default search action
Alex Biryukov
Person information
- affiliation: University of Luxembourg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c95]Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski:
Cryptanalysis of Algebraic Verifiable Delay Functions. CRYPTO (3) 2024: 457-490 - [c94]Hieu Nguyen, Uyen Ho, Alex Biryukov:
Fiat-Shamir in the Wild. CSCML 2024: 135-150 - [i64]Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski:
Cryptanalysis of Algebraic Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2024: 873 (2024) - [i63]Hieu Nguyen, Uyen Ho, Alex Biryukov:
Fiat-Shamir in the Wild. IACR Cryptol. ePrint Arch. 2024: 1565 (2024) - 2023
- [j16]Alex Biryukov, Baptiste Lambin, Aleksei Udovenko:
Cryptanalysis of ARX-based White-box Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 97-135 (2023) - [c93]Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. ACNS (1) 2023: 149-177 - [c92]Alex Biryukov, Marius Lombard-Platet:
PURED: A Unified Framework for Resource-Hard Functions. INDOCRYPT (2) 2023: 126-149 - [i62]Alex Biryukov, Je Sen Teh, Aleksei Udovenko:
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. IACR Cryptol. ePrint Arch. 2023: 851 (2023) - [i61]Alex Biryukov, Marius Lombard-Platet:
PURED: A unified framework for resource-hard functions. IACR Cryptol. ePrint Arch. 2023: 1809 (2023) - 2022
- [j15]Je Sen Teh, Alex Biryukov:
Differential cryptanalysis of WARP. J. Inf. Secur. Appl. 70: 103316 (2022) - [c91]Giuseppe Vitto, Alex Biryukov:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. CT-RSA 2022: 395-426 - [c90]Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov:
Analysis and Probing of Parallel Channels in the Lightning Network. Financial Cryptography 2022: 337-357 - [c89]Alex Biryukov, Je Sen Teh, Aleksei Udovenko:
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. SAC 2022: 355-375 - [i60]Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. IACR Cryptol. ePrint Arch. 2022: 673 (2022) - 2021
- [c88]Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto:
Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups. CT-RSA 2021: 276-298 - [c87]Alex Biryukov, Aleksei Udovenko:
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations. EUROCRYPT (2) 2021: 219-248 - [c86]Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto:
Automated Truncation of Differential Trails and Trail Clustering in ARX. SAC 2021: 286-307 - [i59]Rene Pickhardt, Sergei Tikhomirov, Alex Biryukov, Mariusz Nowostawski:
Security and Privacy of Lightning Network Payments with Uncertain Channel Balances. CoRR abs/2103.08576 (2021) - [i58]Alex Biryukov, Aleksei Udovenko:
Dummy Shuffling against Algebraic Attacks in White-box Implementations. IACR Cryptol. ePrint Arch. 2021: 290 (2021) - [i57]Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov:
Analysis and Probing of Parallel Channels in the Lightning Network. IACR Cryptol. ePrint Arch. 2021: 384 (2021) - [i56]Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto:
Automated Truncation of Differential Trails and Trail Clustering in ARX. IACR Cryptol. ePrint Arch. 2021: 1194 (2021) - [i55]Je Sen Teh, Alex Biryukov:
Differential Cryptanalysis of WARP. IACR Cryptol. ePrint Arch. 2021: 1641 (2021) - [i54]Alex Biryukov, Daniel Dinu, Dmitry Khovratovich, Simon Josefsson:
Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications. RFC 9106: 1-21 (2021) - 2020
- [j14]Christof Beierle, Alex Biryukov, Aleksei Udovenko:
On degree-d zero-sum sets of full rank. Cryptogr. Commun. 12(4): 685-710 (2020) - [j13]Alex Biryukov, Daniel Feher:
ReCon: Sybil-resistant consensus from reputation. Pervasive Mob. Comput. 61: 101109 (2020) - [j12]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans. Symmetric Cryptol. 2020(S1): 208-261 (2020) - [c85]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). CRYPTO (3) 2020: 419-448 - [i53]Sergei Tikhomirov, Rene Pickhardt, Alex Biryukov, Mariusz Nowostawski:
Probing Channel Balances in the Lightning Network. CoRR abs/2004.00333 (2020) - [i52]Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto:
