Alex Biryukov

From MaRDI portal
Person:604628


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Cryptanalysis of algebraic verifiable delay functions
 
2024-12-13Paper
PURED: a unified framework for resource-hard functions
 
2024-10-23Paper
Advancing the meet-in-the-filter technique: applications to CHAM and KATAN
 
2024-10-16Paper
Automated truncation of differential trails and trail clustering in ARX
 
2024-10-14Paper
Meet-in-the-filter and dynamic counting with applications to \textsc{Speck}
 
2023-11-09Paper
Analysis and probing of parallel channels in the lightning network
Financial Cryptography and Data Security
2023-05-26Paper
Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
 
2022-12-07Paper
Dynamic universal accumulator with batch update over bilinear groups
 
2022-07-06Paper
Side-channel attacks meet secure network protocols
 
2022-07-01Paper
Cryptanalysis of a dynamic universal accumulator over bilinear groups
 
2021-12-20Paper
Dummy shuffling against algebraic attacks in white-box implementations
 
2021-12-08Paper
On degree-\(d\) zero-sum sets of full rank
Cryptography and Communications
2020-09-30Paper
Attacks and countermeasures for white-box designs
 
2019-01-23Paper
Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
Fast Software Encryption
2018-05-09Paper
Symmetrically and asymmetrically hard cryptography
 
2018-02-23Paper
Design Strategies for ARX with Provable Bounds: Sparx and LAX
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Correlation power analysis of lightweight block ciphers: from theory to practice
Applied Cryptography and Network Security
2016-10-04Paper
Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Cryptanalysis of Feistel networks with secret round functions
Lecture Notes in Computer Science
2016-05-19Paper
Colliding keys for SC2000-256
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Tradeoff Cryptanalysis of Memory-Hard Functions
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Lecture Notes in Computer Science
2015-12-10Paper
Cryptanalysis of the loiss stream cipher
Selected Areas in Cryptography
2015-12-04Paper
Cryptanalysis of the ``Kindle cipher
Selected Areas in Cryptography
2015-12-04Paper
PAEQ: parallelizable permutation-based authenticated encryption
Lecture Notes in Computer Science
2015-11-03Paper
Complementing Feistel ciphers
Fast Software Encryption
2015-09-18Paper
Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck}
Fast Software Encryption
2015-09-18Paper
Differential analysis and meet-in-the-middle attack against round-reduced TWINE
Fast Software Encryption
2015-09-18Paper
Differential entropy analysis of the IDEA block cipher
Journal of Computational and Applied Mathematics
2015-06-17Paper
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
Lecture Notes in Computer Science
2015-01-16Paper
Automatic Search for Differential Trails in ARX Ciphers
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Cryptanalysis of the full AES using GPU-like special-purpose hardware
Fundamenta Informaticae
2012-05-11Paper
Second-order differential collisions for reduced SHA-256
Lecture Notes in Computer Science
2011-12-02Paper
Search for Related-Key Differential Characteristics in DES-Like Ciphers
Fast Software Encryption
2011-07-07Paper
Boomerang attacks on BLAKE-32
Fast Software Encryption
2011-07-07Paper
Structural cryptanalysis of SASAS
Journal of Cryptology
2010-11-12Paper
Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G\(^{ \oplus }\)
Applied Cryptography and Network Security
2010-07-06Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Cryptanalysis of 3-pass HAVAL
Lecture Notes in Computer Science
2010-01-05Paper
Block ciphers and systems of quadratic equations.
Lecture Notes in Computer Science
2010-01-05Paper
Analysis of involutional ciphers: Khazad and Anubis.
Lecture Notes in Computer Science
2010-01-05Paper
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Distinguisher and Related-Key Attack on the Full AES-256
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Cryptanalysis of the LAKE Hash Family
Fast Software Encryption
2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Slid Pairs in Salsa20 and Trivium
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
Lecture Notes in Computer Science
2008-11-27Paper
Collisions for Step-Reduced SHA-256
Fast Software Encryption
2008-09-18Paper
Two Trivial Attacks on Trivium
Selected Areas in Cryptography
2008-03-25Paper
The Design of a Stream Cipher LEX
Selected Areas in Cryptography
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Analysis of a SHA-256 Variant
Selected Areas in Cryptography
2007-11-15Paper
Improved Time-Memory Trade-Offs with Multiple Data
Selected Areas in Cryptography
2007-11-15Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
Journal of Cryptology
2006-08-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Adavanced slide attacks
 
2006-03-01Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2009947 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1980970 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1759258 (Why is no real title available?)
 
2002-10-13Paper
scientific article; zbMATH DE number 1722688 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1583765 (Why is no real title available?)
 
2001-07-03Paper
scientific article; zbMATH DE number 1418257 (Why is no real title available?)
 
2000-08-27Paper
scientific article; zbMATH DE number 1418249 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1302839 (Why is no real title available?)
 
2000-03-07Paper
scientific article; zbMATH DE number 1304130 (Why is no real title available?)
 
2000-02-01Paper
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
Advances in Cryptology — EUROCRYPT ’99
1999-10-05Paper
scientific article; zbMATH DE number 1303115 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1088943 (Why is no real title available?)
 
1997-11-18Paper
scientific article; zbMATH DE number 1024498 (Why is no real title available?)
 
1997-11-02Paper
An improvement of Davies' attack on DES
Journal of Cryptology
1997-08-28Paper


Research outcomes over time


This page was built for person: Alex Biryukov