关注
Alex Biryukov
Alex Biryukov
Full Professor of Computer Science, University of Luxembourg
在 uni.lu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
E Biham, A Biryukov, A Shamir
Journal of Cryptology 18 (4), 291-311, 2005
906*2005
Real Time Cryptanalysis of A5/1 on a PC
A Biryukov, A Shamir, D Wagner
Fast Software Encryption, 37-44, 2001
8202001
Deanonymisation of clients in Bitcoin P2P network
A Biryukov, D Khovratovich, I Pustogarov
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
8002014
Related-key Cryptanalysis of the Full AES-192 and AES-256
A Biryukov, D Khovratovich
Advances in Cryptology–ASIACRYPT 2009, 1-18, 2009
7082009
Slide attacks
A Biryukov, D Wagner
Fast Software Encryption, 245-259, 1999
5461999
Cryptanalytic time/memory/data tradeoffs for stream ciphers
A Biryukov, A Shamir
Advances in Cryptology—ASIACRYPT 2000, 1-13, 2000
5312000
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)
A Biryukov, D Khovratovich, I Nikolić
Advances in Cryptology-CRYPTO 2009, 231-249, 2009
453*2009
Advanced slide attacks
A Biryukov, D Wagner
Advances in Cryptology—EUROCRYPT 2000, 589-606, 2000
3452000
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
A Biryukov, I Pustogarov, RP Weinmann
IEEE Symposium on Security and Privacy (S&P), 80 - 94, 2013
3162013
Argon2: new generation of memory-hard functions for password hashing and other applications
A Biryukov, D Dinu, D Khovratovich
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 292-302, 2016
305*2016
Bitcoin over Tor isn't a good idea
A Biryukov, I Pustogarov
36th IEEE Symposium on Security and Privacy, 122 - 134, 2015
2962015
Miss in the Middle Attacks on IDEA and Khufu
E Biham, A Biryukov, A Shamir
Fast Software Encryption, 124-138, 1999
2621999
On multiple linear approximations
A Biryukov, C De Canniere, M Quisquater
Advances in Cryptology–CRYPTO 2004, 1-22, 2004
2512004
Structural cryptanalysis of SASAS
A Biryukov, A Shamir
Advances in Cryptology—EUROCRYPT 2001, 395-405, 2001
2362001
A toolbox for cryptanalysis: Linear and affine equivalence algorithms
A Biryukov, C De Canniere, A Braeken, B Preneel
Advances in Cryptology—EUROCRYPT 2003, 33-50, 2003
2282003
Triathlon of Lightweight Block Ciphers for the Internet of Things
D Dinu, Y Le Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering, 1-20, 2018
2272018
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Advances in Cryptology–EUROCRYPT 2010, 299-319, 2010
2142010
Differential analysis of block ciphers SIMON and SPECK
A Biryukov, A Roy, V Velichkov
Fast Software Encryption, 546-570, 2014
2062014
State of the Art in Lightweight Symmetric Cryptography
A Biryukov, LP Perrin
FSTC/SnT, University of Luxembourg, 2017
1982017
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th …, 2014
1972014
系统目前无法执行此操作,请稍后再试。
文章 1–20