Cryptanalysis of Au et al. Dynamic Universal Accumulator. IACR Cryptol. ePrint Arch. 2020: 598 (2020) - [i51]Giuseppe Vitto, Alex Biryukov:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. IACR Cryptol. ePrint Arch. 2020: 777 (2020)
2010 – 2019
- 2019
- [j11]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of lightweight block ciphers for the Internet of things. J. Cryptogr. Eng. 9(3): 283-302 (2019) - [j10]Alex Biryukov, Sergei Tikhomirov:
Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash. Pervasive Mob. Comput. 59 (2019) - [c84]Luan Cardoso dos Santos, Johann Großschädl, Alex Biryukov:
FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms. CARDIS 2019: 216-233 - [c83]Alex Biryukov, Daniel Feher, Giuseppe Vitto:
Privacy Aspects and Subliminal Channels in Zcash. CCS 2019: 1795-1811 - [c82]Alex Biryukov, Daniel Feher:
Privacy and Linkability of Mining in Zcash. CNS 2019: 118-123 - [c81]Alex Biryukov, Sergei Tikhomirov:
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis. EuroS&P 2019: 172-184 - [c80]Alex Biryukov, Sergei Tikhomirov:
Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains. INFOCOM Workshops 2019: 204-209 - [c79]Alex Biryukov, Daniel Feher:
Portrait of a Miner in a Landscape. INFOCOM Workshops 2019: 638-643 - [e4]Cristina Pérez-Solà, Guillermo Navarro-Arribas, Alex Biryukov, Joaquín García-Alfaro:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings. Lecture Notes in Computer Science 11737, Springer 2019, ISBN 978-3-030-31499-6 [contents] - [i50]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-bit ARX-box. IACR Cryptol. ePrint Arch. 2019: 1378 (2019) - 2018
- [c78]Alex Biryukov, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. ASIACRYPT (2) 2018: 373-402 - [i49]Alex Biryukov, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. IACR Cryptol. ePrint Arch. 2018: 49 (2018) - [i48]Christof Beierle, Alex Biryukov, Aleksei Udovenko:
On Degree-d Zero-Sum Sets of Full Rank. IACR Cryptol. ePrint Arch. 2018: 1194 (2018) - 2017
- [j9]Alex Biryukov, Dmitry Khovratovich:
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem. Ledger 2: 1-30 (2017) - [c77]Alex Biryukov, Daniel Dinu, Yann Le Corre:
Side-Channel Attacks Meet Secure Network Protocols. ACNS 2017: 435-454 - [c76]Alex Biryukov, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. ASIACRYPT (3) 2017: 417-445 - [c75]Alex Biryukov, Daniel Dinu, Yann Le Corre, Aleksei Udovenko:
Optimal First-Order Boolean Masking for Embedded IoT Devices. CARDIS 2017: 22-41 - [c74]Alex Biryukov, Dmitry Khovratovich, Sergei Tikhomirov:
Findel: Secure Derivative Contracts for Ethereum. Financial Cryptography Workshops 2017: 453-467 - [i47]Alex Biryukov:
Proofs of Work - the Engines of Trust. ERCIM News 2017(110) (2017) - [i46]Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov:
Analysis of the NORX Core Permutation. IACR Cryptol. ePrint Arch. 2017: 34 (2017) - [i45]Alex Biryukov, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. IACR Cryptol. ePrint Arch. 2017: 414 (2017) - [i44]Alex Biryukov, Léo Perrin:
State of the Art in Lightweight Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2017: 511 (2017) - [i43]Alex Biryukov, Daniel Feher, Dmitry Khovratovich:
Guru: Universal Reputation Module for Distributed Consensus Protocols. IACR Cryptol. ePrint Arch. 2017: 671 (2017) - 2016
- [j8]Alex Biryukov, Dmitry Khovratovich, Léo Perrin:
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Trans. Symmetric Cryptol. 2016(2): 226-247 (2016) - [c73]Alex Biryukov, Daniel Dinu, Johann Großschädl:
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. ACNS 2016: 537-557 - [c72]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: Sparx and LAX. ASIACRYPT (1) 2016: 484-513 - [c71]Léo Perrin, Aleksei Udovenko, Alex Biryukov:
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. CRYPTO (2) 2016: 93-122 - [c70]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. EUROCRYPT (1) 2016: 372-402 - [c69]Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. EuroS&P 2016: 292-302 - [c68]Alex Biryukov, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. FSE 2016: 289-310 - [c67]Alex Biryukov, Dmitry Khovratovich:
