Alex Biryukov

From MaRDI portal
Person:604628

Available identifiers

zbMath Open biryukov.alexWikidataQ2832904 ScholiaQ2832904MaRDI QIDQ604628

List of research outcomes

PublicationDate of PublicationType
Analysis and probing of parallel channels in the lightning network2023-05-26Paper
Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)2022-12-07Paper
Dynamic universal accumulator with batch update over bilinear groups2022-07-06Paper
Cryptanalysis of a dynamic universal accumulator over bilinear groups2021-12-20Paper
Dummy shuffling against algebraic attacks in white-box implementations2021-12-08Paper
On degree-\(d\) zero-sum sets of full rank2020-09-30Paper
Attacks and countermeasures for white-box designs2019-01-23Paper
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck2018-05-09Paper
Symmetrically and asymmetrically hard cryptography2018-02-23Paper
Design Strategies for ARX with Provable Bounds: Sparx and LAX2017-02-01Paper
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem2016-10-27Paper
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice2016-10-04Paper
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr12016-09-09Paper
Cryptanalysis of Feistel Networks with Secret Round Functions2016-05-19Paper
Colliding Keys for SC2000-2562016-04-13Paper
Tradeoff Cryptanalysis of Memory-Hard Functions2016-03-23Paper
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure2015-12-10Paper
Cryptanalysis of the “Kindle” Cipher2015-12-04Paper
Cryptanalysis of the Loiss Stream Cipher2015-12-04Paper
PAEQ: Parallelizable Permutation-Based Authenticated Encryption2015-11-03Paper
Complementing Feistel Ciphers2015-09-18Paper
Differential Analysis of Block Ciphers SIMON and SPECK2015-09-18Paper
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE2015-09-18Paper
Differential entropy analysis of the IDEA block cipher2015-06-17Paper
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)2015-01-16Paper
Automatic Search for Differential Trails in ARX Ciphers2014-03-28Paper
https://portal.mardi4nfdi.de/entity/Q28831682012-05-11Paper
Second-Order Differential Collisions for Reduced SHA-2562011-12-02Paper
Search for Related-Key Differential Characteristics in DES-Like Ciphers2011-07-07Paper
Boomerang Attacks on BLAKE-322011-07-07Paper
Structural cryptanalysis of SASAS2010-11-12Paper
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G ⊕2010-07-06Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds2010-06-01Paper
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others2010-06-01Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Fast Software Encryption2010-01-05Paper
Fast Software Encryption2010-01-05Paper
Related-Key Cryptanalysis of the Full AES-192 and AES-2562009-12-15Paper
Distinguisher and Related-Key Attack on the Full AES-2562009-10-20Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions2009-04-29Paper
Slid Pairs in Salsa20 and Trivium2009-01-22Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)2008-11-27Paper
Collisions for Step-Reduced SHA-2562008-09-18Paper
Two Trivial Attacks on Trivium2008-03-25Paper
The Design of a Stream Cipher LEX2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Improved Time-Memory Trade-Offs with Multiple Data2007-11-15Paper
Analysis of a SHA-256 Variant2007-11-15Paper
Information and Communications Security2006-10-24Paper
Security in Communication Networks2006-10-10Paper
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials2006-08-14Paper
Fast Software Encryption2006-06-22Paper
https://portal.mardi4nfdi.de/entity/Q33749412006-03-01Paper
Selected Areas in Cryptography2005-12-27Paper
Selected Areas in Cryptography2005-12-27Paper
Advanced Encryption Standard – AES2005-09-14Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44348672003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44283602003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q45379792002-10-13Paper
https://portal.mardi4nfdi.de/entity/Q27788592002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27073962001-07-03Paper
https://portal.mardi4nfdi.de/entity/Q49418162000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49418082000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42493222000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42508302000-02-01Paper
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials1999-10-05Paper
https://portal.mardi4nfdi.de/entity/Q42496301999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43657681997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43424741997-11-02Paper
An improvement of Davies' attack on DES1997-08-28Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Alex Biryukov