
Alex Biryukov
Person information
- affiliation: University of Luxembourg
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [i56]Rene Pickhardt, Sergei Tikhomirov, Alex Biryukov, Mariusz Nowostawski:
Security and Privacy of Lightning Network Payments with Uncertain Channel Balances. CoRR abs/2103.08576 (2021) - [i55]Alex Biryukov, Aleksei Udovenko:
Dummy Shuffling against Algebraic Attacks in White-box Implementations. IACR Cryptol. ePrint Arch. 2021: 290 (2021) - [i54]Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov:
Analysis and Probing of Parallel Channels in the Lightning Network. IACR Cryptol. ePrint Arch. 2021: 384 (2021) - 2020
- [j14]Christof Beierle, Alex Biryukov
, Aleksei Udovenko
:
On degree-d zero-sum sets of full rank. Cryptogr. Commun. 12(4): 685-710 (2020) - [j13]Alex Biryukov
, Daniel Feher:
ReCon: Sybil-resistant consensus from reputation. Pervasive Mob. Comput. 61: 101109 (2020) - [j12]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko
, Vesselin Velichkov, Qingju Wang:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans. Symmetric Cryptol. 2020(S1): 208-261 (2020) - [c85]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). CRYPTO (3) 2020: 419-448 - [i53]Sergei Tikhomirov, Rene Pickhardt, Alex Biryukov
, Mariusz Nowostawski:
Probing Channel Balances in the Lightning Network. CoRR abs/2004.00333 (2020) - [i52]Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto:
Cryptanalysis of Au et al. Dynamic Universal Accumulator. IACR Cryptol. ePrint Arch. 2020: 598 (2020) - [i51]Giuseppe Vitto, Alex Biryukov:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. IACR Cryptol. ePrint Arch. 2020: 777 (2020)
2010 – 2019
- 2019
- [j11]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
:
Triathlon of lightweight block ciphers for the Internet of things. J. Cryptogr. Eng. 9(3): 283-302 (2019) - [j10]Alex Biryukov
, Sergei Tikhomirov:
Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash. Pervasive Mob. Comput. 59 (2019) - [c84]Luan Cardoso dos Santos, Johann Großschädl, Alex Biryukov
:
FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms. CARDIS 2019: 216-233 - [c83]Alex Biryukov
, Daniel Feher, Giuseppe Vitto:
Privacy Aspects and Subliminal Channels in Zcash. CCS 2019: 1795-1811 - [c82]Alex Biryukov
, Daniel Feher:
Privacy and Linkability of Mining in Zcash. CNS 2019: 118-123 - [c81]Alex Biryukov
, Sergei Tikhomirov:
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. EuroS&P 2019: 172-184 - [c80]Alex Biryukov
, Sergei Tikhomirov:
Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains. INFOCOM Workshops 2019: 204-209 - [c79]Alex Biryukov
, Daniel Feher:
Portrait of a Miner in a Landscape. INFOCOM Workshops 2019: 638-643 - [e4]Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquín García-Alfaro
:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Lecture Notes in Computer Science 11737, Springer 2019, ISBN 978-3-030-31499-6 [contents] - [i50]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-bit ARX-box. IACR Cryptol. ePrint Arch. 2019: 1378 (2019) - 2018
- [c78]Alex Biryukov
, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. ASIACRYPT (2) 2018: 373-402 - [i49]Alex Biryukov, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. IACR Cryptol. ePrint Arch. 2018: 49 (2018) - [i48]Christof Beierle, Alex Biryukov, Aleksei Udovenko:
On Degree-d Zero-Sum Sets of Full Rank. IACR Cryptol. ePrint Arch. 2018: 1194 (2018) - 2017
- [j9]Alex Biryukov, Dmitry Khovratovich:
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem. Ledger 2: 1-30 (2017) - [c77]Alex Biryukov
, Daniel Dinu, Yann Le Corre:
Side-Channel Attacks Meet Secure Network Protocols. ACNS 2017: 435-454 - [c76]Alex Biryukov
, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. ASIACRYPT (3) 2017: 417-445 - [c75]Alex Biryukov
, Daniel Dinu, Yann Le Corre, Aleksei Udovenko:
Optimal First-Order Boolean Masking for Embedded IoT Devices. CARDIS 2017: 22-41 - [c74]Alex Biryukov
, Dmitry Khovratovich, Sergei Tikhomirov:
Findel: Secure Derivative Contracts for Ethereum. Financial Cryptography Workshops 2017: 453-467 - [i47]Alex Biryukov:
Proofs of Work - the Engines of Trust. ERCIM News 2017(110) (2017) - [i46]Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov:
