default search action
Dmitry Khovratovich
Person information
- affiliation: University of Luxembourg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations. IACR Trans. Symmetric Cryptol. 2024(3): 44-83 (2024) - [c41]Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski:
Cryptanalysis of Algebraic Verifiable Delay Functions. CRYPTO (3) 2024: 457-490 - [i44]Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski:
Cryptanalysis of Algebraic Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2024: 873 (2024) - 2023
- [c40]Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger:
Poseidon2: A Faster Version of the Poseidon Hash Function. AFRICACRYPT 2023: 177-203 - [c39]Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink:
Generic Security of the SAFE API and Its Applications. ASIACRYPT (8) 2023: 301-327 - [i43]Dankrad Feist, Dmitry Khovratovich:
Fast amortized KZG proofs. IACR Cryptol. ePrint Arch. 2023: 33 (2023) - [i42]Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger:
Poseidon2: A Faster Version of the Poseidon Hash Function. IACR Cryptol. ePrint Arch. 2023: 323 (2023) - [i41]Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink:
Generic Security of the SAFE API and Its Applications. IACR Cryptol. ePrint Arch. 2023: 520 (2023) - [i40]Jean-Philippe Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine:
SAFE: Sponge API for Field Elements. IACR Cryptol. ePrint Arch. 2023: 522 (2023) - [i39]Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You. IACR Cryptol. ePrint Arch. 2023: 1025 (2023) - 2022
- [j5]Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger:
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel. IACR Trans. Symmetric Cryptol. 2022(1): 5-37 (2022) - [c38]Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Reinforced Concrete: A Fast Hash Function for Verifiable Computation. CCS 2022: 1323-1335 - [c37]Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin:
Caulk: Lookup Arguments in Sublinear Time. CCS 2022: 3121-3134 - [i38]Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin:
Caulk: Lookup Arguments in Sublinear Time. IACR Cryptol. ePrint Arch. 2022: 621 (2022) - [i37]Ariel Gabizon, Dmitry Khovratovich:
flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size. IACR Cryptol. ePrint Arch. 2022: 1447 (2022) - [i36]Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols:
Baloo: Nearly Optimal Lookup Arguments. IACR Cryptol. ePrint Arch. 2022: 1565 (2022) - [i35]Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari:
MinRoot: Candidate Sequential Function for Ethereum VDF. IACR Cryptol. ePrint Arch. 2022: 1626 (2022) - 2021
- [c36]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T₅: Hashing Five Inputs with Three Compression Calls. ITC 2021: 24:1-24:23 - [c35]Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger:
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. USENIX Security Symposium 2021: 519-535 - [i34]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T5: Hashing Five Inputs with Three Compression Calls. IACR Cryptol. ePrint Arch. 2021: 373 (2021) - [i33]Mario Barbara, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation. IACR Cryptol. ePrint Arch. 2021: 1038 (2021) - [i32]Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger:
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n. IACR Cryptol. ePrint Arch. 2021: 1533 (2021) - [i31]Alex Biryukov, Daniel Dinu, Dmitry Khovratovich, Simon Josefsson:
Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications. RFC 9106: 1-21 (2021) - 2020
- [c34]Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich:
Aggregatable Subvector Commitments for Stateless Cryptocurrencies. SCN 2020: 45-64 - [i30]Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich:
Aggregatable Subvector Commitments for Stateless Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 527 (2020)
2010 – 2019
- 2019
