Dmitry Khovratovich

From MaRDI portal
Person:744345

Available identifiers

zbMath Open khovratovich.dmitryDBLP22/2499WikidataQ58007880 ScholiaQ58007880MaRDI QIDQ744345

List of research outcomes





PublicationDate of PublicationType
Cryptanalysis of algebraic verifiable delay functions2024-12-13Paper
Generic security of the SAFE API and its applications2024-06-26Paper
\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function2024-02-02Paper
T5: Hashing five inputs with three compression calls2023-07-03Paper
Aggregatable subvector commitments for stateless cryptocurrencies2022-12-16Paper
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC2020-05-11Paper
Tradeoff Cryptanalysis of Memory-Hard Functions2016-03-23Paper
PAEQ: parallelizable permutation-based authenticated encryption2015-11-03Paper
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE2015-10-01Paper
Rotational cryptanalysis of ARX revisited2015-09-18Paper
Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-642015-09-18Paper
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)2015-01-16Paper
Rotational rebound attacks on reduced Skein2014-09-25Paper
Key wrapping with a fixed permutation2014-03-28Paper
Bicliques for permutations: collision and preimage attacks in stronger settings2013-03-19Paper
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family2013-01-08Paper
New preimage attacks against reduced SHA-12012-09-25Paper
Narrow-bicliques: cryptanalysis of full IDEA2012-06-29Paper
Biclique Cryptanalysis of the Full AES2011-12-02Paper
Cryptanalysis of Luffa v2 components2011-03-15Paper
Rotational Rebound Attacks on Reduced Skein2010-12-07Paper
Rotational cryptanalysis of ARX2010-07-13Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds2010-06-01Paper
Related-Key Cryptanalysis of the Full AES-192 and AES-2562009-12-15Paper
Cryptanalysis of hash functions with structures2009-12-09Paper
Distinguisher and Related-Key Attack on the Full AES-2562009-10-20Paper
Meet-in-the-Middle Attacks on SHA-3 Candidates2009-08-11Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions2009-04-29Paper
New State Recovery Attack on RC42009-02-10Paper
Two Attacks on RadioGatún2009-01-22Paper

Research outcomes over time

This page was built for person: Dmitry Khovratovich