Sondre Rønjom
Stilling
professor, kryptografi og cybersikkerhet
Tilhørighet
Publikasjoner
Vitenskapelig artikkel
- Navid Ghaedi Bardeh; Sondre Rønjom (2019). Practical attacks on reduced-round AES. (ekstern lenke)
- Sondre Rønjom; Guang Gong; Tor Helleseth (2007). A survey of recent attacks on the filter generator. (ekstern lenke)
- Sondre Rønjom; Tor Helleseth (2007). A new attack on the filter generator. (ekstern lenke)
- Sondre Rønjom; Tor Helleseth (2007). Attacking the filter generator over GF(2^m). (ekstern lenke)
- Navid Ghaedi Bardeh; Sondre Rønjom (2019). The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts. (ekstern lenke)
- Sondre Rønsom; Håvard Raddum (2008). On the Number of Linearly Independent Equations Generated by XL. (ekstern lenke)
- Guang Gong; Sondre Rønjom; Tor Helleseth et al. (2011). Fast discrete Fourier spectra attacks on stream ciphers. (ekstern lenke)
- Sondre Rønjom; Tor Helleseth (2007). The linear vector space spanned by the nonlinear filter generator. (ekstern lenke)
- Sondre Rønjom; Navid Ghaedi Bardeh; Tor Helleseth (2017). Yoyo tricks with AES. (ekstern lenke)
- Sondre Rønjom; Guang Gong; Tor Helleseth (2007). On attacks on filtering generators using linear subspace structures. (ekstern lenke)
- Christof Beierle; Patrick Felke; Gregor Leander et al. (2022). Decomposing Linear Layers. (ekstern lenke)
- Lorenzo Grassi; Dmitry Khovratovich; Sondre Rønjom et al. (2022). The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over F<sup>n</sup> <inf>p</inf>: Preimage Attack on Full Grendel. (ekstern lenke)
- Simen Gaure; Stefanos Koffas; Stjepan Picek et al. (2025). L 2 · M = C2 LARGE LANGUAGE MODELS ARE COVERT CHANNELS. (ekstern lenke)
- Sondre Rønjom (2017). Improving algebraic attacks on stream ciphers based on linear feedback shift register over \mathbb {F}_{2^k}. (ekstern lenke)
- Lorenzo Grassi; Christian Rechberger; Sondre Rønjom (2017). A new structural-differential property of 5-round AES. (ekstern lenke)