Dmitry Khovratovich

From MaRDI portal
(Redirected from Person:744345)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Cryptanalysis of algebraic verifiable delay functions2024-12-13Paper
Generic security of the SAFE API and its applications2024-06-26Paper
\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
Progress in Cryptology - AFRICACRYPT 2023
2024-02-02Paper
T5: Hashing five inputs with three compression calls2023-07-03Paper
Aggregatable subvector commitments for stateless cryptocurrencies2022-12-16Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
Tradeoff Cryptanalysis of Memory-Hard Functions
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
PAEQ: parallelizable permutation-based authenticated encryption
Lecture Notes in Computer Science
2015-11-03Paper
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Rotational cryptanalysis of ARX revisited
Fast Software Encryption
2015-09-18Paper
Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-64
Fast Software Encryption
2015-09-18Paper
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
Lecture Notes in Computer Science
2015-01-16Paper
Rotational rebound attacks on reduced Skein
Journal of Cryptology
2014-09-25Paper
Key wrapping with a fixed permutation
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Bicliques for permutations: collision and preimage attacks in stronger settings
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
Fast Software Encryption
2013-01-08Paper
New preimage attacks against reduced SHA-1
Lecture Notes in Computer Science
2012-09-25Paper
Narrow-bicliques: cryptanalysis of full IDEA
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Biclique Cryptanalysis of the Full AES
Lecture Notes in Computer Science
2011-12-02Paper
Cryptanalysis of Luffa v2 components
Selected Areas in Cryptography
2011-03-15Paper
Rotational Rebound Attacks on Reduced Skein
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Rotational cryptanalysis of ARX
Fast Software Encryption
2010-07-13Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Cryptanalysis of hash functions with structures
Selected Areas in Cryptography
2009-12-09Paper
Distinguisher and Related-Key Attack on the Full AES-256
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Meet-in-the-Middle Attacks on SHA-3 Candidates
Fast Software Encryption
2009-08-11Paper
Cryptanalysis of the LAKE Hash Family
Fast Software Encryption
2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
New State Recovery Attack on RC4
Lecture Notes in Computer Science
2009-02-10Paper
Two Attacks on RadioGatún
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper


Research outcomes over time


This page was built for person: Dmitry Khovratovich