Cryptol. ePrint Arch. 2022: 840 (2022) - 2021
- [c16]Anupam Chattopadhyay, Mustafa Khairallah, Gaëtan Leurent, Zakaria Najm, Thomas Peyrin, Vesselin Velichkov:
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study. CT-RSA 2021: 657-681 - [c15]Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto:
Automated Truncation of Differential Trails and Trail Clustering in ARX. SAC 2021: 286-307 - [i7]Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto:
Automated Truncation of Differential Trails and Trail Clustering in ARX. IACR Cryptol. ePrint Arch. 2021: 1194 (2021) - 2020
- [j2]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans. Symmetric Cryptol. 2020(S1): 208-261 (2020) - [c14]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). CRYPTO (3) 2020: 419-448
2010 – 2019
- 2019
- [i6]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-bit ARX-box. IACR Cryptol. ePrint Arch. 2019: 1378 (2019) - 2017
- [i5]Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov:
Analysis of the NORX Core Permutation. IACR Cryptol. ePrint Arch. 2017: 34 (2017) - 2016
- [c13]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: Sparx and LAX. ASIACRYPT (1) 2016: 484-513 - [c12]Alex Biryukov, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. FSE 2016: 289-310 - [i4]Alex Biryukov, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}. IACR Cryptol. ePrint Arch. 2016: 409 (2016) - [i3]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version). IACR Cryptol. ePrint Arch. 2016: 984 (2016) - 2015
- [c11]Aleksandra Mileva, Vesna Dimitrova, Vesselin Velichkov:
Analysis of the Authenticated Cipher MORUS (v1). BalkanCryptSec 2015: 45-59 - 2014
- [c10]Alex Biryukov, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers. CT-RSA 2014: 227-250 - [c9]Alex Biryukov, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. FSE 2014: 546-570 - [i2]Alex Biryukov, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. IACR Cryptol. ePrint Arch. 2014: 922 (2014) - 2013
- [i1]Alex Biryukov, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers (Extended Version). IACR Cryptol. ePrint Arch. 2013: 853 (2013) - 2012
- [b1]Vesselin Velichkov:
Recent Methods for Cryptanalysis of Symmetric-key Cryptographic Algorithms (Recente Methoden voor de Cryptanalyse van Symmetrische-sleutel Cryptografische Algoritmen). Katholieke Universiteit Leuven, Belgium, 2012 - [c8]Nikos Mavrogiannopoulos, Frederik Vercauteren, Vesselin Velichkov, Bart Preneel:
A cross-protocol attack on the TLS protocol. CCS 2012: 62-72 - [c7]Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. FSE 2012: 287-305 - 2011
- [c6]Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel:
Meet-in-the-Middle Attacks on Reduced-Round XTEA. CT-RSA 2011: 250-267 - [c5]Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
The Additive Differential Probability of ARX. FSE 2011: 342-358 - 2010
- [j1]Vesselin Velichkov, Vincent Rijmen, Bart Preneel:
Algebraic cryptanalysis of a small-scale version of stream cipher Lex. IET Inf. Secur. 4(2): 49-61 (2010) - [c4]Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel:
The Differential Analysis of S-Functions. Selected Areas in Cryptography 2010: 36-56
2000 – 2009
- 2008
- [c3]Miroslav Knezevic, Vesselin Velichkov, Bart Preneel, Ingrid Verbauwhede:
On the Practical Performance of Rateless Codes. WINSYS 2008: 173-176 - [c2]Miroslav Knezevic, Vesselin Velichkov:
Demonstration of unobservable voice over IP. WOWMOM 2008: 1-3 - 2004
- [c1]Vladimir A. Shapiro, Dimo Dimov, Stefan Bonchev, Vesselin Velichkov, Georgi Gluhchev:
Adaptive license plate image extraction. CompSysTech 2004: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint