Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Udovenko, Aleksei
add a person with the name Udovenko, Aleksei
 

Other publications of authors with the same name

Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1., , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 372-402. Springer, (2016)Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)., , , , , and . IACR Cryptology ePrint Archive, (2016)The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob., , and . IACR Cryptology ePrint Archive, (2015)On Degree-d Zero-Sum Sets of Full Rank., , and . IACR Cryptology ePrint Archive, (2018)Analysis of the NORX Core Permutation., , and . IACR Cryptology ePrint Archive, (2017)Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem., , and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 93-122. Springer, (2016)Optimal First-Order Boolean Masking for Embedded IoT Devices., , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 22-41. Springer, (2017)Design Strategies for ARX with Provable Bounds: Sparx and LAX., , , , , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 484-513. (2016)Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)., , and . IACR Cryptology ePrint Archive, (2016)Attacks and Countermeasures for White-box Designs., and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 373-402. Springer, (2018)