Alex Biryukov

According to our database1, Alex Biryukov authored at least 177 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Privacy and Linkability of Mining in Zcash.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
On Degree-d Zero-Sum Sets of Full Rank.
IACR Cryptology ePrint Archive, 2018

Attacks and Countermeasures for White-box Designs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Analysis of the NORX Core Permutation.
IACR Cryptology ePrint Archive, 2017

State of the Art in Lightweight Symmetric Cryptography.
IACR Cryptology ePrint Archive, 2017

Guru: Universal Reputation Module for Distributed Consensus Protocols.
IACR Cryptology ePrint Archive, 2017

Proofs of Work - the Engines of Trust.
ERCIM News, 2017

Findel: Secure Derivative Contracts for Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2017

Optimal First-Order Boolean Masking for Embedded IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Symmetrically and Asymmetrically Hard Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Side-Channel Attacks Meet Secure Network Protocols.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs.
IACR Trans. Symmetric Cryptol., 2016

Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version).
IACR Cryptology ePrint Archive, 2016

Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptology ePrint Archive, 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}.
IACR Cryptology ePrint Archive, 2016

Egalitarian Computing.
Proceedings of the 25th USENIX Security Symposium, 2016

Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Triathlon of Lightweight Block Ciphers for the Internet of Things.
IACR Cryptology ePrint Archive, 2015

The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob.
IACR Cryptology ePrint Archive, 2015

Asymmetric proof-of-work based on the Generalized Birthday problem.
IACR Cryptology ePrint Archive, 2015

Decomposition attack on SASASASAS.
IACR Cryptology ePrint Archive, 2015

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.
IACR Cryptology ePrint Archive, 2015

Bitcoin over Tor isn't a Good Idea.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Cryptanalysis of Feistel Networks with Secret Round Functions.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay.
Proceedings of the Financial Cryptography and Data Security, 2015

On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Tradeoff Cryptanalysis of Memory-Hard Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Differential entropy analysis of the IDEA block cipher.
J. Computational Applied Mathematics, 2014

Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key.
IACR Cryptology ePrint Archive, 2014

Colliding Keys for SC2000-256.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

PAEQ: Parallelizable Permutation-Based Authenticated Encryption.
Proceedings of the Information Security - 17th International Conference, 2014

Content and Popularity Analysis of Tor Hidden Services.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

Differential Analysis of Block Ciphers SIMON and SPECK.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Automatic Search for Differential Trails in ARX Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Deanonymisation of Clients in Bitcoin P2P Network.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Automatic Search for Differential Trails in ARX Ciphers (Extended Version).
IACR Cryptology ePrint Archive, 2013

Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Complementing Feistel Ciphers.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware.
Fundam. Inform., 2012

TorScan: Deanonymizing Connections Using Topology Leaks.
ERCIM News, 2012

Cryptanalysis of the "Kindle" Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Cryptanalysis of the Loiss Stream Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Data Encryption Standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Structural Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Slide Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Skipjack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Resynchronization Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Related Key Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Product Cipher, Superencryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Multiset Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Multiple Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Miss-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Meet-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Known Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

IPES.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Impossible Differential Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

IDEA.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Feistel Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Differential-Linear Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Dictionary Attack (I).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

DES-X (or DESX).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Codebook Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Ciphertext-Only Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Boomerang Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Adaptive Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Weak Keys.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Truncated Differentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Substitution-Permutation (SP) Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Adaptive Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware.
IACR Cryptology ePrint Archive, 2011

Boomerang Attacks on BLAKE-32.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Search for Related-Key Differential Characteristics in DES-Like Ciphers.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Second-Order Differential Collisions for Reduced SHA-256.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
IACR Cryptology ePrint Archive, 2010

Feasible Attack on the 13-round AES-256.
IACR Cryptology ePrint Archive, 2010

Analysis of SNOW 3G⊕ Resynchronization Mechanism.
Proceedings of the SECRYPT 2010, 2010

Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) .
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Examples of differential multicollisions for 13 and 14 rounds of AES-256.
IACR Cryptology ePrint Archive, 2009

Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version).
IACR Cryptology ePrint Archive, 2009

Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds.
IACR Cryptology ePrint Archive, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Speeding up Collision Search for Byte-Oriented Hash Functions.
Proceedings of the Topics in Cryptology, 2009

Distinguisher and Related-Key Attack on the Full AES-256.
Proceedings of the Advances in Cryptology, 2009

Related-Key Cryptanalysis of the Full AES-192 and AES-256.
Proceedings of the Advances in Cryptology, 2009

2008
Design of a New Stream Cipher-LEX.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

Slid Pairs in Salsa20 and Trivium.
Proceedings of the Progress in Cryptology, 2008

Collisions for Step-Reduced SHA-256.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Two Trivial Attacks on Trivium.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Block and Stream Ciphers and the Creatures in Between.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

Two New Techniques of Side-Channel Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

Collision Attacks on AES-Based MAC: Alpha-MAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
An introduction to Block Cipher Cryptanalysis.
Proceedings of the IEEE, 2006

On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1.
IACR Cryptology ePrint Archive, 2006

On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

The Design of a Stream Cipher LEX.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

2005
Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Data encryption standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Structural Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Slide Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Weak keys.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Truncated Differentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Substitution-Permutation (SP) Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Skipjack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Resynchronization Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Related Key Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Product Cipher, Superencryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Multiset Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Multiple Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Miss-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Meet-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Known plaintext attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

IPES.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Impossible Differential Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

IDEA.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Feistel Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Differential-Linear Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Dictionary Attack (I).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

DES-X (or DESX).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Codebook Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Ciphertext-Only Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Boomerang Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Adaptive Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Adaptive Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Some Thoughts on Time-Memory-Data Tradeoffs.
IACR Cryptology ePrint Archive, 2005

Recent attacks on alleged SecurID and their practical implications.
Computers & Security, 2005

Analysis of a SHA-256 Variant.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Improved Time-Memory Trade-Offs with Multiple Data.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

On the Security of Encryption Modes of MD4, MD5 and HAVAL.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Analysis of the Non-linear Part of Mugi.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Block Ciphers and Stream Ciphers: The State of the Art.
IACR Cryptology ePrint Archive, 2004

Non-randomness of the Full 4 and 5-Pass HAVAL.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

On Multiple Linear Approximations.
Proceedings of the Advances in Cryptology, 2004

The Boomerang Attack on 5 and 6-Round Reduced AES.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Crytanalysis of SAFER++.
IACR Cryptology ePrint Archive, 2003

A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Cryptanalysis of the Alleged SecurID Hash Function.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Block Ciphers and Systems of Quadratic Equations.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Analysis of Involutional Ciphers: Khazad and Anubis.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
Proceedings of the Advances in Cryptology, 2003

Cryptanalysis of SAFER++.
Proceedings of the Advances in Cryptology, 2003

Cryptanalysis of 3-Pass HAVAL.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
New Weak-Key Classes of IDEA.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Structural Cryptanalysis of SASAS.
Proceedings of the Advances in Cryptology, 2001

2000
Real Time Cryptanalysis of A5/1 on a PC.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Advanced Slide Attacks.
Proceedings of the Advances in Cryptology, 2000

Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
Proceedings of the Advances in Cryptology, 2000

1999
Slide Attacks.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Miss in the Middle Attacks on IDEA and Khufu.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Proceedings of the Advances in Cryptology, 1999

1998
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Proceedings of the Selected Areas in Cryptography '98, 1998

Improved Cryptanalysis of RC5.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

From Differential Cryptanalysis to Ciphertext-Only Attacks.
Proceedings of the Advances in Cryptology, 1998

1994
An Improvement of Davies' Attack on DES.
Proceedings of the Advances in Cryptology, 1994

How to Strengthen DES Using Existing Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994


  Loading...