Analysis of the NORX Core Permutation. IACR Cryptol. ePrint Arch. 2017: 34 (2017) - [i45]Alex Biryukov, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. IACR Cryptol. ePrint Arch. 2017: 414 (2017) - [i44]Alex Biryukov, Léo Perrin:
State of the Art in Lightweight Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2017: 511 (2017) - [i43]Alex Biryukov, Daniel Feher, Dmitry Khovratovich:
Guru: Universal Reputation Module for Distributed Consensus Protocols. IACR Cryptol. ePrint Arch. 2017: 671 (2017) - 2016
- [j8]Alex Biryukov
, Dmitry Khovratovich, Léo Perrin:
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Trans. Symmetric Cryptol. 2016(2): 226-247 (2016) - [c73]Alex Biryukov
, Daniel Dinu, Johann Großschädl:
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. ACNS 2016: 537-557 - [c72]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov
:
Design Strategies for ARX with Provable Bounds: Sparx and LAX. ASIACRYPT (1) 2016: 484-513 - [c71]Léo Perrin, Aleksei Udovenko, Alex Biryukov
:
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. CRYPTO (2) 2016: 93-122 - [c70]Alex Biryukov
, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. EUROCRYPT (1) 2016: 372-402 - [c69]Alex Biryukov
, Daniel Dinu, Dmitry Khovratovich:
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. EuroS&P 2016: 292-302 - [c68]Alex Biryukov
, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. FSE 2016: 289-310 - [c67]Alex Biryukov, Dmitry Khovratovich:
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem. NDSS 2016 - [c66]Alex Biryukov, Dmitry Khovratovich:
Egalitarian Computing. USENIX Security Symposium 2016: 315-326 - [i42]Alex Biryukov
, Dmitry Khovratovich:
Egalitarian computing. CoRR abs/1606.03588 (2016) - [i41]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. IACR Cryptol. ePrint Arch. 2016: 71 (2016) - [i40]Alex Biryukov, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}. IACR Cryptol. ePrint Arch. 2016: 409 (2016) - [i39]Léo Perrin, Aleksei Udovenko, Alex Biryukov:
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version). IACR Cryptol. ePrint Arch. 2016: 539 (2016) - [i38]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version). IACR Cryptol. ePrint Arch. 2016: 984 (2016) - 2015
- [c65]Alex Biryukov
, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. ASIACRYPT (2) 2015: 633-657 - [c64]Alex Biryukov
, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. CRYPTO (1) 2015: 116-140 - [c63]Alex Biryukov
, Ivan Pustogarov:
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. Financial Cryptography 2015: 445-455 - [c62]Alex Biryukov
, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. FSE 2015: 3-27 - [c61]Alex Biryukov
, Gaëtan Leurent
, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. SAC 2015: 102-121 - [c60]Alex Biryukov
, Ivan Pustogarov:
Bitcoin over Tor isn't a Good Idea. IEEE Symposium on Security and Privacy 2015: 122-134 - [e3]Alex Biryukov, Vipul Goyal:
Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings. Lecture Notes in Computer Science 9462, Springer 2015, ISBN 978-3-319-26616-9 [contents] - [i37]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptol. ePrint Arch. 2015: 209 (2015) - [i36]Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. IACR Cryptol. ePrint Arch. 2015: 227 (2015) - [i35]Alex Biryukov, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. IACR Cryptol. ePrint Arch. 2015: 240 (2015) - [i34]Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. IACR Cryptol. ePrint Arch. 2015: 426 (2015) - [i33]Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing. IACR Cryptol. ePrint Arch. 2015: 430 (2015) - [i32]Alex Biryukov, Dmitry Khovratovich:
Decomposition attack on SASASASAS. IACR Cryptol. ePrint Arch. 2015: 646 (2015) - [i31]Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. IACR Cryptol. ePrint Arch. 2015: 723 (2015) - [i30]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob. IACR Cryptol. ePrint Arch. 2015: 812 (2015) - [i29]Alex Biryukov, Dmitry Khovratovich:
Asymmetric proof-of-work based on the Generalized Birthday problem. IACR Cryptol. ePrint Arch. 2015: 946 (2015) - [i28]Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. IACR Cryptol. ePrint Arch. 2015: 976 (2015) - 2014
