scispace - formally typeset
Search or ask a question
Author

Andrey Bogdanov

Bio: Andrey Bogdanov is an academic researcher from Saint Petersburg State University of Information Technologies, Mechanics and Optics. The author has contributed to research in topics: Block cipher & Metamaterial. The author has an hindex of 51, co-authored 384 publications receiving 11866 citations. Previous affiliations of Andrey Bogdanov include Saint Petersburg State Polytechnic University & Russian Academy of Sciences.


Papers
More filters
Book ChapterDOI
10 Sep 2007
TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Abstract: With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present . Both security and hardware efficiency have been equally important during the design of the cipher and at 1570 GE, the hardware requirements for present are competitive with today's leading compact stream ciphers.

2,202 citations

Journal Article
TL;DR: In this paper, the authors describe an ultra-lightweight block cipher, present, which is suitable for extremely constrained environments such as RFID tags and sensor networks, but it is not suitable for very large networks such as sensor networks.
Abstract: With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present . Both security and hardware efficiency have been equally important during the design of the cipher and at 1570 GE, the hardware requirements for present are competitive with today's leading compact stream ciphers.

1,750 citations

Journal ArticleDOI
TL;DR: It is revealed that metasurfaces created by seemingly different lattices of (dielectric or metallic) meta-atoms with broken in-plane symmetry can support sharp high-Q resonances arising from a distortion of symmetry-protected bound states in the continuum.
Abstract: We reveal that metasurfaces created by seemingly different lattices of (dielectric or metallic) meta-atoms with broken in-plane symmetry can support sharp high-$Q$ resonances arising from a distortion of symmetry-protected bound states in the continuum. We develop a rigorous theory of such asymmetric periodic structures and demonstrate a link between the bound states in the continuum and Fano resonances. Our results suggest the way for smart engineering of resonances in metasurfaces for many applications in nanophotonics and metaoptics.

851 citations

Book ChapterDOI
04 Dec 2011
TL;DR: This paper presents the novel technique of block cipher cryptanalysis with bicliques, which leads to the following results: the first key recovery method for the full AES-128 with computational complexity 2126.1.4 and key recovery methods with lower complexity for the reduced-round versions of AES not considered before.
Abstract: Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the 192/256-bit key variants (out of 12/14 rounds) has been one of the most difficult challenges in the cryptanalysis of block ciphers for more than a decade. In this paper, we present the novel technique of block cipher cryptanalysis with bicliques, which leads to the following results: The first key recovery method for the full AES-128 with computational complexity 2126.1. The first key recovery method for the full AES-192 with computational complexity 2189.7. The first key recovery method for the full AES-256 with computational complexity 2254.4. Key recovery methods with lower complexity for the reduced-round versions of AES not considered before, including cryptanalysis of 8-round AES-128 with complexity 2124.9. Preimage search for compression functions based on the full AES versions faster than brute force. In contrast to most shortcut attacks on AES variants, we do not need to assume related-keys. Most of our techniques only need a very small part of the codebook and have low memory requirements, and are practically verified to a large extent. As our cryptanalysis is of high computational complexity, it does not threaten the practical use of AES in any way.

543 citations

Journal ArticleDOI
17 Jan 2020-Science
TL;DR: This work implements a new physical mechanism for suppressing radiative losses of individual nanoscale resonators to engineer special modes with high quality factors: optical bound states in the continuum (BICs), and demonstrates that an individual subwavelength dielectric resonator hosting a BIC mode can boost nonlinear effects increasing second-harmonic generation efficiency.
Abstract: Subwavelength optical resonators made of high-index dielectric materials provide efficient ways to manipulate light at the nanoscale through mode interferences and enhancement of both electric and magnetic fields. Such Mie-resonant dielectric structures have low absorption, and their functionalities are limited predominantly by radiative losses. We implement a new physical mechanism for suppressing radiative losses of individual nanoscale resonators to engineer special modes with high quality factors: optical bound states in the continuum (BICs). We demonstrate that an individual subwavelength dielectric resonator hosting a BIC mode can boost nonlinear effects increasing second-harmonic generation efficiency. Our work suggests a route to use subwavelength high-index dielectric resonators for a strong enhancement of light-matter interactions with applications to nonlinear optics, nanoscale lasers, quantum photonics, and sensors.

543 citations


Cited by
More filters
01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

01 Jan 2011

2,117 citations

Proceedings ArticleDOI
13 Mar 2017
TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Abstract: Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight instantiation of a BC particularly geared for use in IoT by eliminating the Proof of Work (POW) and the concept of coins. Our approach was exemplified in a smart home setting and consists of three main tiers namely: cloud storage, overlay, and smart home. In this paper we delve deeper and outline the various core components and functions of the smart home tier. Each smart home is equipped with an always online, high resource device, known as “miner” that is responsible for handling all communication within and external to the home. The miner also preserves a private and secure BC, used for controlling and auditing communications. We show that our proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability. Finally, we present simulation results to highlight that the overheads (in terms of traffic, processing time and energy consumption) introduced by our approach are insignificant relative to its security and privacy gains.

1,340 citations