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem. NDSS 2016 - [c66]Alex Biryukov, Dmitry Khovratovich:
Egalitarian Computing. USENIX Security Symposium 2016: 315-326 - [i42]Alex Biryukov, Dmitry Khovratovich:
Egalitarian computing. CoRR abs/1606.03588 (2016) - [i41]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. IACR Cryptol. ePrint Arch. 2016: 71 (2016) - [i40]Alex Biryukov, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}. IACR Cryptol. ePrint Arch. 2016: 409 (2016) - [i39]Léo Perrin, Aleksei Udovenko, Alex Biryukov:
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version). IACR Cryptol. ePrint Arch. 2016: 539 (2016) - [i38]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version). IACR Cryptol. ePrint Arch. 2016: 984 (2016) - 2015
- [c65]Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. ASIACRYPT (2) 2015: 633-657 - [c64]Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. CRYPTO (1) 2015: 116-140 - [c63]Alex Biryukov, Ivan Pustogarov:
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. Financial Cryptography 2015: 445-455 - [c62]Alex Biryukov, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. FSE 2015: 3-27 - [c61]Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. SAC 2015: 102-121 - [c60]Alex Biryukov, Ivan Pustogarov:
Bitcoin over Tor isn't a Good Idea. IEEE Symposium on Security and Privacy 2015: 122-134 - [e3]Alex Biryukov, Vipul Goyal:
Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings. Lecture Notes in Computer Science 9462, Springer 2015, ISBN 978-3-319-26616-9 [contents] - [i37]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptol. ePrint Arch. 2015: 209 (2015) - [i36]Alex Biryukov, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. IACR Cryptol. ePrint Arch. 2015: 227 (2015) - [i35]Alex Biryukov, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. IACR Cryptol. ePrint Arch. 2015: 240 (2015) - [i34]Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. IACR Cryptol. ePrint Arch. 2015: 426 (2015) - [i33]Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing. IACR Cryptol. ePrint Arch. 2015: 430 (2015) - [i32]Alex Biryukov, Dmitry Khovratovich:
Decomposition attack on SASASASAS. IACR Cryptol. ePrint Arch. 2015: 646 (2015) - [i31]Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. IACR Cryptol. ePrint Arch. 2015: 723 (2015) - [i30]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob. IACR Cryptol. ePrint Arch. 2015: 812 (2015) - [i29]Alex Biryukov, Dmitry Khovratovich:
Asymmetric proof-of-work based on the Generalized Birthday problem. IACR Cryptol. ePrint Arch. 2015: 946 (2015) - [i28]Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. IACR Cryptol. ePrint Arch. 2015: 976 (2015) - 2014
- [j7]Alex Biryukov, Jorge Nakahara Jr., Hamdi Murat Yildirim:
Differential entropy analysis of the IDEA block cipher. J. Comput. Appl. Math. 259: 561-570 (2014) - [c59]Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract). ASIACRYPT (1) 2014: 63-84 - [c58]Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of Clients in Bitcoin P2P Network. CCS 2014: 15-29 - [c57]Alex Biryukov, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers. CT-RSA 2014: 227-250 - [c56]Alex Biryukov, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. FSE 2014: 546-570 - [c55]Alex Biryukov, Ivan Pustogarov, Fabrice Thill, Ralf-Philipp Weinmann:
Content and Popularity Analysis of Tor Hidden Services. ICDCS Workshops 2014: 188-193 - [c54]Alex Biryukov, Dmitry Khovratovich:
PAEQ: Parallelizable Permutation-Based Authenticated Encryption. ISC 2014: 72-89 - [c53]Alex Biryukov, Ivica Nikolic:
Colliding Keys for SC2000-256. Selected Areas in Cryptography 2014: 77-91 - [i27]Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov:
Deanonymisation of clients in Bitcoin P2P network. CoRR abs/1405.7418 (2014) - [i26]Alex Biryukov, Ivan Pustogarov:
Bitcoin over Tor isn't a good idea. CoRR abs/1410.6079 (2014) - [i25]Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. IACR Cryptol. ePrint Arch. 2014: 474 (2014) - [i24]Alex Biryukov, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. IACR Cryptol. ePrint Arch. 2014: 922 (2014) - [i23]Alex Biryukov, Ivan Pustogarov:
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. IACR Cryptol. ePrint Arch. 2014: 1011 (2014) - 2013
- [c52]Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. FSE 2013: 3-18 - [c51]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. IEEE Symposium on Security and Privacy 2013: 80-94 - [i22]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
Content and popularity analysis of Tor hidden services. CoRR abs/1308.6768 (2013) - [i21]Alex Biryukov, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers (Extended Version). IACR Cryptol. ePrint Arch. 2013: 853 (2013) - 2012
- [j6]Alex Biryukov, Johann Großschädl:
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. Fundam. Informaticae 114(3-4): 221-237 (2012) - [c50]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. ESORICS 2012: 469-486 - [c49]Alex Biryukov, Gaëtan Leurent, Arnab Roy:
Cryptanalysis of the "Kindle" Cipher. Selected Areas in Cryptography 2012: 86-103 - [c48]Alex Biryukov, Aleksandar Kircanski, Amr M. Youssef:
Cryptanalysis of the Loiss Stream Cipher. Selected Areas in Cryptography 2012: 119-134 - [i20]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News 2012(90) (2012) - [i19]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks. IACR Cryptol. ePrint Arch. 2012: 432 (2012) - 2011
- [c47]Alex Biryukov, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. ACNS 2011: 91-109 - [c46]Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic:
Second-Order Differential Collisions for Reduced SHA-256. ASIACRYPT 2011: 270-287 - [c45]Alex Biryukov, Ivica Nikolic:
Search for Related-Key Differential Characteristics in DES-Like Ciphers. FSE 2011: 18-34 - [c44]Alex Biryukov, Ivica Nikolic, Arnab Roy:
Boomerang Attacks on BLAKE-32. FSE 2011: 218-237 - [e2]Alex Biryukov, Guang Gong, Douglas R. Stinson:
Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6544, Springer 2011, ISBN 978-3-642-19573-0 [contents] - [r64]Alex Biryukov:
Adaptive Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 21 - [r63]Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 21 - [r62]Alex Biryukov:
Adaptive Chosen Plaintext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 21 - [r61]Alex Biryukov:
Boomerang Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 165-166 - [r60]Alex Biryukov:
Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 205 - [r59]Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 205 - [r58]Alex Biryukov:
Chosen Plaintext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 205-206 - [r57]Alex Biryukov:
Ciphertext-Only Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 207 - [r56]Alex Biryukov:
Codebook Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 216 - [r55]Alex Biryukov, Christophe De Cannière:
Data Encryption Standard (DES). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 295-301 - [r54]Alex Biryukov:
DES-X (or DESX). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 331 - [r53]Alex Biryukov:
Dictionary Attack (I). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 332 - [r52]Alex Biryukov:
Differential-Linear Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 340-341 - [r51]Alex Biryukov:
Feistel Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 455 - [r50]Alex Biryukov:
IDEA. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 583-584 - [r49]Alex Biryukov:
Impossible Differential Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 597 - [r48]Alex Biryukov:
IPES. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 634-635 - [r47]Alex Biryukov:
Known Plaintext Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 704-705 - [r46]Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 722-725 - [r45]Alex Biryukov:
Meet-in-the-Middle Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 772-773 - [r44]Alex Biryukov:
Miss-in-the-Middle Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 786 - [r43]Alex Biryukov:
Multiple Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 815 - [r42]Alex Biryukov:
Multiset Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 822 - [r41]Alex Biryukov:
Product Cipher, Superencryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 980-981 - [r40]Alex Biryukov:
Related Key Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1040-1041 - [r39]Alex Biryukov:
Resynchronization Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1042-1043 - [r38]Alex Biryukov:
Skipjack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1220-1221 - [r37]Alex Biryukov:
Slide Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1221-1222 - [r36]Alex Biryukov:
Structural Cryptanalysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1266 - [r35]Alex Biryukov:
Substitution-Permutation (SP) Network. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1268 - [r34]Alex Biryukov:
Truncated Differentials. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1320 - [r33]Alex Biryukov:
Weak Keys. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1366-1367 - [i18]Alex Biryukov, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. IACR Cryptol. ePrint Arch. 2011: 707 (2011) - [i17]Alex Biryukov, Johann Großschädl:
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. IACR Cryptol. ePrint Arch. 2011: 710 (2011) - 2010
- [j5]Alex Biryukov, Adi Shamir:
Structural Cryptanalysis of SASAS. J. Cryptol. 23(4): 505-518 (2010) - [c43]Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . ACNS 2010: 139-153 - [c42]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. EUROCRYPT 2010: 299-319 - [c41]Alex Biryukov, Ivica Nikolic:
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. EUROCRYPT 2010: 322-344 - [c40]Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕. ICETE (Selected Papers) 2010: 147-157 - [c39]Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Analysis of SNOW 3G⊕ Resynchronization Mechanism. SECRYPT 2010: 327-333 - [i16]Alex Biryukov, Ivica Nikolic:
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. IACR Cryptol. ePrint Arch. 2010: 248 (2010) - [i15]Alex Biryukov, Dmitry Khovratovich:
Feasible Attack on the 13-round AES-256. IACR Cryptol. ePrint Arch. 2010: 257 (2010)
2000 – 2009
- 2009
- [c38]Alex Biryukov, Dmitry Khovratovich:
Related-Key Cryptanalysis of the Full AES-192 and AES-256. ASIACRYPT 2009: 1-18 - [c37]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256. CRYPTO 2009: 231-249 - [c36]Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic:
Speeding up Collision Search for Byte-Oriented Hash Functions. CT-RSA 2009: 164-181 - [c35]Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [i14]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version). IACR Cryptol. ePrint Arch. 2009: 241 (2009) - [i13]Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic:
Examples of differential multicollisions for 13 and 14 rounds of AES-256. IACR Cryptol. ePrint Arch. 2009: 242 (2009) - [i12]Alex Biryukov, Dmitry Khovratovich:
Related-key Cryptanalysis of the Full AES-192 and AES-256. IACR Cryptol. ePrint Arch. 2009: 317 (2009) - [i11]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds. IACR Cryptol. ePrint Arch. 2009: 374 (2009) - 2008
- [c34]Ivica Nikolic, Alex Biryukov:
Collisions for Step-Reduced SHA-256. FSE 2008: 1-15 - [c33]Deike Priemuth-Schmid, Alex Biryukov:
Slid Pairs in Salsa20 and Trivium. INDOCRYPT 2008: 1-14 - [p1]Alex Biryukov:
Design of a New Stream Cipher-LEX. The eSTREAM Finalists 2008: 48-56 - [i10]Deike Priemuth-Schmid, Alex Biryukov:
Slid Pairs in Salsa20 and Trivium. IACR Cryptol. ePrint Arch. 2008: 405 (2008) - 2007
- [c32]Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper:
Collision Attacks on AES-Based MAC: Alpha-MAC. CHES 2007: 166-180 - [c31]Alex Biryukov, Dmitry Khovratovich:
Two New Techniques of Side-Channel Cryptanalysis. CHES 2007: 195-208 - [c30]Alexander Maximov, Alex Biryukov:
Two Trivial Attacks on Trivium. Selected Areas in Cryptography 2007: 36-55 - [e1]Alex Biryukov:
Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4593, Springer 2007, ISBN 978-3-540-74617-1 [contents] - [i9]Alex Biryukov:
Block and Stream Ciphers and the Creatures in Between. Symmetric Cryptography 2007 - [i8]Alexander Maximov, Alex Biryukov:
Two Trivial Attacks on Trivium. IACR Cryptol. ePrint Arch. 2007: 21 (2007) - 2006
- [j4]Christophe De Cannière, Alex Biryukov, Bart Preneel:
An introduction to Block Cipher Cryptanalysis. Proc. IEEE 94(2): 346-356 (2006) - [c29]Alex Biryukov:
The Design of a Stream Cipher LEX. Selected Areas in Cryptography 2006: 67-75 - [c28]Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). SCN 2006: 242-256 - [i7]Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. IACR Cryptol. ePrint Arch. 2006: 187 (2006) - 2005
- [j3]Alex Biryukov, Joseph Lano, Bart Preneel:
Recent attacks on alleged SecurID and their practical implications. Comput. Secur. 24(5): 364-370 (2005) - [j2]Eli Biham, Alex Biryukov, Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. Cryptol. 18(4): 291-311 (2005) - [c27]Alex Biryukov, Adi Shamir:
Analysis of the Non-linear Part of Mugi. FSE 2005: 320-329 - [c26]Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. ICICS 2005: 147-158 - [c25]Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar:
Improved Time-Memory Trade-Offs with Multiple Data. Selected Areas in Cryptography 2005: 110-127 - [c24]Hirotaka Yoshida, Alex Biryukov:
Analysis of a SHA-256 Variant. Selected Areas in Cryptography 2005: 245-260 - [r32]Alex Biryukov:
Adaptive Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security 2005 - [r31]Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security 2005 - [r30]Alex Biryukov:
Adaptive Chosen Plaintext Attack. Encyclopedia of Cryptography and Security 2005 - [r29]Alex Biryukov:
Boomerang Attack. Encyclopedia of Cryptography and Security 2005 - [r28]Alex Biryukov:
Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security 2005 - [r27]Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack. Encyclopedia of Cryptography and Security 2005 - [r26]Alex Biryukov:
Chosen Plaintext Attack. Encyclopedia of Cryptography and Security 2005 - [r25]Alex Biryukov:
Ciphertext-Only Attack. Encyclopedia of Cryptography and Security 2005 - [r24]Alex Biryukov:
Codebook Attack. Encyclopedia of Cryptography and Security 2005 - [r23]Alex Biryukov:
DES-X (or DESX). Encyclopedia of Cryptography and Security 2005 - [r22]Alex Biryukov:
Dictionary Attack (I). Encyclopedia of Cryptography and Security 2005 - [r21]Alex Biryukov:
Differential-Linear Attack. Encyclopedia of Cryptography and Security 2005 - [r20]Alex Biryukov:
Feistel Cipher. Encyclopedia of Cryptography and Security 2005 - [r19]Alex Biryukov:
IDEA. Encyclopedia of Cryptography and Security 2005 - [r18]Alex Biryukov:
Impossible Differential Attack. Encyclopedia of Cryptography and Security 2005 - [r17]Alex Biryukov:
IPES. Encyclopedia of Cryptography and Security 2005 - [r16]Alex Biryukov:
Known plaintext attack. Encyclopedia of Cryptography and Security 2005 - [r15]Alex Biryukov:
Meet-in-the-Middle Attack. Encyclopedia of Cryptography and Security 2005 - [r14]Alex Biryukov:
Miss-in-the-Middle Attack. Encyclopedia of Cryptography and Security 2005 - [r13]Alex Biryukov:
Multiple Encryption. Encyclopedia of Cryptography and Security 2005 - [r12]Alex Biryukov:
Multiset Attack. Encyclopedia of Cryptography and Security 2005 - [r11]Alex Biryukov:
Product Cipher, Superencryption. Encyclopedia of Cryptography and Security 2005 - [r10]Alex Biryukov:
Related Key Attack. Encyclopedia of Cryptography and Security 2005 - [r9]Alex Biryukov:
Resynchronization Attack. Encyclopedia of Cryptography and Security 2005 - [r8]Alex Biryukov:
Skipjack. Encyclopedia of Cryptography and Security 2005 - [r7]Alex Biryukov:
Substitution-Permutation (SP) Network. Encyclopedia of Cryptography and Security 2005 - [r6]Alex Biryukov:
Truncated Differentials. Encyclopedia of Cryptography and Security 2005 - [r5]Alex Biryukov:
Weak keys. Encyclopedia of Cryptography and Security 2005 - [r4]Alex Biryukov:
Slide Attack. Encyclopedia of Cryptography and Security 2005 - [r3]Alex Biryukov:
Structural Cryptanalysis. Encyclopedia of Cryptography and Security 2005 - [r2]Alex Biryukov, Christophe De Cannière:
Data encryption standard (DES). Encyclopedia of Cryptography and Security 2005 - [r1]Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. Encyclopedia of Cryptography and Security 2005 - [i6]Alex Biryukov:
Some Thoughts on Time-Memory-Data Tradeoffs. IACR Cryptol. ePrint Arch. 2005: 207 (2005) - [i5]Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. IACR Cryptol. ePrint Arch. 2005: 327 (2005) - 2004
- [c23]Alex Biryukov:
The Boomerang Attack on 5 and 6-Round Reduced AES. AES Conference 2004: 11-15 - [c22]Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. CRYPTO 2004: 1-22 - [c21]Hirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel:
Non-randomness of the Full 4 and 5-Pass HAVAL. SCN 2004: 324-336 - [i4]Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. IACR Cryptol. ePrint Arch. 2004: 57 (2004) - [i3]Alex Biryukov:
Block Ciphers and Stream Ciphers: The State of the Art. IACR Cryptol. ePrint Arch. 2004: 94 (2004) - 2003
- [c20]Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle:
Cryptanalysis of 3-Pass HAVAL. ASIACRYPT 2003: 228-245 - [c19]Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz:
Cryptanalysis of SAFER++. CRYPTO 2003: 195-211 - [c18]Alex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel:
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. EUROCRYPT 2003: 33-50 - [c17]Alex Biryukov:
Analysis of Involutional Ciphers: Khazad and Anubis. FSE 2003: 45-53 - [c16]Alex Biryukov, Christophe De Cannière:
Block Ciphers and Systems of Quadratic Equations. FSE 2003: 274-289 - [c15]Alex Biryukov, Joseph Lano, Bart Preneel:
Cryptanalysis of the Alleged SecurID Hash Function. Selected Areas in Cryptography 2003: 130-144 - [c14]Dai Watanabe, Alex Biryukov, Christophe De Cannière:
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. Selected Areas in Cryptography 2003: 222-233 - [i2]Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz:
Crytanalysis of SAFER++. IACR Cryptol. ePrint Arch. 2003: 109 (2003) - [i1]Alex Biryukov, Joseph Lano, Bart Preneel:
Cryptanalysis of the Alleged SecurID Hash Function. IACR Cryptol. ePrint Arch. 2003: 162 (2003) - 2002
- [c13]Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
New Weak-Key Classes of IDEA. ICICS 2002: 315-326 - 2001
- [c12]Alex Biryukov, Adi Shamir:
Structural Cryptanalysis of SASAS. EUROCRYPT 2001: 394-405 - 2000
- [c11]Alex Biryukov, Adi Shamir:
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. ASIACRYPT 2000: 1-13 - [c10]Alex Biryukov, David A. Wagner:
Advanced Slide Attacks. EUROCRYPT 2000: 589-606 - [c9]Alex Biryukov, Adi Shamir, David A. Wagner:
Real Time Cryptanalysis of A5/1 on a PC. FSE 2000: 1-18
1990 – 1999
- 1999
- [c8]Eli Biham, Alex Biryukov, Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. EUROCRYPT 1999: 12-23 - [c7]Eli Biham, Alex Biryukov, Adi Shamir:
Miss in the Middle Attacks on IDEA and Khufu. FSE 1999: 124-138 - [c6]Alex Biryukov, David A. Wagner:
Slide Attacks. FSE 1999: 245-259 - 1998
- [c5]Alex Biryukov, Eyal Kushilevitz:
From Differential Cryptanalysis to Ciphertext-Only Attacks. CRYPTO 1998: 72-88 - [c4]Alex Biryukov, Eyal Kushilevitz:
Improved Cryptanalysis of RC5. EUROCRYPT 1998: 85-99 - [c3]Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Selected Areas in Cryptography 1998: 362-376 - 1997
- [j1]Eli Biham, Alex Biryukov:
An Improvement of Davies' Attack on DES. J. Cryptol. 10(3): 195-206 (1997) - 1994
- [c2]Eli Biham, Alex Biryukov:
How to Strengthen DES Using Existing Hardware. ASIACRYPT 1994: 398-412 - [c1]Eli Biham, Alex Biryukov:
An Improvement of Davies' Attack on DES. EUROCRYPT 1994: 461-467
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-10 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint