Follow
Tim Beyne
Tim Beyne
COSIC, KU Leuven
Verified email at kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
752020
Block cipher invariants as eigenvectors of correlation matrices
T Beyne
Journal of Cryptology 33 (3), 1156-1183, 2020
542020
Elephant v2
T Beyne, YL Chen, C Dobraunig, B Mennink
492021
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus
T Beyne, YL Chen, C Dobraunig, B Mennink
IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020
382020
Cryptanalysis of the Legendre PRF and Generalizations
W Beullens, T Beyne, A Udovenko, G Vitto
IACR Transactions on Symmetric Cryptology, 2020
322020
Uniform first-order threshold implementations
T Beyne, B Bilgin
Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017
212017
A geometric approach to linear cryptanalysis
T Beyne
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
182021
Revisiting the wrong-key-randomization hypothesis
T Ashur, T Beyne, V Rijmen
Journal of Cryptology 33, 567-594, 2020
182020
Differential cryptanalysis in the fixed-key model
T Beyne, V Rijmen
Annual International Cryptology Conference, 687-716, 2022
172022
Cryptanalysis of masked ciphers: A not so random idea
T Beyne, S Dhooghe, Z Zhang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
172020
Elephant v1
T Beyne, YL Chen, C Dobraunig, B Mennink
16*2019
Cryptanalysis of efficient masked ciphers: applications to low latency
T Beyne, S Dhooghe, A Moradi, AR Shahmirzadi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 679-721, 2022
152022
Multi-user security of the elephant v2 authenticated encryption mode
T Beyne, YL Chen, C Dobraunig, B Mennink
International Conference on Selected Areas in Cryptography, 155-178, 2021
142021
A low-randomness second-order masked AES
T Beyne, S Dhooghe, A Ranea, D Šijačić
International Conference on Selected Areas in Cryptography, 87-110, 2021
112021
Elephant v1. 1
T Beyne, YL Chen, C Dobraunig, B Mennink
Submission to NIST Lightweight Cryptography, 2019
112019
Linear cryptanalysis of FF3-1 and FEA
T Beyne
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
102021
On the security of the Rescue hash function
T Beyne, A Canteaut, G Leander, MN Plasencia, L Perrin, F Wiemer
IACR Cryptology ePrint Archive, 2020
102020
Linear Cryptanalysis in the Weak Key Model
T Beyne
72019
Constructing and deconstructing intentional weaknesses in symmetric ciphers
C Beierle, T Beyne, P Felke, G Leander
Annual International Cryptology Conference, 748-778, 2022
62022
An overview of the eight international olympiad in cryptography" Non-Stop University Crypto"
A Gorodilova, N Tokareva, S Agievich, I Beterov, T Beyne, L Budaghyan, ...
arXiv preprint arXiv:2204.11502, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20