Alex Biryukov

From MaRDI portal
Person:604628

Available identifiers

zbMath Open biryukov.alexDBLP09/5071WikidataQ2832904 ScholiaQ2832904MaRDI QIDQ604628

List of research outcomes





PublicationDate of PublicationType
Cryptanalysis of algebraic verifiable delay functions2024-12-13Paper
PURED: a unified framework for resource-hard functions2024-10-23Paper
Advancing the meet-in-the-filter technique: applications to CHAM and KATAN2024-10-16Paper
Automated truncation of differential trails and trail clustering in ARX2024-10-14Paper
Meet-in-the-filter and dynamic counting with applications to \textsc{Speck}2023-11-09Paper
Analysis and probing of parallel channels in the lightning network2023-05-26Paper
Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)2022-12-07Paper
Dynamic universal accumulator with batch update over bilinear groups2022-07-06Paper
Side-Channel Attacks Meet Secure Network Protocols2022-07-01Paper
Cryptanalysis of a dynamic universal accumulator over bilinear groups2021-12-20Paper
Dummy shuffling against algebraic attacks in white-box implementations2021-12-08Paper
On degree-\(d\) zero-sum sets of full rank2020-09-30Paper
Attacks and countermeasures for white-box designs2019-01-23Paper
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck2018-05-09Paper
Symmetrically and asymmetrically hard cryptography2018-02-23Paper
Design Strategies for ARX with Provable Bounds: Sparx and LAX2017-02-01Paper
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem2016-10-27Paper
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice2016-10-04Paper
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr12016-09-09Paper
Cryptanalysis of Feistel Networks with Secret Round Functions2016-05-19Paper
Colliding Keys for SC2000-2562016-04-13Paper
Tradeoff Cryptanalysis of Memory-Hard Functions2016-03-23Paper
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure2015-12-10Paper
Cryptanalysis of the Loiss Stream Cipher2015-12-04Paper
Cryptanalysis of the “Kindle” Cipher2015-12-04Paper
PAEQ: Parallelizable Permutation-Based Authenticated Encryption2015-11-03Paper
Complementing Feistel Ciphers2015-09-18Paper
Differential Analysis of Block Ciphers SIMON and SPECK2015-09-18Paper
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE2015-09-18Paper
Differential entropy analysis of the IDEA block cipher2015-06-17Paper
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)2015-01-16Paper
Automatic Search for Differential Trails in ARX Ciphers2014-03-28Paper
Cryptanalysis of the full AES using GPU-like special-purpose hardware2012-05-11Paper
Second-Order Differential Collisions for Reduced SHA-2562011-12-02Paper
Search for Related-Key Differential Characteristics in DES-Like Ciphers2011-07-07Paper
Boomerang attacks on BLAKE-322011-07-07Paper
Structural cryptanalysis of SASAS2010-11-12Paper
Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G\(^{ \oplus }\)2010-07-06Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds2010-06-01Paper
Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others2010-06-01Paper
Cryptanalysis of 3-pass HAVAL2010-01-05Paper
Block ciphers and systems of quadratic equations.2010-01-05Paper
Analysis of involutional ciphers: Khazad and Anubis.2010-01-05Paper
Related-Key Cryptanalysis of the Full AES-192 and AES-2562009-12-15Paper
Distinguisher and Related-Key Attack on the Full AES-2562009-10-20Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions2009-04-29Paper
Slid Pairs in Salsa20 and Trivium2009-01-22Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)2008-11-27Paper
Collisions for Step-Reduced SHA-2562008-09-18Paper
Two Trivial Attacks on Trivium2008-03-25Paper
The Design of a Stream Cipher LEX2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Analysis of a SHA-256 Variant2007-11-15Paper
Improved Time-Memory Trade-Offs with Multiple Data2007-11-15Paper
Information and Communications Security2006-10-24Paper
Security in Communication Networks2006-10-10Paper
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials2006-08-14Paper
Fast Software Encryption2006-06-22Paper
Adavanced slide attacks2006-03-01Paper
Selected Areas in Cryptography2005-12-27Paper
Selected Areas in Cryptography2005-12-27Paper
Advanced Encryption Standard – AES2005-09-14Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44348672003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44283602003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q45379792002-10-13Paper
https://portal.mardi4nfdi.de/entity/Q27788592002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27073962001-07-03Paper
https://portal.mardi4nfdi.de/entity/Q49418162000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49418082000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42493222000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42508302000-02-01Paper
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials1999-10-05Paper
https://portal.mardi4nfdi.de/entity/Q42496301999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43657681997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43424741997-11-02Paper
An improvement of Davies' attack on DES1997-08-28Paper

Research outcomes over time

This page was built for person: Alex Biryukov