Folgen
Tim Beyne
Tim Beyne
COSIC, KU Leuven
Bestätigte E-Mail-Adresse bei kuleuven.be - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
712020
Elephant v2
T Beyne, YL Chen, C Dobraunig, B Mennink
442021
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus
T Beyne, YL Chen, C Dobraunig, B Mennink
IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020
332020
Block cipher invariants as eigenvectors of correlation matrices
T Beyne
International Conference on the Theory and Application of Cryptology and …, 2018
322018
Cryptanalysis of the Legendre PRF and Generalizations
W Beullens, T Beyne, A Udovenko, G Vitto
IACR Transactions on Symmetric Cryptology, 2020
292020
Uniform first-order threshold implementations
T Beyne, B Bilgin
Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017
202017
Block cipher invariants as eigenvectors of correlation matrices
T Beyne
Journal of Cryptology 33 (3), 1156-1183, 2020
192020
Revisiting the wrong-key-randomization hypothesis
T Ashur, T Beyne, V Rijmen
Journal of Cryptology 33, 567-594, 2020
182020
Elephant v1
T Beyne, YL Chen, C Dobraunig, B Mennink
16*2019
A geometric approach to linear cryptanalysis
T Beyne
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
152021
Cryptanalysis of masked ciphers: A not so random idea
T Beyne, S Dhooghe, Z Zhang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
152020
Differential cryptanalysis in the fixed-key model
T Beyne, V Rijmen
Annual International Cryptology Conference, 687-716, 2022
142022
Cryptanalysis of efficient masked ciphers: applications to low latency
T Beyne, S Dhooghe, A Moradi, AR Shahmirzadi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 679-721, 2022
142022
Multi-user security of the elephant v2 authenticated encryption mode
T Beyne, YL Chen, C Dobraunig, B Mennink
International Conference on Selected Areas in Cryptography, 155-178, 2021
102021
Elephant v1. 1
T Beyne, YL Chen, C Dobraunig, B Mennink
Submission to NIST Lightweight Cryptography, 2019
102019
A low-randomness second-order masked AES
T Beyne, S Dhooghe, A Ranea, D Šijačić
International Conference on Selected Areas in Cryptography, 87-110, 2021
92021
Linear Cryptanalysis of FF3-1 and FEA
T Beyne
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
92021
On the security of the Rescue hash function
T Beyne, A Canteaut, G Leander, MN Plasencia, L Perrin, F Wiemer
IACR Cryptology ePrint Archive, 2020
72020
Linear Cryptanalysis in the Weak Key Model
T Beyne
62019
Fluctuation scaling in metals
S Beyne, T Beyne
2017 International Conference on Noise and Fluctuations (ICNF), 1-4, 2017
62017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20