Profil

BIRYUKOV Alexei

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

Main Referenced Co-authors
KHOVRATOVICH, Dmitry  (22)
UDOVENKO, Aleksei  (15)
PERRIN, Léo Paul  (14)
DINU, Dumitru-Daniel  (10)
GROSZSCHÄDL, Johann  (10)
Main Referenced Keywords
privacy (12); blockchain (11); cryptanalysis (9); ARX (7); AES (6);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX (7)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography (3)
ULHPC - University of Luxembourg: High Performance Computing (2)
Security Reliability and Trust (1)
Security and Trust (1)
Main Referenced Disciplines
Computer science (94)
Finance (1)

Publications (total 94)

The most downloaded
14116 downloads
Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. https://hdl.handle.net/10993/18679

The most cited

355 citations (Scopus®)

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. https://hdl.handle.net/10993/18679

Biryukov, A., Teh, J. S., & Udovenko, A. (2024). Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. In B. Smith & H. Wu (Eds.), Selected Areas in Cryptography 2022. Springer International Publishing. doi:10.1007/978-3-031-58411-4_16
Peer reviewed

BIRYUKOV, A., & LOMBARD-PLATET, M. (2023). PURED: A unified framework for resource-hard functions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/58774.

Biryukov, A., Lambin, B., & Udovenko, A. (09 June 2023). Cryptanalysis of ARX-based White-box Implementations. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (3), 97-135. doi:10.46586/tches.v2023.i3.97-135
Peer reviewed

Biryukov, A., Cardoso Dos Santos, L., Teh, J. S., Udovenko, A., & Velichkov, V. (2023). Meet-in-the-Filter and Dynamic Counting with Applications to Speck. In M. Tibouchi & X. Wang (Eds.), Applied Cryptography and Network Security, 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I (pp. 149-177). Springer. doi:10.1007/978-3-031-33488-7_6
Peer reviewed

TEH, J. S., & BIRYUKOV, A. (November 2022). Differential cryptanalysis of WARP. Journal of Information Security and Applications, 70, 103316. doi:10.1016/j.jisa.2022.103316
Peer Reviewed verified by ORBi

Biryukov, A., Naumenko, G., & Tikhomirov, S. (2022). Analysis and Probing of Parallel Channels in the Lightning Network. In inancial Cryptography and Data Security - 26th International Conference, FC 2022. Springer. doi:10.1007/978-3-031-18283-9_16
Peer reviewed

Vitto, G., & Biryukov, A. (2022). Dynamic Universal Accumulator with Batch Update over Bilinear Groups. In Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022. Springer. doi:10.1007/978-3-030-95312-6_17
Peer reviewed

Biryukov, A., Cardoso Dos Santos, L., Feher, D., Velichkov, V., & Vitto, G. (2022). Automated Truncation of Differential Trails and Trail Clustering in ARX. In Selected Areas in Cryptography - 28th International Conference, Revised Selected Papers. Springer. doi:10.1007/978-3-030-99277-4_14
Peer reviewed

Biryukov, A., & Udovenko, A. (2021). Dummy Shuffling Against Algebraic Attacks in White-Box Implementations. In A. Canteaut & F.-X. Standaert (Eds.), Advances in Cryptology -- EUROCRYPT 2021 (pp. 219--248). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-77886-6_8
Peer reviewed

Biryukov, A., Udovenko, A., & Vitto, G. (2021). Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups. In Topics in Cryptology – CT-RSA 2021. doi:10.1007/978-3-030-75539-3_12
Peer reviewed

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L., Udovenko, A., Velichkov, V., & Wang, Q. (2020). Alzette: A 64-Bit ARX-box (Feat. CRAX and TRAX). In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology -- CRYPTO 2020, 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (pp. 419-448). Springer Verlag. doi:10.1007/978-3-030-56877-1_15
Peer reviewed

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261
Peer Reviewed verified by ORBi

Biryukov, A., & Feher, D. (2020). ReCon: Sybil-Resistant Consensus from Reputation. Pervasive and Mobile Computing. doi:10.1016/j.pmcj.2019.101109
Peer reviewed

Beierle, C., Biryukov, A., & Udovenko, A. (2019). On degree-d zero-sum sets of full rank. Cryptography and Communications, 1-26. doi:10.1007/s12095-019-00415-0
Peer Reviewed verified by ORBi

Cardoso Dos Santos, L., Groszschädl, J., & Biryukov, A. (2019). FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms. In S. Belaïd & T. Güneysu (Eds.), Smart Card Research and Advanced Applications, 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers (pp. 216-233). Springer Verlag. doi:10.1007/978-3-030-42068-0_13
Peer reviewed

Biryukov, A., Feher, D., & Vitto, G. (2019). Privacy Aspects and Subliminal Channels in Zcash. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Securit. doi:10.1145/3319535.3345663
Peer reviewed

Biryukov, A., & García-Alfaro (Eds.). (2019). Cryptocurrencies and Blockchain Technology. Springer.
Peer reviewed

Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (September 2019). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering, 9 (3), 283-302. doi:10.1007/s13389-018-0193-x
Peer Reviewed verified by ORBi

Biryukov, A. (18 May 2019). White-Box and Asymmetrically Hard Crypto Design [Paper presentation]. Whibox, workshop affiliated with Eurocrypt'2019, Darmstadt, Germany.

Biryukov, A., & Tikhomirov, S. (2019). Security and Privacy of Mobile Wallet Users in Bitcoin, Dash, Monero, and Zcash. Pervasive and Mobile Computing. doi:10.1016/j.pmcj.2019.101030
Peer reviewed

Biryukov, A., & Tikhomirov, S. (2019). Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains. IEEE INFOCOM 2019 Workshop Proceedings.
Peer reviewed

Biryukov, A., & Feher, D. (2019). Portrait of a Miner in a Landscape. IEEE INFOCOM 2019 Workshop Proceedings.
Peer reviewed

Biryukov, A., & Tikhomirov, S. (2019). Deanonymization and linkability of cryptocurrency transactions based on network analysis. Proceedings of 2019 IEEE European Symposium on Security and Privacy (EuroS&P). doi:10.1109/EuroSP.2019.00022
Peer reviewed

Biryukov, A., & Feher, D. (2019). Privacy and Linkability of Mining in Zcash. In 2019 IEEE Conference on Communications and Network Security (CNS). IEEE. doi:10.1109/CNS.2019.8802711
Peer reviewed

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994.

Beierle, C., Biryukov, A., & Udovenko, A. (2018). On Degree-d Zero-Sum Sets of Full Rank. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40729.

Biryukov, A., & Udovenko, A. (2018). Attacks and Countermeasures for White-box Designs. In T. Peyrin & S. Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing. doi:10.1007/978-3-030-03329-3
Peer reviewed

Biryukov, A., Khovratovich, D., & Tikhomirov, S. (09 May 2018). Privacy-preserving KYC on Ethereum [Paper presentation]. 1st ERCIM Blockchain Workshop 2018, Amsterdam, Netherlands. doi:10.18420/blockchain2018_09

Biryukov, A., Dinu, D.-D., Le Corre, Y., & Udovenko, A. (2018). Optimal First-Order Boolean Masking for Embedded IoT Devices. In CARDIS 2017: Smart Card Research and Advanced Applications (pp. 22-41). Springer, Cham. doi:10.1007/978-3-319-75208-2_2
Peer reviewed

Biryukov, A., Feher, D., & Khovratovich, D. (2017). Guru: Universal Reputation Module for Distributed Consensus Protocols. Luxembourg, Luxembourg: University of Luxembourg.

Biryukov, A., Dinu, D.-D., & Le Corre, Y. (2017). Side-Channel Attacks meet Secure Network Protocols. In D. Gollmann, A. Miyaji, ... H. Kikuchi (Eds.), Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (pp. 435-454). Springer Verlag. doi:10.1007/978-3-319-61204-1_22
Peer reviewed

Biryukov, A., & Perrin, L. P. (2017). State of the Art in Lightweight Symmetric Cryptography. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/31319.

Biryukov, A., Khovratovich, D., & Tikhomirov, S. (07 April 2017). Findel: Secure Derivative Contracts for Ethereum [Paper presentation]. 1st Workshop on Trusted Smart Contracts (In Association with Financial Cryptography and Data Security 2017), Sliema, Malta.

Shamir, A., Biryukov, A., & Perrin, L. P. (2017). Summary of an Open Discussion on IoT and Lightweight Cryptography. In Proceedings of Early Symmetric Crypto workshop, 2017. Luxembourg, Luxembourg: University of Luxembourg.
Peer reviewed

Biryukov, A., Daemen, J., Lucks, S., & Vaudenay, S. (2017). Topics and Research Directions for Symmetric Cryptography. In Proceedings of Early Symmetric Crypto workshop, 2017 (pp. 4). Luxembourg, Luxembourg: University of Luxembourg.
Peer reviewed

Biryukov, A., Udovenko, A., & Velichkov, V. (2017). Analysis of the NORX Core Permutation. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40730.

Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18
Peer reviewed

Perrin, L. P., Udovenko, A., & Biryukov, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (pp. 93-122). Berlin, Germany: Springer Berlin Heidelberg. doi:10.1007/978-3-662-53008-5_4
Peer reviewed

Biryukov, A., Dinu, D.-D., & Groszschädl, J. (2016). Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. In M. Manulis, A.-R. Sadeghi, ... S. Schneider (Eds.), Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (pp. 537-557). Springer Verlag. doi:10.1007/978-3-319-39555-5_29
Peer reviewed

Biryukov, A., Perrin, L. P., & Udovenko, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In C. J.-S. Fischlin, Marc (Ed.), Advances in Cryptology – EUROCRYPT 2016 (pp. 372-402). Springer Berlin Heidelberg. doi:10.1007/978-3-662-49890-3_15
Peer reviewed

Biryukov, A., Leurent, G., & Perrin, L. P. (2016). Cryptanalysis of Feistel Networks with Secret Round Functions. In O. Dunkelman & L. Keliher (Eds.), Selected Areas in Cryptography -- SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (pp. 102-121). Springer International Publishing.
Peer reviewed

Biryukov, A., & Khovratovich, D. (2016). Equihash: asymmetric proof-of-work based on the Generalized Birthday problem. In Proceedings of NDSS 2016 (pp. 13).
Peer reviewed

Biryukov, A., & Khovratovich, D. (2016). Egalitarian computing. USENIX Security 2016.
Peer reviewed

Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2016). Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. In IEEE European Symposium on Security and Privacy (pp. 292-302). doi:10.1109/EuroSP.2016.31
Peer reviewed

Biryukov, A., Khovratovich, D., & Perrin, L. P. (2016). Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Transactions on Symmetric Cryptology, 2016 (2), 226-247. doi:10.13154/tosc.v2016.i2.226-247
Peer Reviewed verified by ORBi

Biryukov, A., Velichkov, V., & Le Corre, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. In Fast Software Encryption - FSE 2016.
Peer reviewed

Biryukov, A., & Khovratovich, D. (2015). Tradeoff Cryptanalysis of Memory-Hard Functions. In 21st International Conference on the Theory and Application of Cryptology and Information Security. Springer. doi:10.1007/978-3-662-48800-3_26
Peer reviewed

Biryukov, A., Khovratovich, D., Dinu, D.-D., & Josefsson, S. (2015). The memory-hard Argon2 password hash function. (Network Working Group / Internet-Draft). IETF.

Biryukov, A., & Perrin, L. P. (2015). On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. In R. Gennaro & M. Robshaw (Eds.), Advances in Cryptology -- CRYPTO 2015 (pp. 116-140). Berlin, Germany: Springer-Verlag. doi:10.1007/978-3-662-47989-6
Peer reviewed

Dinu, D.-D., Biryukov, A., Groszschädl, J., Khovratovich, D., Le Corre, Y., & Perrin, L. P. (July 2015). FELICS - Fair Evaluation of Lightweight Cryptographic Systems [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland.

Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (July 2015). Triathlon of Lightweight Block Ciphers for the Internet of Things [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland.

Biryukov, A., Derbez, P., & Perrin, L. P. (2015). Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. In G. Leander (Ed.), Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (pp. 3-27). Berlin, Germany: Springer-Verlag. doi:10.1007/978-3-662-48116-5_1
Peer reviewed

Biryukov, A., & Pustogarov, I. (2015). Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. In Financial Cryptography and Data Security - 19th International Conference (pp. 10). Springer International Publishing.
Peer reviewed

Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2015). Argon and Argon2. Password Hashing Competition (PHC).

Biryukov, A., & Vipul, G. (Eds.). (2015). Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India. Springer. doi:10.1007/978-3-319-26617-6

Biryukov, A., Bouillaguet, C., & Khovratovich, D. (2014). Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. In 20th International Conference on the Theory and Application of Cryptology and Information Security. Springer International Publishing.
Peer reviewed

Biryukov, A., & Khovratovich, D. (2014). PAEQ: Parallelizable Permutation-Based Authenticated Encryption. In 17th Information Security Conference. Springer International Publishing.
Peer reviewed

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM.
Peer reviewed

Biryukov, A., & Pustogarov, I. (2014). Bitcoin over Tor isn't a good idea. In 2015 IEEE Symposium on Security and Privacy (pp. 122-134). IEEE Computer Society.
Peer reviewed

Biryukov, A., Pustogarov, I., Thill, F., & Weinmann, R.-P. (2014). Content and popularity analysis of Tor hidden services. In proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society.
Peer reviewed

Biryukov, A., Nakahara, J., & Murat Yildirim, H. (15 March 2014). Differential entropy analysis of the IDEA block cipher. Journal of Computational and Applied Mathematics, 259 (Part B), 561–570. doi:10.1016/j.cam.2013.08.002
Peer reviewed

Biryukov, A., & Nikolic, I. (2014). Colliding Keys for SC2000-256. In Selected Areas in Cryptography, Lecture Notes in Computer Science. Springer International Publishing.
Peer reviewed

Biryukov, A., & Velichkov, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12
Peer reviewed

Biryukov, A., Roy, A., & Velichkov, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28
Peer reviewed

Biryukov, A., Pustogarov, I., & Weinmann, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In 2013 IEEE Symposium on Security and Privacy (SP). United States: IEEE Computer Society. doi:10.1109/SP.2013.15
Peer reviewed

Biryukov, A., & Nikolic, I. (2013). Complementing Feistel Ciphers. In Fast Software Encryption, 20th International Workshop, Lecture Notes in Computer Science (pp. 3-8). Springer International Publishing.
Peer reviewed

Biryukov, A., & Nikolic, I. (2013). Security Analysis of the Block Cipher SC2000. Cryptrec.

Biryukov, A., & Groszschädl, J. (April 2012). Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. Fundamenta Informaticae, 114 (3-4), 221-237. doi:10.3233/FI-2012-626
Peer Reviewed verified by ORBi

Biryukov, A., Kircanski, A., & Youssef, A. M. (2012). Cryptanalysis of the Loiss Stream Cipher. In Selected Areas in Cryptography (pp. 119-134). Springer.
Peer reviewed

Biryukov, A., Pustogarov, I., & Weinmann, R.-P. (2012). TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (pp. 469-486). Springer.
Peer reviewed

Biryukov, A., Pustogarov, I., & Weinmann, R.-P. (2012). TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News, (90), 29-29.
Peer reviewed

Biryukov, A., Leurent, G., & Roy, A. (2012). Cryptanalysis of the "Kindle" Cipher. In Selected Areas in Cryptography (pp. 86-103). Springer.
Peer reviewed

Biryukov, A., Kizhvatov, I., & Zhang, B. (2011). Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. In Applied Cryptography and Network Security - 9th International Conference (pp. 91-109). Springer.
Peer reviewed

Biryukov, A., & Nikolic, I. (2011). Search for Related-Key Differential Characteristics in DES-Like Ciphers. In Fast Software Encryption - 18th International Workshop (pp. 18-34). Springer.
Peer reviewed

Biryukov, A., & De Cannière, C. (2011). Data Encryption Standard (DES). In S. J. Henk C. A. van Tilborg (Ed.), Encyclopedia of Cryptography and Security (pp. 295-301). Springer.

Gong, G., Stinson, D., & Biryukov, A. (Eds.). (2011). Selected Areas in Cryptography 7th International Workshop, SAC 2010, Revised Selected Papers. Berlin, Germany, Unknown/unspecified: Springer.

Biryukov, A., & De Cannière, C. (2011). Linear Cryptanalysis for Block Ciphers. In S. J. Henk C. A. van Tilborg (Ed.), Encyclopedia of Cryptography and Security (pp. 722-725). Springer.

Biryukov, A., Nikolic, I., & Roy, A. (2011). Boomerang Attacks on BLAKE-32. In Fast Software Encryption - 18th International Workshop (pp. 218-237). Springer.
Peer reviewed

Biryukov, A., Lamberger, M., Mendel, F., & Nikolic, I. (2011). Second-Order Differential Collisions for Reduced SHA-256. In 17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 270-287). Springer.
Peer reviewed

Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., & Shamir, A. (2010). Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. In EUROCRYPT 2010 (pp. 299-319). Springer.
Peer reviewed

Biryukov, A., & Shamir, A. (2010). Structural Cryptanalysis of SASAS. Journal of Cryptology, 23 (4), 505-518. doi:10.1007/s00145-010-9062-1
Peer reviewed

Biryukov, A., Priemuth-Schmid, D., & Zhang, B. (2010). Analysis of SNOW 3G XOR Resynchronization Mechanism. In SECRYPT 2010 (pp. 327-333).
Peer reviewed

Biryukov, A., Priemuth-Schmid, D., & Zhang, B. (2010). Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+). In ACNS 2010 (pp. 139-153). Springer-Verlag. doi:10.1007/978-3-642-13708-2_9
Peer reviewed

Biryukov, A., & Nikolic, I. (2010). Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. In EUROCRYPT (pp. 322-344).
Peer reviewed

Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., Nikolic, I., Pieprzyk, J., & Wang, H. (2009). Cryptanalysis of the LAKE Hash Family. In Fast Software Encryption (pp. 156-179). Springer. doi:10.1007/978-3-642-03317-9_10
Peer reviewed

Khovratovich, D., Biryukov, A., & Nikolic, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11
Peer reviewed

Biryukov, A., & Khovratovich, D. (2009). Related-Key Cryptanalysis of the Full AES-192 and AES-256. In ASIACRYPT 2009 (pp. 1-18). Springer.
Peer reviewed

Biryukov, A., Khovratovich, D., & Nikolic, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14
Peer reviewed

Priemuth-Schmid, D., & Biryukov, A. (2008). Slid Pairs in Salsa20 and Trivium. In INDOCRYPT (pp. 1–14). Springer. doi:10.1007/978-3-540-89754-5_1
Peer reviewed

Biryukov, A. (2008). Design of a New Stream Cipher - LEX. doi:10.1007/978-3-540-68351-3_5

Nikolic, I., & Biryukov, A. (2008). Collisions for Step-Reduced SHA-256. In Fast Software Encryption - 15th International Workshop, Revised Selected Papers (pp. 1–15). Springer.
Peer reviewed

Biryukov, A. (Ed.). (2007). Fast Software Encryption 14th International Workshop, FSE 2007. Springer.

Biryukov, A., Bogdanov, A., Khovratovich, D., & Kasper, T. (2007). Collision Attacks on AES-Based MAC: Alpha-MAC. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 166-180). Springer.
Peer reviewed

Biryukov, A., & Khovratovich, D. (2007). Two New Techniques of Side-Channel Cryptanalysis. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 195-208). doi:10.1007/978-3-540-74735-2_14
Peer reviewed

Contact ORBilu