- [j4]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of lightweight block ciphers for the Internet of things. J. Cryptogr. Eng. 9(3): 283-302 (2019) - [c33]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. ASIACRYPT (3) 2019: 371-397 - [i29]Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. IACR Cryptol. ePrint Arch. 2019: 419 (2019) - [i28]Lorenzo Grassi, Daniel Kales, Dmitry Khovratovich, Arnab Roy, Christian Rechberger, Markus Schofnegger:
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems. IACR Cryptol. ePrint Arch. 2019: 458 (2019) - [i27]Dmitry Khovratovich:
Key recovery attacks on the Legendre PRFs within the birthday bound. IACR Cryptol. ePrint Arch. 2019: 862 (2019) - 2017
- [j3]Alex Biryukov, Dmitry Khovratovich:
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem. Ledger 2: 1-30 (2017) - [c32]Dmitry Khovratovich, Jason Law:
BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace. EuroS&P Workshops 2017: 27-31 - [c31]Alex Biryukov, Dmitry Khovratovich, Sergei Tikhomirov:
Findel: Secure Derivative Contracts for Ethereum. Financial Cryptography Workshops 2017: 453-467 - [i26]Alex Biryukov, Daniel Feher, Dmitry Khovratovich:
Guru: Universal Reputation Module for Distributed Consensus Protocols. IACR Cryptol. ePrint Arch. 2017: 671 (2017) - 2016
- [j2]Alex Biryukov, Dmitry Khovratovich, Léo Perrin:
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Trans. Symmetric Cryptol. 2016(2): 226-247 (2016) - [c30]Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. EuroS&P 2016: 292-302 - [c29]Alex Biryukov, Dmitry Khovratovich:
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem. NDSS 2016 - [c28]Alex Biryukov, Dmitry Khovratovich:
Egalitarian Computing. USENIX Security Symposium 2016: 315-326 - [i25]Alex Biryukov, Dmitry Khovratovich:
Egalitarian computing. CoRR abs/1606.03588 (2016) - 2015
- [c27]Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. ASIACRYPT (2) 2015: 633-657 - [c26]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. FSE 2015: 519-536 - [i24]Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. IACR Cryptol. ePrint Arch. 2015: 95 (2015) - [i23]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptol. ePrint Arch. 2015: 209 (2015) - [i22]Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. IACR Cryptol. ePrint Arch. 2015: 227 (2015) - [i21]Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing. IACR Cryptol. ePrint Arch. 2015: 430 (2015) - [i20]Alex Biryukov, Dmitry Khovratovich:
Decomposition attack on SASASASAS. IACR Cryptol. ePrint Arch. 2015: 646 (2015) - [i19]Alex Biryukov, Dmitry Khovratovich:
Asymmetric proof-of-work based on the Generalized Birthday problem. IACR Cryptol. ePrint Arch. 2015: 946 (2015) - 2014
- [j1]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. J. Cryptol. 27(3): 452-479 (2014) - [c25]Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract). ASIACRYPT (1) 2014: 63-84 - [c24]Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of Clients in Bitcoin P2P Network. CCS 2014: 15-29 - [c23]Dmitry Khovratovich:
Key Wrapping with a Fixed Permutation. CT-RSA 2014: 481-499 - [c22]Léo Perrin, Dmitry Khovratovich:
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. FSE 2014: 82-103 - [c21]Alex Biryukov, Dmitry Khovratovich:
PAEQ: Parallelizable Permutation-Based Authenticated Encryption. ISC 2014: 72-89 - [i18]Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of clients in Bitcoin P2P network. CoRR abs/1405.7418 (2014) - [i17]Léo Perrin, Dmitry Khovratovich:
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. IACR Cryptol. ePrint Arch. 2014: 223 (2014) - [i16]Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. IACR Cryptol. ePrint Arch. 2014: 474 (2014) - 2013
- [c20]Dmitry Khovratovich, Christian Rechberger:
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE. Selected Areas in Cryptography 2013: 174-184 - [i15]Dmitry Khovratovich:
Key Wrapping with a Fixed Permutation. IACR Cryptol. ePrint Arch. 2013: 145 (2013) - [i14]Dmitry Khovratovich, Christian Rechberger:
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE. IACR Cryptol. ePrint Arch. 2013: 357 (2013) - 2012
