What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Alex Biryukov
Google Scholar
ORCID:
0000-0003-1404-6686
90
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations.
Alex Biryukov
Baptiste Lambin
Aleksei Udovenko
2024
conf/crypto
Cryptanalysis of Algebraic Verifiable Delay Functions.
Alex Biryukov
Ben Fisch
Gottfried Herold
Dmitry Khovratovich
Gaëtan Leurent
María Naya-Plasencia
Benjamin Wesolowski
2023
journals/tches
Cryptanalysis of ARX-based White-box Implementations.
Alex Biryukov
Baptiste Lambin
Aleksei Udovenko
2023
conf/acns
Meet-in-the-Filter and Dynamic Counting with Applications to Speck.
Alex Biryukov
Luan Cardoso dos Santos
Je Sen Teh
Aleksei Udovenko
Vesselin Velichkov
2022
journals/istr
Differential cryptanalysis of WARP.
Je Sen Teh
Alex Biryukov
2022
conf/fc
Analysis and Probing of Parallel Channels in the Lightning Network.
Alex Biryukov
Gleb Naumenko
Sergei Tikhomirov
2022
conf/ctrsa
Dynamic Universal Accumulator with Batch Update over Bilinear Groups.
Giuseppe Vitto
Alex Biryukov
2022
conf/sacrypt
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN.
Alex Biryukov
Je Sen Teh
Aleksei Udovenko
2021
conf/ctrsa
Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups.
Alex Biryukov
Aleksei Udovenko
Giuseppe Vitto
2021
conf/eurocrypt
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations.
Alex Biryukov
Aleksei Udovenko
2021
conf/sacrypt
Automated Truncation of Differential Trails and Trail Clustering in ARX.
Alex Biryukov
Luan Cardoso dos Santos
Daniel Feher
Vesselin Velichkov
Giuseppe Vitto
2020
journals/tosc
Lightweight AEAD and Hashing using the Sparkle Permutation Family.
Christof Beierle
Alex Biryukov
Luan Cardoso dos Santos
Johann Großschädl
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Qingju Wang
2020
conf/crypto
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
Christof Beierle
Alex Biryukov
Luan Cardoso dos Santos
Johann Großschädl
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Qingju Wang
2019
conf/ccs
Privacy Aspects and Subliminal Channels in Zcash.
Alex Biryukov
Daniel Feher
Giuseppe Vitto
2019
conf/eurosp
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis.
Alex Biryukov
Sergei Tikhomirov
2019
conf/cns
Privacy and Linkability of Mining in Zcash.
Alex Biryukov
Daniel Feher
2018
conf/asiacrypt
Attacks and Countermeasures for White-box Designs.
Alex Biryukov
Aleksei Udovenko
2017
conf/fc
Findel: Secure Derivative Contracts for Ethereum.
Alex Biryukov
Dmitry Khovratovich
Sergei Tikhomirov
2017
conf/acns
Side-Channel Attacks Meet Secure Network Protocols.
Alex Biryukov
Daniel Dinu
Yann Le Corre
2017
conf/asiacrypt
Symmetrically and Asymmetrically Hard Cryptography.
Alex Biryukov
Léo Perrin
2016
journals/tosc
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs.
Alex Biryukov
Dmitry Khovratovich
Léo Perrin
2016
conf/fse
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck.
Alex Biryukov
Vesselin Velichkov
Yann Le Corre
2016
conf/uss
Egalitarian Computing.
Alex Biryukov
Dmitry Khovratovich
2016
conf/crypto
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Léo Perrin
Aleksei Udovenko
Alex Biryukov
2016
conf/acns
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice.
Alex Biryukov
Daniel Dinu
Johann Großschädl
2016
conf/eurosp
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications.
Alex Biryukov
Daniel Dinu
Dmitry Khovratovich
2016
conf/ndss
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem.
Alex Biryukov
Dmitry Khovratovich
2016
conf/eurocrypt
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
Alex Biryukov
Léo Perrin
Aleksei Udovenko
2016
conf/asiacrypt
Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Daniel Dinu
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Johann Großschädl
Alex Biryukov
2015
conf/fse
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE.
Alex Biryukov
Patrick Derbez
Léo Perrin
2015
conf/crypto
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure.
Alex Biryukov
Léo Perrin
2015
conf/fc
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay.
Alex Biryukov
Ivan Pustogarov
2015
conf/sp
Bitcoin over Tor isn't a Good Idea.
Alex Biryukov
Ivan Pustogarov
2015
conf/asiacrypt
Tradeoff Cryptanalysis of Memory-Hard Functions.
Alex Biryukov
Dmitry Khovratovich
2015
conf/sacrypt
Cryptanalysis of Feistel Networks with Secret Round Functions.
Alex Biryukov
Gaëtan Leurent
Léo Perrin
2014
conf/fse
Differential Analysis of Block Ciphers SIMON and SPECK.
Alex Biryukov
Arnab Roy
Vesselin Velichkov
2014
conf/ccs
Deanonymisation of Clients in Bitcoin P2P Network.
Alex Biryukov
Dmitry Khovratovich
Ivan Pustogarov
2014
conf/ctrsa
Automatic Search for Differential Trails in ARX Ciphers.
Alex Biryukov
Vesselin Velichkov
2014
conf/asiacrypt
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract).
Alex Biryukov
Charles Bouillaguet
Dmitry Khovratovich
2014
conf/sacrypt
Colliding Keys for SC2000-256.
Alex Biryukov
Ivica Nikolic
2013
conf/fse
Complementing Feistel Ciphers.
Alex Biryukov
Ivica Nikolic
2013
conf/sp
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
Alex Biryukov
Ivan Pustogarov
Ralf-Philipp Weinmann
2012
conf/esorics
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks.
Alex Biryukov
Ivan Pustogarov
Ralf-Philipp Weinmann
2012
conf/sacrypt
Cryptanalysis of the "Kindle" Cipher.
Alex Biryukov
Gaëtan Leurent
Arnab Roy
2012
conf/sacrypt
Cryptanalysis of the Loiss Stream Cipher.
Alex Biryukov
Aleksandar Kircanski
Amr M. Youssef
2011
conf/fse
Boomerang Attacks on BLAKE-32.
Alex Biryukov
Ivica Nikolic
Arnab Roy
2011
conf/fse
Search for Related-Key Differential Characteristics in DES-Like Ciphers.
Alex Biryukov
Ivica Nikolic
2011
conf/acns
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
Alex Biryukov
Ilya Kizhvatov
Bin Zhang
2011
conf/asiacrypt
Second-Order Differential Collisions for Reduced SHA-256.
Alex Biryukov
Mario Lamberger
Florian Mendel
Ivica Nikolic
2010
journals/joc
Structural Cryptanalysis of SASAS.
Alex Biryukov
Adi Shamir
2010
conf/acns
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G<sup> (+) </sup>.
Alex Biryukov
Deike Priemuth-Schmid
Bin Zhang
2010
conf/eurocrypt
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Alex Biryukov
Ivica Nikolic
2010
conf/eurocrypt
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Alex Biryukov
Orr Dunkelman
Nathan Keller
Dmitry Khovratovich
Adi Shamir
2009
conf/fse
Cryptanalysis of the LAKE Hash Family.
Alex Biryukov
Praveen Gauravaram
Jian Guo
Dmitry Khovratovich
San Ling
Krystian Matusiewicz
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2009
conf/crypto
Distinguisher and Related-Key Attack on the Full AES-256.
Alex Biryukov
Dmitry Khovratovich
Ivica Nikolic
2009
conf/ctrsa
Speeding up Collision Search for Byte-Oriented Hash Functions.
Dmitry Khovratovich
Alex Biryukov
Ivica Nikolic
2009
conf/asiacrypt
Related-Key Cryptanalysis of the Full AES-192 and AES-256.
Alex Biryukov
Dmitry Khovratovich
2008
conf/fse
Collisions for Step-Reduced SHA-256.
Ivica Nikolic
Alex Biryukov
2007
conf/ches
Collision Attacks on AES-Based MAC: Alpha-MAC.
Alex Biryukov
Andrey Bogdanov
Dmitry Khovratovich
Timo Kasper
2007
conf/ches
Two New Techniques of Side-Channel Cryptanalysis.
Alex Biryukov
Dmitry Khovratovich
2007
conf/sacrypt
Two Trivial Attacks on Trivium.
Alexander Maximov
Alex Biryukov
2006
conf/sacrypt
The Design of a Stream Cipher LEX.
Alex Biryukov
2005
journals/compsec
Recent attacks on alleged SecurID and their practical implications.
Alex Biryukov
Joseph Lano
Bart Preneel
2005
journals/joc
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Eli Biham
Alex Biryukov
Adi Shamir
2005
conf/fse
Analysis of the Non-linear Part of Mugi.
Alex Biryukov
Adi Shamir
2005
conf/icics
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
Jongsung Kim
Alex Biryukov
Bart Preneel
Sangjin Lee
2005
conf/sacrypt
Improved Time-Memory Trade-Offs with Multiple Data.
Alex Biryukov
Sourav Mukhopadhyay
Palash Sarkar
2005
conf/sacrypt
Analysis of a SHA-256 Variant.
Hirotaka Yoshida
Alex Biryukov
2004
conf/crypto
On Multiple Linear Approximations.
Alex Biryukov
Christophe De Cannière
Michaël Quisquater
2003
conf/fse
Analysis of Involutional Ciphers: Khazad and Anubis.
Alex Biryukov
2003
conf/fse
Block Ciphers and Systems of Quadratic Equations.
Alex Biryukov
Christophe De Cannière
2003
conf/crypto
Cryptanalysis of SAFER++.
Alex Biryukov
Christophe De Cannière
Gustaf Dellkrantz
2003
conf/eurocrypt
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
Alex Biryukov
Christophe De Cannière
An Braeken
Bart Preneel
2003
conf/asiacrypt
Cryptanalysis of 3-Pass HAVAL.
Bart Van Rompay
Alex Biryukov
Bart Preneel
Joos Vandewalle
2003
conf/sacrypt
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Dai Watanabe
Alex Biryukov
Christophe De Cannière
2003
conf/sacrypt
Cryptanalysis of the Alleged SecurID Hash Function.
Alex Biryukov
Joseph Lano
Bart Preneel
2002
conf/icics
New Weak-Key Classes of IDEA.
Alex Biryukov
Jorge Nakahara Jr.
Bart Preneel
Joos Vandewalle
2001
conf/eurocrypt
Structural Cryptanalysis of SASAS.
Alex Biryukov
Adi Shamir
2000
conf/fse
Real Time Cryptanalysis of A5/1 on a PC.
Alex Biryukov
Adi Shamir
David A. Wagner
2000
conf/eurocrypt
Advanced Slide Attacks.
Alex Biryukov
David A. Wagner
2000
conf/asiacrypt
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
Alex Biryukov
Adi Shamir
1999
conf/fse
Miss in the Middle Attacks on IDEA and Khufu.
Eli Biham
Alex Biryukov
Adi Shamir
1999
conf/fse
Slide Attacks.
Alex Biryukov
David A. Wagner
1999
conf/eurocrypt
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Eli Biham
Alex Biryukov
Adi Shamir
1998
conf/crypto
From Differential Cryptanalysis to Ciphertext-Only Attacks.
Alex Biryukov
Eyal Kushilevitz
1998
conf/eurocrypt
Improved Cryptanalysis of RC5.
Alex Biryukov
Eyal Kushilevitz
1998
conf/sacrypt
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Eli Biham
Alex Biryukov
Orr Dunkelman
Eran Richardson
Adi Shamir
1997
journals/joc
An Improvement of Davies' Attack on DES.
Eli Biham
Alex Biryukov
1994
conf/eurocrypt
An Improvement of Davies' Attack on DES.
Eli Biham
Alex Biryukov
1994
conf/asiacrypt
How to Strengthen DES Using Existing Hardware.
Eli Biham
Alex Biryukov
Coauthors
Adi Shamir
(10)
Aleksandar Kircanski
(1)
Aleksei Udovenko
(12)
Alex Biryukov
(90)
Alexander Maximov
(1)
Amr M. Youssef
(1)
An Braeken
(1)
Andrey Bogdanov
(1)
Arnab Roy
(3)
Baptiste Lambin
(2)
Bart Preneel
(6)
Bart Van Rompay
(1)
Ben Fisch
(1)
Benjamin Wesolowski
(1)
Bin Zhang
(2)
Charles Bouillaguet
(1)
Christof Beierle
(2)
Christophe De Cannière
(5)
Dai Watanabe
(1)
Daniel Dinu
(4)
Daniel Feher
(3)
David A. Wagner
(3)
Deike Priemuth-Schmid
(1)
Dmitry Khovratovich
(16)
Eli Biham
(7)
Eran Richardson
(1)
Eyal Kushilevitz
(2)
Florian Mendel
(1)
Gaëtan Leurent
(3)
Giuseppe Vitto
(4)
Gleb Naumenko
(1)
Gottfried Herold
(1)
Gustaf Dellkrantz
(1)
Hirotaka Yoshida
(1)
Huaxiong Wang
(1)
Ilya Kizhvatov
(1)
Ivan Pustogarov
(5)
Ivica Nikolic
(10)
Je Sen Teh
(3)
Jian Guo
(1)
Johann Großschädl
(4)
Jongsung Kim
(1)
Joos Vandewalle
(2)
Jorge Nakahara Jr.
(1)
Josef Pieprzyk
(1)
Joseph Lano
(2)
Krystian Matusiewicz
(1)
Léo Perrin
(10)
Luan Cardoso dos Santos
(4)
María Naya-Plasencia
(1)
Mario Lamberger
(1)
Michaël Quisquater
(1)
Nathan Keller
(1)
Orr Dunkelman
(2)
Palash Sarkar
(1)
Patrick Derbez
(1)
Praveen Gauravaram
(1)
Qingju Wang
(2)
Ralf-Philipp Weinmann
(2)
San Ling
(1)
Sangjin Lee
(1)
Sergei Tikhomirov
(3)
Sourav Mukhopadhyay
(1)
Timo Kasper
(1)
Vesselin Velichkov
(8)
Yann Le Corre
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to