Dmitry Khovratovich

From MaRDI portal
Revision as of 10:04, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:744345

Available identifiers

zbMath Open khovratovich.dmitryDBLP22/2499WikidataQ58007880 ScholiaQ58007880MaRDI QIDQ744345

List of research outcomes





PublicationDate of PublicationType
Cryptanalysis of algebraic verifiable delay functions2024-12-13Paper
Generic security of the SAFE API and its applications2024-06-26Paper
\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function2024-02-02Paper
T5: Hashing five inputs with three compression calls2023-07-03Paper
Aggregatable subvector commitments for stateless cryptocurrencies2022-12-16Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
Tradeoff Cryptanalysis of Memory-Hard Functions2016-03-23Paper
PAEQ: Parallelizable Permutation-Based Authenticated Encryption2015-11-03Paper
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE2015-10-01Paper
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-642015-09-18Paper
Rotational Cryptanalysis of ARX Revisited2015-09-18Paper
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)2015-01-16Paper
Rotational rebound attacks on reduced Skein2014-09-25Paper
Key Wrapping with a Fixed Permutation2014-03-28Paper
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings2013-03-19Paper
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family2013-01-08Paper
New Preimage Attacks against Reduced SHA-12012-09-25Paper
Narrow-Bicliques: Cryptanalysis of Full IDEA2012-06-29Paper
Biclique Cryptanalysis of the Full AES2011-12-02Paper
Cryptanalysis of Luffa v2 Components2011-03-15Paper
Rotational Rebound Attacks on Reduced Skein2010-12-07Paper
Rotational Cryptanalysis of ARX2010-07-13Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds2010-06-01Paper
Related-Key Cryptanalysis of the Full AES-192 and AES-2562009-12-15Paper
Cryptanalysis of Hash Functions with Structures2009-12-09Paper
Distinguisher and Related-Key Attack on the Full AES-2562009-10-20Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Meet-in-the-Middle Attacks on SHA-3 Candidates2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions2009-04-29Paper
New State Recovery Attack on RC42009-02-10Paper
Two Attacks on RadioGatún2009-01-22Paper

Research outcomes over time

This page was built for person: Dmitry Khovratovich