Biryukov

Results: 55



#Item
31

Cryptanalysis of 3-pass HAVAL? Bart Van Rompay, Alex Biryukov, Bart Preneel?? , and Joos Vandewalle Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {bart.vanr

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-09-01 21:55:06
    32

    Reference Papers [S1] Biryukov, Shamir, 展agner: Real Time Cryptanalysis of A5/1 on a PC, FSE2000 [S2] Canteaut, Filiol, 鼎iphertext Only Reconstruction of Stream Ciphers based on Combination Generator, FSE2000 [S3] Ch

    Add to Reading List

    Source URL: www.ipa.go.jp

    - Date: 2013-06-19 04:38:45
      33

      Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000

      Add to Reading List

      Source URL: www.ipa.go.jp

      Language: English - Date: 2013-06-19 04:38:45
        34

        arXiv:1405.7418v1 [cs.CR] 28 MayDeanonymisation of clients in Bitcoin P2P network Alex Biryukov Dmitry Khovratovich

        Add to Reading List

        Source URL: cryptome.org

        Language: English - Date: 2014-06-01 08:21:37
          35Computer programming / Mathematics / Hashing / Search algorithms / Error detection and correction / Space–time tradeoff / CPU cache / Dynamic random-access memory / Hash function / Computing / Software optimization / Computer memory

          Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov University of Luxembourg

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-05-06 04:22:19
          36Bitcoin / Peer-to-peer computing / Computer networking / File sharing networks / Peer-to-peer / Node / Cryptographic nonce / Proxy server / Tor / Computing / Software / Internet privacy

          Deanonymisation of Clients in Bitcoin P2P Network Alex Biryukov Dmitry Khovratovich Ivan Pustogarov

          Add to Reading List

          Source URL: orbilu.uni.lu

          Language: English - Date: 2014-11-05 11:20:27
          37Software / Underground culture / Cryptographic software / Tor / .onion / Internet protocols / Port / Botnet / The Hidden Wiki / Internet / Computing / Internet privacy

          Content and popularity analysis of Tor hidden services arXiv:1308.6768v1 [cs.CR] 30 Aug 2013 July 29, 2013 Alex Biryukov

          Add to Reading List

          Source URL: cryptome.org

          Language: English - Date: 2013-09-02 16:59:38
          38ICE / Crypt / Advanced Encryption Standard / Cipher / Paillier cryptosystem / Khufu and Khafre / Cryptography / Chosen-plaintext attack / Ciphertext

          Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

          Add to Reading List

          Source URL: www.schneier.com

          Language: English - Date: 2014-03-02 23:18:30
          39Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

          Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2011-12-30 14:28:01
          UPDATE