Alex Biryukov
According to our database^{1},
Alex Biryukov
authored at least 177 papers
between 1994 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:

at zbmath.org

at twitter.com

at id.loc.gov

at dnb.info

at wwwde.uni.lu

at dl.acm.org
On csauthors.net:
Bibliography
2019
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Privacy and Linkability of Mining in Zcash.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
On Degreed ZeroSum Sets of Full Rank.
IACR Cryptology ePrint Archive, 2018
Attacks and Countermeasures for Whitebox Designs.
Proceedings of the Advances in Cryptology  ASIACRYPT 2018, 2018
2017
Analysis of the NORX Core Permutation.
IACR Cryptology ePrint Archive, 2017
State of the Art in Lightweight Symmetric Cryptography.
IACR Cryptology ePrint Archive, 2017
Guru: Universal Reputation Module for Distributed Consensus Protocols.
IACR Cryptology ePrint Archive, 2017
Proofs of Work  the Engines of Trust.
ERCIM News, 2017
Findel: Secure Derivative Contracts for Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2017
Optimal FirstOrder Boolean Masking for Embedded IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017
Symmetrically and Asymmetrically Hard Cryptography.
Proceedings of the Advances in Cryptology  ASIACRYPT 2017, 2017
SideChannel Attacks Meet Secure Network Protocols.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
MultisetAlgebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs.
IACR Trans. Symmetric Cryptol., 2016
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version).
IACR Cryptology ePrint Archive, 2016
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptology ePrint Archive, 2016
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}.
IACR Cryptology ePrint Archive, 2016
Egalitarian Computing.
Proceedings of the 25th USENIX Security Symposium, 2016
Equihash: Asymmetric ProofofWork Based on the Generalized Birthday Problem.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck.
Proceedings of the Fast Software Encryption  23rd International Conference, 2016
Argon2: New Generation of MemoryHard Functions for Password Hashing and Other Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
ReverseEngineering the SBox of Streebog, Kuznyechik and STRIBOBr1.
Proceedings of the Advances in Cryptology  EUROCRYPT 2016, 2016
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Proceedings of the Advances in Cryptology  CRYPTO 2016, 2016
Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology  ASIACRYPT 2016, 2016
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Triathlon of Lightweight Block Ciphers for the Internet of Things.
IACR Cryptology ePrint Archive, 2015
The Secret Structure of the SBox of Streebog, Kuznechik and Stribob.
IACR Cryptology ePrint Archive, 2015
Asymmetric proofofwork based on the Generalized Birthday problem.
IACR Cryptology ePrint Archive, 2015
Decomposition attack on SASASASAS.
IACR Cryptology ePrint Archive, 2015
Fast and TradeoffResilient MemoryHard Functions for Cryptocurrencies and Password Hashing.
IACR Cryptology ePrint Archive, 2015
Bitcoin over Tor isn't a Good Idea.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Cryptanalysis of Feistel Networks with Secret Round Functions.
Proceedings of the Selected Areas in Cryptography  SAC 2015, 2015
Differential Analysis and MeetintheMiddle Attack Against RoundReduced TWINE.
Proceedings of the Fast Software Encryption  22nd International Workshop, 2015
ProofofWork as Anonymous Micropayment: Rewarding a Tor Relay.
Proceedings of the Financial Cryptography and Data Security, 2015
On ReverseEngineering SBoxes with Hidden Design Criteria or Structure.
Proceedings of the Advances in Cryptology  CRYPTO 2015, 2015
Tradeoff Cryptanalysis of MemoryHard Functions.
Proceedings of the Advances in Cryptology  ASIACRYPT 2015  21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Differential entropy analysis of the IDEA block cipher.
J. Computational Applied Mathematics, 2014
Cryptographic Schemes Based on the ASASA Structure: Blackbox, Whitebox, and Publickey.
IACR Cryptology ePrint Archive, 2014
Colliding Keys for SC2000256.
Proceedings of the Selected Areas in Cryptography  SAC 2014, 2014
PAEQ: Parallelizable PermutationBased Authenticated Encryption.
Proceedings of the Information Security  17th International Conference, 2014
Content and Popularity Analysis of Tor Hidden Services.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Differential Analysis of Block Ciphers SIMON and SPECK.
Proceedings of the Fast Software Encryption  21st International Workshop, 2014
Automatic Search for Differential Trails in ARX Ciphers.
Proceedings of the Topics in Cryptology  CTRSA 2014, 2014
Deanonymisation of Clients in Bitcoin P2P Network.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Cryptographic Schemes Based on the ASASA Structure: BlackBox, WhiteBox, and PublicKey (Extended Abstract).
Proceedings of the Advances in Cryptology  ASIACRYPT 2014, 2014
2013
Automatic Search for Differential Trails in ARX Ciphers (Extended Version).
IACR Cryptology ePrint Archive, 2013
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Complementing Feistel Ciphers.