- [j7]Alex Biryukov
, Jorge Nakahara Jr., Hamdi Murat Yildirim
:
Differential entropy analysis of the IDEA block cipher. J. Comput. Appl. Math. 259: 561-570 (2014) - [c59]Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract). ASIACRYPT (1) 2014: 63-84 - [c58]Alex Biryukov
, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of Clients in Bitcoin P2P Network. CCS 2014: 15-29 - [c57]Alex Biryukov
, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers. CT-RSA 2014: 227-250 - [c56]Alex Biryukov
, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. FSE 2014: 546-570 - [c55]Alex Biryukov
, Ivan Pustogarov, Fabrice Thill, Ralf-Philipp Weinmann:
Content and Popularity Analysis of Tor Hidden Services. ICDCS Workshops 2014: 188-193 - [c54]Alex Biryukov
, Dmitry Khovratovich:
PAEQ: Parallelizable Permutation-Based Authenticated Encryption. ISC 2014: 72-89 - [c53]Alex Biryukov
, Ivica Nikolic:
Colliding Keys for SC2000-256. Selected Areas in Cryptography 2014: 77-91 - [i27]Alex Biryukov
, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of clients in Bitcoin P2P network. CoRR abs/1405.7418 (2014) - [i26]Alex Biryukov
, Ivan Pustogarov:
Bitcoin over Tor isn't a good idea. CoRR abs/1410.6079 (2014) - [i25]Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. IACR Cryptol. ePrint Arch. 2014: 474 (2014) - [i24]Alex Biryukov, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. IACR Cryptol. ePrint Arch. 2014: 922 (2014) - [i23]Alex Biryukov, Ivan Pustogarov:
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. IACR Cryptol. ePrint Arch. 2014: 1011 (2014) - 2013
- [c52]Alex Biryukov
, Ivica Nikolic:
Complementing Feistel Ciphers. FSE 2013: 3-18 - [c51]Alex Biryukov
, Ivan Pustogarov, Ralf-Philipp Weinmann:
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. IEEE Symposium on Security and Privacy 2013: 80-94 - [i22]Alex Biryukov
, Ivan Pustogarov, Ralf-Philipp Weinmann:
Content and popularity analysis of Tor hidden services. CoRR abs/1308.6768 (2013) - [i21]Alex Biryukov, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers (Extended Version). IACR Cryptol. ePrint Arch. 2013: 853 (2013) - 2012
- [j6]Alex Biryukov
, Johann Großschädl:
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. Fundam. Informaticae 114(3-4): 221-237 (2012) - [c50]Alex Biryukov
, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. ESORICS 2012: 469-486 - [c49]Alex Biryukov
, Gaëtan Leurent
, Arnab Roy:
Cryptanalysis of the "Kindle" Cipher. Selected Areas in Cryptography 2012: 86-103 - [c48]Alex Biryukov
, Aleksandar Kircanski, Amr M. Youssef:
Cryptanalysis of the Loiss Stream Cipher. Selected Areas in Cryptography 2012: 119-134 - [i20]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News 2012(90) (2012) - [i19]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks. IACR Cryptol. ePrint Arch. 2012: 432 (2012) - 2011
- [c47]Alex Biryukov
, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. ACNS 2011: 91-109 - [c46]Alex Biryukov
, Mario Lamberger, Florian Mendel, Ivica Nikolic:
Second-Order Differential Collisions for Reduced SHA-256. ASIACRYPT 2011: 270-287 - [c45]Alex Biryukov
, Ivica Nikolic:
Search for Related-Key Differential Characteristics in DES-Like Ciphers. FSE 2011: 18-34 - [c44]Alex Biryukov
, Ivica Nikolic, Arnab Roy:
Boomerang Attacks on BLAKE-32. FSE 2011: 218-237 - [e2]Alex Biryukov
, Guang Gong, Douglas R. Stinson:
Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6544, Springer 2011, ISBN 978-3-642-19573-0 [contents] - [r64]Alex Biryukov:
Adaptive Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 21 - [r63]Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 21 - [r62]Alex Biryukov:
Adaptive Chosen Plaintext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 21 - [r61]Alex Biryukov:
Boomerang Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 165-166 - [r60]Alex Biryukov:
Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 205 - [r59]Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 205 - [r58]Alex Biryukov:
Chosen Plaintext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 205-206 - [r57]Alex Biryukov:
