Alex Biryukov

Results: 48



#Item
1

Argon2: new generation of memory-hard functions for password hashing and other applications Alex Biryukov Daniel Dinu

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2017-05-17 10:51:31
    2

    Equihash: Asymmetric Proof-of-Work based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich

    Add to Reading List

    Source URL: www.cryptolux.org

    Language: English - Date: 2016-10-31 12:50:31
      3

      Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov and Ivica Nikoli´c? University of Luxembourg {alex.biryukov,ivi

      Add to Reading List

      Source URL: www.cryptolux.org

      Language: English - Date: 2013-09-17 06:26:54
        4Cryptography / Alex Biryukov / Argon2 / International Cryptology Conference / Asiacrypt / Workshop on Cryptographic Hardware and Embedded Systems / IACR / Biryukov / Steinfeld / PKC

        Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing Alex Biryukov; Dmitry Khovratovich

        Add to Reading List

        Source URL: www.math.auckland.ac.nz

        Language: English - Date: 2015-11-30 17:19:13
        5

        Argon2 and Egalitarian Computing Alex Biryukov Dmitry Khovratovich University of Luxembourg

        Add to Reading List

        Source URL: www.cryptolux.org

        Language: English - Date: 2016-01-07 18:25:29
          6

          Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

          Add to Reading List

          Source URL: www.cryptolux.org

          Language: English - Date: 2016-06-09 06:04:52
            7

            Deanonymisation of Clients in Bitcoin P2P Network Alex Biryukov Dmitry Khovratovich Ivan Pustogarov

            Add to Reading List

            Source URL: www.cryptolux.org

            Language: English - Date: 2014-09-17 03:01:51
              8

              Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov and Dmitry Khovratovich University of Luxembourg 29 May 2009

              Add to Reading List

              Source URL: www.cryptolux.org

              Language: English - Date: 2013-09-17 06:26:54
                9Bitcoin / Cryptocurrencies / .onion / Tor / Blockchain / Coinbase / Botnet / Denial-of-service attack / Proxy server / Blockchain.info / Draft:Basics with Bitcoin

                2015 IEEE Symposium on Security and Privacy Bitcoin over Tor isn’t a good idea Alex Biryukov Ivan Pustogarov

                Add to Reading List

                Source URL: www.ieee-security.org

                Language: English - Date: 2015-05-11 16:43:03
                UPDATE