Proceedings of the Fast Software Encryption  20th International Workshop, 2013
2012
Cryptanalysis of the Full AES Using GPULike SpecialPurpose Hardware.
Fundam. Inform., 2012
TorScan: Deanonymizing Connections Using Topology Leaks.
ERCIM News, 2012
Cryptanalysis of the "Kindle" Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Cryptanalysis of the Loiss Stream Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
TorScan: Tracing LongLived Connections and Differential Scanning Attacks.
Proceedings of the Computer Security  ESORICS 2012, 2012
2011
Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Data Encryption Standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Structural Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Slide Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Skipjack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Resynchronization Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Related Key Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Product Cipher, Superencryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Multiset Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Multiple Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
MissintheMiddle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
MeetintheMiddle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Known Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IPES.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Impossible Differential Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IDEA.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Feistel Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
DifferentialLinear Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Dictionary Attack (I).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
DESX (or DESX).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Codebook Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
CiphertextOnly Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Boomerang Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Adaptive Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Weak Keys.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Truncated Differentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
SubstitutionPermutation (SP) Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Adaptive Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Cryptanalysis of the Full AES Using GPULike SpecialPurpose Hardware.
IACR Cryptology ePrint Archive, 2011
Boomerang Attacks on BLAKE32.
Proceedings of the Fast Software Encryption  18th International Workshop, 2011
Search for RelatedKey Differential Characteristics in DESLike Ciphers.
Proceedings of the Fast Software Encryption  18th International Workshop, 2011
SecondOrder Differential Collisions for Reduced SHA256.
Proceedings of the Advances in Cryptology  ASIACRYPT 2011, 2011
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Automatic Search for RelatedKey Diff erential Characteristics in ByteOriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
IACR Cryptology ePrint Archive, 2010
Feasible Attack on the 13round AES256.
IACR Cryptology ePrint Archive, 2010
Analysis of SNOW 3G⊕ Resynchronization Mechanism.
Proceedings of the SECRYPT 2010, 2010
Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕.
Proceedings of the eBusiness and Telecommunications  7th International Joint Conference, 2010
Automatic Search for RelatedKey Differential Characteristics in ByteOriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Proceedings of the Advances in Cryptology  EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Key Recovery Attacks of Practical Complexity on AES256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology  EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Multiset Collision Attacks on ReducedRound SNOW 3G and SNOW 3G^{ (+) }.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Examples of differential multicollisions for 13 and 14 rounds of AES256.
IACR Cryptology ePrint Archive, 2009
Distinguisher and RelatedKey Attack on the Full AES256 (Extended Version).
IACR Cryptology ePrint Archive, 2009
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds.
IACR Cryptology ePrint Archive, 2009
Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Speeding up Collision Search for ByteOriented Hash Functions.
Proceedings of the Topics in Cryptology, 2009
Distinguisher and RelatedKey Attack on the Full AES256.
Proceedings of the Advances in Cryptology, 2009
RelatedKey Cryptanalysis of the Full AES192 and AES256.
Proceedings of the Advances in Cryptology, 2009
2008
Design of a New Stream CipherLEX.
Proceedings of the New Stream Cipher Designs  The eSTREAM Finalists, 2008
Slid Pairs in Salsa20 and Trivium.
Proceedings of the Progress in Cryptology, 2008
Collisions for StepReduced SHA256.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
Two Trivial Attacks on Trivium.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Block and Stream Ciphers and the Creatures in Between.
Proceedings of the Symmetric Cryptography, 07.01.  12.01.2007, 2007
Two New Techniques of SideChannel Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Collision Attacks on AESBased MAC: AlphaMAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
An introduction to Block Cipher Cryptanalysis.
Proceedings of the IEEE, 2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA0 and SHA1.
IACR Cryptology ePrint Archive, 2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA0 and SHA1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
The Design of a Stream Cipher LEX.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
2005
Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Data encryption standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Structural Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Slide Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Weak keys.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Truncated Differentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
SubstitutionPermutation (SP) Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Skipjack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Resynchronization Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Related Key Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Product Cipher, Superencryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Multiset Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Multiple Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
MissintheMiddle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
MeetintheMiddle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Known plaintext attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IPES.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Impossible Differential Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IDEA.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Feistel Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
DifferentialLinear Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Dictionary Attack (I).
Proceedings of the Encyclopedia of Cryptography and Security, 2005
DESX (or DESX).
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Codebook Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
CiphertextOnly Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Boomerang Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Adaptive Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Adaptive Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Some Thoughts on TimeMemoryData Tradeoffs.
IACR Cryptology ePrint Archive, 2005
Recent attacks on alleged SecurID and their practical implications.
Computers & Security, 2005
Analysis of a SHA256 Variant.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Improved TimeMemory TradeOffs with Multiple Data.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Analysis of the Nonlinear Part of Mugi.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
Block Ciphers and Stream Ciphers: The State of the Art.
IACR Cryptology ePrint Archive, 2004
Nonrandomness of the Full 4 and 5Pass HAVAL.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
On Multiple Linear Approximations.
Proceedings of the Advances in Cryptology, 2004
The Boomerang Attack on 5 and 6Round Reduced AES.
Proceedings of the Advanced Encryption Standard  AES, 4th International Conference, 2004
2003
Crytanalysis of SAFER++.
IACR Cryptology ePrint Archive, 2003
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Cryptanalysis of the Alleged SecurID Hash Function.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Block Ciphers and Systems of Quadratic Equations.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Analysis of Involutional Ciphers: Khazad and Anubis.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
Proceedings of the Advances in Cryptology, 2003
Cryptanalysis of SAFER++.
Proceedings of the Advances in Cryptology, 2003
Cryptanalysis of 3Pass HAVAL.
Proceedings of the Advances in Cryptology  ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
New WeakKey Classes of IDEA.
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
Structural Cryptanalysis of SASAS.
Proceedings of the Advances in Cryptology, 2001
2000
Real Time Cryptanalysis of A5/1 on a PC.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Advanced Slide Attacks.
Proceedings of the Advances in Cryptology, 2000
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
Proceedings of the Advances in Cryptology, 2000
1999
Slide Attacks.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Miss in the Middle Attacks on IDEA and Khufu.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Proceedings of the Advances in Cryptology, 1999
1998
Initial Observations on Skipjack: Cryptanalysis of Skipjack3XOR.
Proceedings of the Selected Areas in Cryptography '98, 1998
Improved Cryptanalysis of RC5.
Proceedings of the Advances in Cryptology  EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
From Differential Cryptanalysis to CiphertextOnly Attacks.
Proceedings of the Advances in Cryptology, 1998
1994
An Improvement of Davies' Attack on DES.
Proceedings of the Advances in Cryptology, 1994
How to Strengthen DES Using Existing Hardware.
Proceedings of the Advances in Cryptology  ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994