Alex Biryukov

Results: 48



#Item
41IBM 728 / Keystream / Stream cipher / Leninets class submarine

Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF ⋆ Alex Biryukov, Ilya Kizhvatov, and Bin Zhang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-27 22:31:32
42Caro-Kann Defence / Wade Defence / Chess openings / Chess / Sicilian Defence

Cryptanalysis of 3-pass HAVAL? Bart Van Rompay, Alex Biryukov, Bart Preneel?? , and Joos Vandewalle Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {bart.vanr

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
43Peer-to-peer computing / Internet privacy / Computer networking / File sharing networks / Computing / Software / Bitcoin

Deanonymisation of clients in Bitcoin P2P network Alex Biryukov Dmitry Khovratovich Ivan Pustogarov

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-07-08 05:32:33
44Internet / Bitcoin / Tor / .onion / Peer-to-peer / Onion routing / Proxy server / Consensus / Anonymizer / Computing / Internet privacy / Software

arXiv:1410.6079v1 [cs.CR] 22 Oct[removed]Bitcoin over Tor isn’t a good idea Alex Biryukov Ivan Pustogarov

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-10-22 20:36:53
45Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
46Advanced Encryption Standard / Data Encryption Standard / LEX / UES / Py / AES implementations / VEST / ARIA / Q / Cryptography / Stream ciphers / Block ciphers

A New 128-bit Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-13 11:02:24
47Trivium / RC4 / Grain / Phelix / A5/1 / Linear cryptanalysis / MICKEY / E0 / Cipher / Stream ciphers / Cryptography / Keystream

Two Trivial Attacks on Trivium Alexander Maximov and Alex Biryukov Laboratory of Algorithmics, Cryptology and Security

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-01 09:50:27
48Differential cryptanalysis / Boomerang attack / ICE / Khufu and Khafre / Key schedule / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers

Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov and Dmitry Khovratovich

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2009-07-25 16:36:14
UPDATE