Alex Biryukov

Results: 48



#Item
11

Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) Alex Biryukov, Dmitry Khovratovich, Ivica Nikoli´c University of Luxembourg {alex.biryukov, dmitry.khovratovich, }

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2013-09-17 06:26:54
    12

    On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure Alex Biryukov and Léo Perrin , University of Luxembourg, SnT

    Add to Reading List

    Source URL: www.cryptolux.org

    Language: English - Date: 2015-10-09 09:44:22
      13

      Design of a New Stream Cipher—LEX Alex Biryukov University of Luxembourg, FSTC, 6, rue Richard Coudenhove-Kalergi, L-1359 Luxembourg-Kirchberg Luxembourg

      Add to Reading List

      Source URL: www.cryptolux.org

      Language: English - Date: 2013-12-18 06:44:27
        14Cryptography / Argon2 / Lyra2 / BLAKE / Password Hashing Competition / Key derivation function / Hash function / Cryptographic hash function / Cryptographic nonce / Password / Salt / Scrypt

        Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2015-07-22 02:06:59
        15Computational complexity theory / Theory of computation / Complexity classes / Analysis of algorithms / Finite fields / NP / Spacetime tradeoff / Algorithm / Time complexity / IP / P / XTR

        Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich

        Add to Reading List

        Source URL: www.internetsociety.org

        Language: English - Date: 2016-02-22 10:06:03
        16

        Examples of differential multicollisions for 13 and 14 rounds of AES-256 Alex Biryukov, Dmitry Khovratovich, Ivica Nikoli´c University of Luxembourg {alex.biryukov, dmitry.khovratovich, }

        Add to Reading List

        Source URL: www.cryptolux.org

        Language: English - Date: 2013-09-17 06:26:54
          17

          Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF ⋆ Alex Biryukov, Ilya Kizhvatov, and Bin Zhang

          Add to Reading List

          Source URL: www.cryptolux.org

          Language: English - Date: 2013-09-17 06:26:54
            18

            Collisions for Step-Reduced SHA-256 Ivica Nikoli´c and Alex Biryukov University of Luxembourg {ivica.nikolic,alex.biryukov}@uni.lu Abstract. In this article we find collisions for step-reduced SHA-256.

            Add to Reading List

            Source URL: www.cryptolux.org

            Language: English
              19

              Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay Alex Biryukov and Ivan Pustogarov University of Luxembourg, {alex.biryukov,ivan.pustogarov}@uni.lu

              Add to Reading List

              Source URL: www.cryptolux.org

              Language: English - Date: 2015-05-22 04:13:11
                20

                Search for Related-key Differential Characteristics in DES-like ciphers Alex Biryukov and Ivica Nikoli´c? University of Luxembourg {alex.biryukov,ivica.nikolic}uni.lu

                Add to Reading List

                Source URL: www.cryptolux.org

                Language: English - Date: 2013-09-17 06:26:54
                  UPDATE