- [c19]Dmitry Khovratovich:
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. ASIACRYPT 2012: 544-561 - [c18]Simon Knellwolf, Dmitry Khovratovich:
New Preimage Attacks against Reduced SHA-1. CRYPTO 2012: 367-383 - [c17]Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger:
Narrow-Bicliques: Cryptanalysis of Full IDEA. EUROCRYPT 2012: 392-410 - [c16]Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. FSE 2012: 244-263 - [i13]Dmitry Khovratovich:
Bicliques for permutations: collision and preimage attacks in stronger settings. IACR Cryptol. ePrint Arch. 2012: 141 (2012) - [i12]Simon Knellwolf, Dmitry Khovratovich:
New Preimage Attacks Against Reduced SHA-1. IACR Cryptol. ePrint Arch. 2012: 440 (2012) - 2011
- [c15]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. ASIACRYPT 2011: 344-371 - [i11]Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family. IACR Cryptol. ePrint Arch. 2011: 286 (2011) - [i10]Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:
Biclique Cryptanalysis of the Full AES. IACR Cryptol. ePrint Arch. 2011: 449 (2011) - 2010
- [c14]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. ASIACRYPT 2010: 1-19 - [c13]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. EUROCRYPT 2010: 299-319 - [c12]Dmitry Khovratovich, Ivica Nikolic:
Rotational Cryptanalysis of ARX. FSE 2010: 333-346 - [c11]Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, Martin Schläffer:
Cryptanalysis of Luffa v2 Components. Selected Areas in Cryptography 2010: 388-409 - [i9]Alex Biryukov, Dmitry Khovratovich:
Feasible Attack on the 13-round AES-256. IACR Cryptol. ePrint Arch. 2010: 257 (2010) - [i8]Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger:
Rotational Rebound Attacks on Reduced Skein. IACR Cryptol. ePrint Arch. 2010: 538 (2010)
2000 – 2009
- 2009
- [c10]Alex Biryukov, Dmitry Khovratovich:
Related-Key Cryptanalysis of the Full AES-192 and AES-256. ASIACRYPT 2009: 1-18 - [c9]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256. CRYPTO 2009: 231-249 - [c8]Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic:
Speeding up Collision Search for Byte-Oriented Hash Functions. CT-RSA 2009: 164-181 - [c7]Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [c6]Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann:
Meet-in-the-Middle Attacks on SHA-3 Candidates. FSE 2009: 228-245 - [c5]Dmitry Khovratovich:
Cryptanalysis of Hash Functions with Structures. Selected Areas in Cryptography 2009: 108-125 - [i7]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version). IACR Cryptol. ePrint Arch. 2009: 241 (2009) - [i6]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Examples of differential multicollisions for 13 and 14 rounds of AES-256. IACR Cryptol. ePrint Arch. 2009: 242 (2009) - [i5]Alex Biryukov, Dmitry Khovratovich:
Related-key Cryptanalysis of the Full AES-192 and AES-256. IACR Cryptol. ePrint Arch. 2009: 317 (2009) - [i4]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds. IACR Cryptol. ePrint Arch. 2009: 374 (2009) - 2008
- [c4]Alexander Maximov, Dmitry Khovratovich:
New State Recovery Attack on RC4. CRYPTO 2008: 297-316 - [c3]Dmitry Khovratovich:
Two Attacks on RadioGatún. INDOCRYPT 2008: 53-66 - [i3]Alexander Maximov, Dmitry Khovratovich:
New State Recovery Attack on RC4. IACR Cryptol. ePrint Arch. 2008: 17 (2008) - [i2]Dmitry Khovratovich, Ivica Nikolic:
Cryptanalysis of EnRUPT. IACR Cryptol. ePrint Arch. 2008: 467 (2008) - 2007
- [c2]Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper:
Collision Attacks on AES-Based MAC: Alpha-MAC. CHES 2007: 166-180 - [c1]Alex Biryukov, Dmitry Khovratovich:
Two New Techniques of Side-Channel Cryptanalysis. CHES 2007: 195-208 - 2006
- [i1]Dmitry Khovratovich:
Divisibility of the Hamming Weight by 2k and Monomial Criteria for Boolean Functions. IACR Cryptol. ePrint Arch. 2006: 180 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 23:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint