Alex Biryukov

Orcid: 0000-0003-1404-6686

Affiliations:
  • University of Luxembourg


According to our database1, Alex Biryukov authored at least 200 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cryptanalysis of ARX-based White-box Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN.
IACR Cryptol. ePrint Arch., 2023

PURED: A unified framework for resource-hard functions.
IACR Cryptol. ePrint Arch., 2023

2022
Differential cryptanalysis of WARP.
J. Inf. Secur. Appl., 2022

Meet-in-the-Filter and Dynamic Counting with Applications to Speck.
IACR Cryptol. ePrint Arch., 2022

2021
Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications.
RFC, September, 2021

Dummy Shuffling against Algebraic Attacks in White-box Implementations.
IACR Cryptol. ePrint Arch., 2021

Automated Truncation of Differential Trails and Trail Clustering in ARX.
IACR Cryptol. ePrint Arch., 2021

Analysis and Probing of Parallel Channels in the Lightning Network.
IACR Cryptol. ePrint Arch., 2021

Security and Privacy of Lightning Network Payments with Uncertain Channel Balances.
CoRR, 2021

Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Lightweight AEAD and Hashing using the Sparkle Permutation Family.
IACR Trans. Symmetric Cryptol., 2020

ReCon: Sybil-resistant consensus from reputation.
Pervasive Mob. Comput., 2020

Dynamic Universal Accumulator with Batch Update over Bilinear Groups.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of Au et al. Dynamic Universal Accumulator.
IACR Cryptol. ePrint Arch., 2020

Probing Channel Balances in the Lightning Network.
CoRR, 2020

On degree-d zero-sum sets of full rank.
Cryptogr. Commun., 2020

Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash.
Pervasive Mob. Comput., 2019

Triathlon of lightweight block ciphers for the Internet of things.
J. Cryptogr. Eng., 2019

Alzette: A 64-bit ARX-box.
IACR Cryptol. ePrint Arch., 2019

Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains.
Proceedings of the IEEE INFOCOM 2019, 2019

Portrait of a Miner in a Landscape.
Proceedings of the IEEE INFOCOM 2019, 2019

Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Privacy and Linkability of Mining in Zcash.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Privacy Aspects and Subliminal Channels in Zcash.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2018
Attacks and Countermeasures for White-box Designs.
IACR Cryptol. ePrint Arch., 2018

2017
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem.
Ledger, 2017

Analysis of the NORX Core Permutation.
IACR Cryptol. ePrint Arch., 2017

State of the Art in Lightweight Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2017

Symmetrically and Asymmetrically Hard Cryptography.
IACR Cryptol. ePrint Arch., 2017

Guru: Universal Reputation Module for Distributed Consensus Protocols.
IACR Cryptol. ePrint Arch., 2017

Proofs of Work - the Engines of Trust.
ERCIM News, 2017

Findel: Secure Derivative Contracts for Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2017

Optimal First-Order Boolean Masking for Embedded IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Side-Channel Attacks Meet Secure Network Protocols.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs.
IACR Trans. Symmetric Cryptol., 2016

Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version).
IACR Cryptol. ePrint Arch., 2016

Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptol. ePrint Arch., 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}.
IACR Cryptol. ePrint Arch., 2016

Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
IACR Cryptol. ePrint Arch., 2016

Egalitarian Computing.
Proceedings of the 25th USENIX Security Symposium, 2016

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob.
IACR Cryptol. ePrint Arch., 2015

On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure.
IACR Cryptol. ePrint Arch., 2015

Complementing Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Feistel Networks with Secret Round Functions.
IACR Cryptol. ePrint Arch., 2015

Asymmetric proof-of-work based on the Generalized Birthday problem.
IACR Cryptol. ePrint Arch., 2015

Decomposition attack on SASASASAS.
IACR Cryptol. ePrint Arch., 2015

Tradeoff Cryptanalysis of Memory-Hard Functions.
IACR Cryptol. ePrint Arch., 2015

Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE.
IACR Cryptol. ePrint Arch., 2015

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing.
IACR Cryptol. ePrint Arch., 2015

Bitcoin over Tor isn't a Good Idea.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Differential entropy analysis of the IDEA block cipher.
J. Comput. Appl. Math., 2014

Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay.
IACR Cryptol. ePrint Arch., 2014

Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key.
IACR Cryptol. ePrint Arch., 2014

Differential Analysis of Block Ciphers SIMON and SPECK.
IACR Cryptol. ePrint Arch., 2014

Colliding Keys for SC2000-256.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

PAEQ: Parallelizable Permutation-Based Authenticated Encryption.
Proceedings of the Information Security - 17th International Conference, 2014

Content and Popularity Analysis of Tor Hidden Services.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

Automatic Search for Differential Trails in ARX Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Deanonymisation of Clients in Bitcoin P2P Network.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Automatic Search for Differential Trails in ARX Ciphers (Extended Version).
IACR Cryptol. ePrint Arch., 2013

Content and popularity analysis of Tor hidden services.
CoRR, 2013

Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware.
Fundam. Informaticae, 2012