Ciphertext-Only Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 207 - [r56]Alex Biryukov:
Codebook Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 216 - [r55]Alex Biryukov, Christophe De Cannière:
Data Encryption Standard (DES). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 295-301 - [r54]Alex Biryukov:
DES-X (or DESX). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 331 - [r53]Alex Biryukov:
Dictionary Attack (I). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 332 - [r52]Alex Biryukov:
Differential-Linear Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 340-341 - [r51]Alex Biryukov:
Feistel Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 455 - [r50]Alex Biryukov:
IDEA. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 583-584 - [r49]Alex Biryukov:
Impossible Differential Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 597 - [r48]Alex Biryukov:
IPES. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 634-635 - [r47]Alex Biryukov:
Known Plaintext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 704-705 - [r46]Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 722-725 - [r45]Alex Biryukov:
Meet-in-the-Middle Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 772-773 - [r44]Alex Biryukov:
Miss-in-the-Middle Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 786 - [r43]Alex Biryukov:
Multiple Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 815 - [r42]Alex Biryukov:
Multiset Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 822 - [r41]Alex Biryukov:
Product Cipher, Superencryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 980-981 - [r40]Alex Biryukov:
Related Key Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1040-1041 - [r39]Alex Biryukov:
Resynchronization Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1042-1043 - [r38]Alex Biryukov:
Skipjack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1220-1221 - [r37]Alex Biryukov:
Slide Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1221-1222 - [r36]Alex Biryukov:
Structural Cryptanalysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1266 - [r35]Alex Biryukov:
Substitution-Permutation (SP) Network. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1268 - [r34]Alex Biryukov:
Truncated Differentials. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1320 - [r33]Alex Biryukov:
Weak Keys. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1366-1367 - [i18]Alex Biryukov, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. IACR Cryptol. ePrint Arch. 2011: 707 (2011) - [i17]Alex Biryukov, Johann Großschädl:
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. IACR Cryptol. ePrint Arch. 2011: 710 (2011) - 2010
- [j5]Alex Biryukov
, Adi Shamir:
Structural Cryptanalysis of SASAS. J. Cryptol. 23(4): 505-518 (2010) - [c43]Alex Biryukov
, Deike Priemuth-Schmid, Bin Zhang:
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . ACNS 2010: 139-153 - [c42]Alex Biryukov
, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. EUROCRYPT 2010: 299-319 - [c41]Alex Biryukov
, Ivica Nikolic:
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. EUROCRYPT 2010: 322-344 - [c40]Alex Biryukov
, Deike Priemuth-Schmid, Bin Zhang:
Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕. ICETE (Selected Papers) 2010: 147-157 - [c39]Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Analysis of SNOW 3G⊕ Resynchronization Mechanism. SECRYPT 2010: 327-333 - [i16]Alex Biryukov, Ivica Nikolic:
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. IACR Cryptol. ePrint Arch. 2010: 248 (2010) - [i15]Alex Biryukov, Dmitry Khovratovich:
Feasible Attack on the 13-round AES-256. IACR Cryptol. ePrint Arch. 2010: 257 (2010)
2000 – 2009
- 2009
- [c38]Alex Biryukov
, Dmitry Khovratovich:
Related-Key Cryptanalysis of the Full AES-192 and AES-256. ASIACRYPT 2009: 1-18 - [c37]Alex Biryukov
, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256. CRYPTO 2009: 231-249 - [c36]Dmitry Khovratovich, Alex Biryukov
, Ivica Nikolic:
Speeding up Collision Search for Byte-Oriented Hash Functions. CT-RSA 2009: 164-181 - [c35]Alex Biryukov
, Praveen Gauravaram, Jian Guo
, Dmitry Khovratovich, San Ling
, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [i14]