Alex Biryukov
Affiliations: University of Luxembourg
According to our database^{1},
Alex Biryukov
authored at least 197 papers
between 1994 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:

on zbmath.org

on twitter.com

on orcid.org

on id.loc.gov

on dnb.info

on wwwde.uni.lu

on dl.acm.org
On csauthors.net:
Bibliography
2022
J. Inf. Secur. Appl., 2022
IACR Cryptol. ePrint Arch., 2022
2021
RFC, September, 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Security and Privacy of Lightning Network Payments with Uncertain Channel Balances.
CoRR, 2021
Proceedings of the Topics in Cryptology  CTRSA 2021, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
Pervasive Mob. Comput., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Cryptogr. Commun., 2020
Proceedings of the Advances in Cryptology  CRYPTO 2020, 2020
2019
Pervasive Mob. Comput., 2019
J. Cryptogr. Eng., 2019
IACR Cryptol. ePrint Arch., 2019
Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains.
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the IEEE INFOCOM 2019, 2019
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Smart Card Research and Advanced Applications, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
Ledger, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
ERCIM News, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IACR Trans. Symmetric Cryptol., 2016
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version).
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Fast Software Encryption  23rd International Conference, 2016
Argon2: New Generation of MemoryHard Functions for Password Hashing and Other Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Proceedings of the Advances in Cryptology  CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology  ASIACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Fast and TradeoffResilient MemoryHard Functions for Cryptocurrencies and Password Hashing.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
J. Comput. Appl. Math., 2014
IACR Cryptol. ePrint Arch., 2014
Cryptographic Schemes Based on the ASASA Structure: Blackbox, Whitebox, and Publickey.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Selected Areas in Cryptography  SAC 2014, 2014
Proceedings of the Information Security  17th International Conference, 2014
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Proceedings of the Topics in Cryptology  CTRSA 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Cryptographic Schemes Based on the ASASA Structure: BlackBox, WhiteBox, and PublicKey (Extended Abstract).
Proceedings of the Advances in Cryptology  ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
CoRR, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Fundam. Informaticae, 2012
ERCIM News, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Fast Software Encryption  18th International Workshop, 2011
Proceedings of the Fast Software Encryption  18th International Workshop, 2011
Proceedings of the Advances in Cryptology  ASIACRYPT 2011, 2011
2010
J. Cryptol., 2010
Automatic Search for RelatedKey Diff erential Characteristics in ByteOriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Analysis of SNOW 3G⊕ Resynchronization Mechanism.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the eBusiness and Telecommunications  7th International Joint Conference, 2010
Automatic Search for RelatedKey Differential Characteristics in ByteOriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Proceedings of the Advances in Cryptology  EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Key Recovery Attacks of Practical Complexity on AES256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology  EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the New Stream Cipher Designs  The eSTREAM Finalists, 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Symmetric Cryptography, 07.01.  12.01.2007, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
Proc. IEEE, 2006
IACR Cryptol. ePrint Arch., 2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA0 and SHA1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
J. Cryptol., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Comput. Secur., 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Advanced Encryption Standard  AES, 4th International Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology  ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Advances in Cryptology  EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
1997
J. Cryptol., 1997
1994
Proceedings of the Advances in Cryptology  ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994