TorScan: Deanonymizing Connections Using Topology Leaks.
ERCIM News, 2012

Cryptanalysis of the "Kindle" Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Cryptanalysis of the Loiss Stream Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

2011
Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Data Encryption Standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Structural Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Slide Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Skipjack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Resynchronization Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Related Key Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Product Cipher, Superencryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Multiset Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Multiple Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Miss-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Meet-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Known Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Impossible Differential Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Feistel Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Differential-Linear Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Dictionary Attack (I).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

DES-X (or DESX).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Codebook Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Ciphertext-Only Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Boomerang Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Adaptive Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Weak Keys.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Truncated Differentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Substitution-Permutation (SP) Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Adaptive Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
IACR Cryptol. ePrint Arch., 2011

Boomerang Attacks on BLAKE-32.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Search for Related-Key Differential Characteristics in DES-Like Ciphers.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Second-Order Differential Collisions for Reduced SHA-256.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Structural Cryptanalysis of SASAS.
J. Cryptol., 2010

Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
IACR Cryptol. ePrint Arch., 2010

Feasible Attack on the 13-round AES-256.
IACR Cryptol. ePrint Arch., 2010

Analysis of SNOW 3G⊕ Resynchronization Mechanism.
Proceedings of the SECRYPT 2010, 2010

Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G<sup> (+) </sup>.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Examples of differential multicollisions for 13 and 14 rounds of AES-256.
IACR Cryptol. ePrint Arch., 2009

Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version).
IACR Cryptol. ePrint Arch., 2009

Related-key Cryptanalysis of the Full AES-192 and AES-256.
IACR Cryptol. ePrint Arch., 2009

Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Speeding up Collision Search for Byte-Oriented Hash Functions.
Proceedings of the Topics in Cryptology, 2009

Distinguisher and Related-Key Attack on the Full AES-256.
Proceedings of the Advances in Cryptology, 2009

2008
Design of a New Stream Cipher-LEX.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

Slid Pairs in Salsa20 and Trivium.
IACR Cryptol. ePrint Arch., 2008

Collisions for Step-Reduced SHA-256.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Two Trivial Attacks on Trivium.
IACR Cryptol. ePrint Arch., 2007

Block and Stream Ciphers and the Creatures in Between.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

Two New Techniques of Side-Channel Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

Collision Attacks on AES-Based MAC: Alpha-MAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
An introduction to Block Cipher Cryptanalysis.
Proc. IEEE, 2006

On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1.
IACR Cryptol. ePrint Arch., 2006

On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

The Design of a Stream Cipher LEX.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

2005
Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Data encryption standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Structural Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Slide Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Weak keys.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Truncated Differentials.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Substitution-Permutation (SP) Network.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Skipjack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Resynchronization Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Related Key Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Product Cipher, Superencryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Multiset Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Multiple Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Miss-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Meet-in-the-Middle Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Known plaintext attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Impossible Differential Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Feistel Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Differential-Linear Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Dictionary Attack (I).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

DES-X (or DESX).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Codebook Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Ciphertext-Only Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Boomerang Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Adaptive Chosen Plaintext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Adaptive Chosen Ciphertext Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptol., 2005

On the Security of Encryption Modes of MD4, MD5 and HAVAL.
IACR Cryptol. ePrint Arch., 2005

Some Thoughts on Time-Memory-Data Tradeoffs.
IACR Cryptol. ePrint Arch., 2005

Recent attacks on alleged SecurID and their practical implications.
Comput. Secur., 2005

Analysis of a SHA-256 Variant.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Improved Time-Memory Trade-Offs with Multiple Data.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Analysis of the Non-linear Part of Mugi.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
On Multiple Linear Approximations.
IACR Cryptol. ePrint Arch., 2004

Block Ciphers and Stream Ciphers: The State of the Art.
IACR Cryptol. ePrint Arch., 2004

Non-randomness of the Full 4 and 5-Pass HAVAL.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

The Boomerang Attack on 5 and 6-Round Reduced AES.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Cryptanalysis of the Alleged SecurID Hash Function.
IACR Cryptol. ePrint Arch., 2003

Crytanalysis of SAFER++.
IACR Cryptol. ePrint Arch., 2003

A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Block Ciphers and Systems of Quadratic Equations.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Analysis of Involutional Ciphers: Khazad and Anubis.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
Proceedings of the Advances in Cryptology, 2003

Cryptanalysis of SAFER++.
Proceedings of the Advances in Cryptology, 2003

Cryptanalysis of 3-Pass HAVAL.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
New Weak-Key Classes of IDEA.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2000
Real Time Cryptanalysis of A5/1 on a PC.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Advanced Slide Attacks.
Proceedings of the Advances in Cryptology, 2000

Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
Proceedings of the Advances in Cryptology, 2000

1999
Slide Attacks.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Miss in the Middle Attacks on IDEA and Khufu.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Proceedings of the Selected Areas in Cryptography '98, 1998

Improved Cryptanalysis of RC5.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

From Differential Cryptanalysis to Ciphertext-Only Attacks.
Proceedings of the Advances in Cryptology, 1998

1997
An Improvement of Davies' Attack on DES.
J. Cryptol., 1997

1994
How to Strengthen DES Using Existing Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994


  Loading...