Hjem
Sondre Rønjoms bilde

Sondre Rønjom

Førsteamanuensis
  • E-postSondre.Ronjom@uib.no
  • Telefon+47 55 58 40 19
  • Besøksadresse
    HIB - Thormøhlensgt. 55
  • Postadresse
    Postboks 7803
    5020 Bergen
Vitenskapelig artikkel
  • Bardeh, Navid Ghaedi; Rønjom, Sondre. 2019. The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts. Lecture Notes in Computer Science (LNCS). 347-370.
  • Bardeh, Navid Ghaedi; Rønjom, Sondre. 2019. Practical attacks on reduced-round AES. Lecture Notes in Computer Science (LNCS). 297-310.
  • Rønjom, Sondre; Bardeh, Navid Ghaedi; Helleseth, Tor. 2017. Yoyo tricks with AES. Lecture Notes in Computer Science (LNCS). 217-243.
  • Rønjom, Sondre. 2017. Improving algebraic attacks on stream ciphers based on linear feedback shift register over \mathbb {F}_{2^k}. Designs, Codes and Cryptography.
  • Grassi, Lorenzo; Rechberger, Christian; Rønjom, Sondre. 2017. A new structural-differential property of 5-round AES. Lecture Notes in Computer Science (LNCS). 289-317.
  • Gong, Guang; Rønjom, Sondre; Helleseth, Tor; Hu, Honggang. 2011. Fast discrete Fourier spectra attacks on stream ciphers. IEEE Transactions on Information Theory. 5555-5565.
  • Rønsom, Sondre; Raddum, Håvard. 2008. On the Number of Linearly Independent Equations Generated by XL. Lecture Notes in Computer Science (LNCS). 239-251.
  • Rønjom, Sondre; Helleseth, Tor. 2007. The linear vector space spanned by the nonlinear filter generator. Lecture Notes in Computer Science (LNCS). 169-183.
  • Rønjom, Sondre; Gong, Guang; Helleseth, Tor. 2007. On attacks on filtering generators using linear subspace structures. Lecture Notes in Computer Science (LNCS). 204-217.
  • Rønjom, Sondre; Helleseth, Tor. 2007. Attacking the filter generator over GF(2^m). Lecture Notes in Computer Science (LNCS). 264-275.
  • Rønjom, Sondre; Gong, Guang; Helleseth, Tor. 2007. A survey of recent attacks on the filter generator. Lecture Notes in Computer Science (LNCS). 7-17.
  • Rønjom, Sondre; Helleseth, Tor. 2007. A new attack on the filter generator. IEEE Transactions on Information Theory. 1752-1758.
Faglig foredrag
  • Andersen, Anders; Berre, Tor; Ellingsen, Pål; Habib, Laurence Marie Anna; Haddara, Moutaz; Hjelmås, Erik; Jakobsen, Mette Mo; Jøsang, Audun; Nätt, Tom Heine; Li, Jingyue; Nygård, Arne Roar; Rønjom, Sondre; Schaathun, Hans Georg; Steen, Arild; Torgersen, Tor-Fredrik. 2019. Informasjonssikkerhet i høyere utdanning.
Vitenskapelig foredrag
  • Rønjom, Sondre; Leander, Gregor; Minaud, Brice. 2015. A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
  • Rønjom, Sondre; Cid, Carlos. 2010. Nonlinear Equivalence of Stream Ciphers.
Doktorgradsavhandling
  • Rønjom, Sondre. 2009. Cryptanalysis of ciphers over finite cyclic groups.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Helleseth, Tor; Rønjom, Sondre. 2011. Simplifying algebraic attacks with univariate analysis.
  • Helleseth, Tor; Hojsik, Michal; Rønjom, Sondre. 2009. Algebraic Attacks on Filter and Combiner Generator. 10 sider.
Fagartikkel
  • Andersen, Anders; Berre, Tor; Ellingsen, Pål; Habib, Laurence Marie Anna; Haddara, Moutaz; Hjelmås, Erik; Jakobsen, Mette Mo; Jøsang, Audun; Nätt, Tom Heine; Li, Jingyue; Nygård, Arne Roar; Rønjom, Sondre; Schaathun, Hans Georg; Steen, Arild; Torgersen, Tor-Fredrik. 2019. Informasjonssikkerhet i høyere utdanning. Nordic Journal of STEM Education. 267-271.

Se fullstendig oversikt over publikasjoner i CRIStin.