Alex Biryukov

Results: 48



#Item
1Argon2: new generation of memory-hard functions for password hashing and other applications Alex Biryukov Daniel Dinu

Argon2: new generation of memory-hard functions for password hashing and other applications Alex Biryukov Daniel Dinu

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2017-05-17 10:51:31
    2Equihash: Asymmetric Proof-of-Work based on the Generalized Birthday Problem Alex Biryukov  Dmitry Khovratovich

    Equihash: Asymmetric Proof-of-Work based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich

    Add to Reading List

    Source URL: www.cryptolux.org

    Language: English - Date: 2016-10-31 12:50:31
      3Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov and Ivica Nikoli´c? University of Luxembourg {alex.biryukov,ivi

      Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov and Ivica Nikoli´c? University of Luxembourg {alex.biryukov,ivi

      Add to Reading List

      Source URL: www.cryptolux.org

      Language: English - Date: 2013-09-17 06:26:54
        4Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing  Alex Biryukov; Dmitry Khovratovich

        Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing Alex Biryukov; Dmitry Khovratovich

        Add to Reading List

        Source URL: www.math.auckland.ac.nz

        Language: English - Date: 2015-11-30 17:19:13
        5Argon2 and Egalitarian Computing Alex Biryukov Dmitry Khovratovich  University of Luxembourg

        Argon2 and Egalitarian Computing Alex Biryukov Dmitry Khovratovich University of Luxembourg

        Add to Reading List

        Source URL: www.cryptolux.org

        Language: English - Date: 2016-01-07 18:25:29
          6Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

          Egalitarian computing Alex Biryukov University of Luxembourg Abstract In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include

          Add to Reading List

          Source URL: www.cryptolux.org

          Language: English - Date: 2016-06-09 06:04:52
            7Deanonymisation of Clients in Bitcoin P2P Network Alex Biryukov Dmitry Khovratovich  Ivan Pustogarov

            Deanonymisation of Clients in Bitcoin P2P Network Alex Biryukov Dmitry Khovratovich Ivan Pustogarov

            Add to Reading List

            Source URL: www.cryptolux.org

            Language: English - Date: 2014-09-17 03:01:51
              8Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov and Dmitry Khovratovich University of Luxembourg 29 May 2009

              Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov and Dmitry Khovratovich University of Luxembourg 29 May 2009

              Add to Reading List

              Source URL: www.cryptolux.org

              Language: English - Date: 2013-09-17 06:26:54
                92015 IEEE Symposium on Security and Privacy  Bitcoin over Tor isn’t a good idea Alex Biryukov  Ivan Pustogarov

                2015 IEEE Symposium on Security and Privacy Bitcoin over Tor isn’t a good idea Alex Biryukov Ivan Pustogarov

                Add to Reading List

                Source URL: www.ieee-security.org

                Language: English - Date: 2015-05-11 16:43:03