Home
Sondre Rønjom's picture

Sondre Rønjom

Associate Professor
  • E-mailSondre.Ronjom@uib.no
  • Phone+47 55 58 40 19
  • Visitor Address
    HIB - Thormøhlensgt. 55
  • Postal Address
    Postboks 7803
    5020 Bergen
Academic article
  • 2019. The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts. Lecture Notes in Computer Science (LNCS). 347-370.
  • 2019. Practical attacks on reduced-round AES. Lecture Notes in Computer Science (LNCS). 297-310.
  • 2017. Yoyo tricks with AES. Lecture Notes in Computer Science (LNCS). 217-243.
  • 2017. Improving algebraic attacks on stream ciphers based on linear feedback shift register over \mathbb {F}_{2^k}. Designs, Codes and Cryptography.
  • 2017. A new structural-differential property of 5-round AES. Lecture Notes in Computer Science (LNCS). 289-317.
  • 2011. Fast discrete Fourier spectra attacks on stream ciphers. IEEE Transactions on Information Theory. 5555-5565.
  • 2008. On the Number of Linearly Independent Equations Generated by XL. Lecture Notes in Computer Science (LNCS). 239-251.
  • 2007. The linear vector space spanned by the nonlinear filter generator. Lecture Notes in Computer Science (LNCS). 169-183.
  • 2007. On attacks on filtering generators using linear subspace structures. Lecture Notes in Computer Science (LNCS). 204-217.
  • 2007. Attacking the filter generator over GF(2^m). Lecture Notes in Computer Science (LNCS). 264-275.
  • 2007. A survey of recent attacks on the filter generator. Lecture Notes in Computer Science (LNCS). 7-17.
  • 2007. A new attack on the filter generator. IEEE Transactions on Information Theory. 1752-1758.
Lecture
  • 2019. Informasjonssikkerhet i høyere utdanning.
Academic lecture
  • 2015. A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
  • 2010. Nonlinear Equivalence of Stream Ciphers.
Doctoral dissertation
  • 2009. Cryptanalysis of ciphers over finite cyclic groups.
Academic chapter/article/Conference paper
  • 2011. Simplifying algebraic attacks with univariate analysis.
  • 2009. Algebraic Attacks on Filter and Combiner Generator. 10 pages.
Article in business/trade/industry journal
  • 2019. Informasjonssikkerhet i høyere utdanning. Nordic Journal of STEM Education. 267-271.

More information in national current research information system (CRIStin)