Hjem
Sondre Rønjoms bilde

Sondre Rønjom

Professor
  • E-postsondre.ronjom@uib.no
  • Telefon+47 55 58 40 19
  • Besøksadresse
    HIB - Thormøhlens gate 55
    5006 Bergen
  • Postadresse
    Postboks 7803
    5020 Bergen

Jeg ser for tiden etter kandidater med god bakgrunn i diskret matematikk, statistikk, algoritmer o.l. til PhD eller Postdoc prosjekt.

I enjoy a wide interest in various topics related to cryptography and coding theory, mainly related to concrete applications. Current research topics include privacy preserving techniques (MPC/FHE, ZK-SNARKs/STARKs, DeFi, Blockchains...), symmetric key designs and analysis, algorithms and computation, post-quantum security...



 

Vitenskapelig artikkel
  • Vis forfatter(e) (2022). The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over F<sup>n</sup> <inf>p</inf>: Preimage Attack on Full Grendel. IACR Transactions on Symmetric Cryptology (ToSC). 5-37.
  • Vis forfatter(e) (2022). Decomposing Linear Layers. IACR Transactions on Symmetric Cryptology (ToSC). 243-265.
  • Vis forfatter(e) (2019). The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts. Lecture Notes in Computer Science (LNCS). 347-370.
  • Vis forfatter(e) (2019). Practical attacks on reduced-round AES. Lecture Notes in Computer Science (LNCS). 297-310.
  • Vis forfatter(e) (2017). Yoyo tricks with AES. Lecture Notes in Computer Science (LNCS). 217-243.
  • Vis forfatter(e) (2017). Improving algebraic attacks on stream ciphers based on linear feedback shift register over \mathbb {F}_{2^k}. Designs, Codes and Cryptography.
  • Vis forfatter(e) (2017). A new structural-differential property of 5-round AES. Lecture Notes in Computer Science (LNCS). 289-317.
  • Vis forfatter(e) (2011). Fast discrete Fourier spectra attacks on stream ciphers. IEEE Transactions on Information Theory. 5555-5565.
  • Vis forfatter(e) (2008). On the Number of Linearly Independent Equations Generated by XL. Lecture Notes in Computer Science (LNCS). 239-251.
  • Vis forfatter(e) (2007). The linear vector space spanned by the nonlinear filter generator. Lecture Notes in Computer Science (LNCS). 169-183.
  • Vis forfatter(e) (2007). On attacks on filtering generators using linear subspace structures. Lecture Notes in Computer Science (LNCS). 204-217.
  • Vis forfatter(e) (2007). Attacking the filter generator over GF(2^m). Lecture Notes in Computer Science (LNCS). 264-275.
  • Vis forfatter(e) (2007). A survey of recent attacks on the filter generator. Lecture Notes in Computer Science (LNCS). 7-17.
  • Vis forfatter(e) (2007). A new attack on the filter generator. IEEE Transactions on Information Theory. 1752-1758.
Faglig foredrag
  • Vis forfatter(e) (2019). Informasjonssikkerhet i høyere utdanning.
Vitenskapelig foredrag
  • Vis forfatter(e) (2015). A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
  • Vis forfatter(e) (2010). Nonlinear Equivalence of Stream Ciphers.
Doktorgradsavhandling
  • Vis forfatter(e) (2009). Cryptanalysis of ciphers over finite cyclic groups.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Vis forfatter(e) (2011). Simplifying algebraic attacks with univariate analysis.
  • Vis forfatter(e) (2009). Algebraic Attacks on Filter and Combiner Generator. 10 sider.
Fagartikkel
  • Vis forfatter(e) (2019). Informasjonssikkerhet i høyere utdanning. Nordic Journal of STEM Education. 267-271.

Se fullstendig oversikt over publikasjoner i CRIStin.