- E-postsondre.ronjom@uib.no
- Telefon+47 55 58 40 19
- BesøksadresseHIB - Thormøhlens gate 555006 Bergen
- PostadressePostboks 78035020 Bergen
Jeg ser for tiden etter kandidater med god bakgrunn i diskret matematikk, statistikk, algoritmer o.l. til PhD eller Postdoc prosjekt.
I enjoy a wide interest in various topics related to cryptography and coding theory, mainly related to concrete applications. Current research topics include privacy preserving techniques (MPC/FHE, ZK-SNARKs/STARKs, DeFi, Blockchains...), symmetric key designs and analysis, algorithms and computation, post-quantum security...
Vitenskapelig artikkel
- (2022). The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over F<sup>n</sup> <inf>p</inf>: Preimage Attack on Full Grendel. IACR Transactions on Symmetric Cryptology (ToSC). 5-37.
- (2022). Decomposing Linear Layers. IACR Transactions on Symmetric Cryptology (ToSC). 243-265.
- (2019). The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts. Lecture Notes in Computer Science (LNCS). 347-370.
- (2019). Practical attacks on reduced-round AES. Lecture Notes in Computer Science (LNCS). 297-310.
- (2017). Yoyo tricks with AES. Lecture Notes in Computer Science (LNCS). 217-243.
- (2017). Improving algebraic attacks on stream ciphers based on linear feedback shift register over \mathbb {F}_{2^k}. Designs, Codes and Cryptography.
- (2017). A new structural-differential property of 5-round AES. Lecture Notes in Computer Science (LNCS). 289-317.
- (2011). Fast discrete Fourier spectra attacks on stream ciphers. IEEE Transactions on Information Theory. 5555-5565.
- (2008). On the Number of Linearly Independent Equations Generated by XL. Lecture Notes in Computer Science (LNCS). 239-251.
- (2007). The linear vector space spanned by the nonlinear filter generator. Lecture Notes in Computer Science (LNCS). 169-183.
- (2007). On attacks on filtering generators using linear subspace structures. Lecture Notes in Computer Science (LNCS). 204-217.
- (2007). Attacking the filter generator over GF(2^m). Lecture Notes in Computer Science (LNCS). 264-275.
- (2007). A survey of recent attacks on the filter generator. Lecture Notes in Computer Science (LNCS). 7-17.
- (2007). A new attack on the filter generator. IEEE Transactions on Information Theory. 1752-1758.
Faglig foredrag
- (2019). Informasjonssikkerhet i høyere utdanning.
Vitenskapelig foredrag
- (2015). A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
- (2010). Nonlinear Equivalence of Stream Ciphers.
Doktorgradsavhandling
- (2009). Cryptanalysis of ciphers over finite cyclic groups.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
- (2011). Simplifying algebraic attacks with univariate analysis.
- (2009). Algebraic Attacks on Filter and Combiner Generator. 10 sider.
Fagartikkel
- (2019). Informasjonssikkerhet i høyere utdanning. Nordic Journal of STEM Education. 267-271.