![]() ![]() | BIRYUKOV, A., TEH, J. S., & UDOVENKO, A. (2024). Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. In B. Smith & H. Wu (Eds.), Selected Areas in Cryptography 2022. Springer International Publishing. doi:10.1007/978-3-031-58411-4_16 ![]() |
![]() ![]() | Hieu Nguyen DUY, Ho, U., & BIRYUKOV, A. (2024). Fiat-Shamir in the Wild. In Cyber Security, Cryptology, and Machine Learning - 8th International Symposium, Proceedings. Germany: Springer. ![]() |
![]() ![]() | Hieu Nguyen Duy, Fernández, P. G., UDOVENKO, A., & BIRYUKOV, A. (2024). Accordion mode based on Hash-Encrypt-Hash [Paper presentation]. NIST Workshop on the Requirements for an Accordion Cipher Mode 2024, Rockville, United States. ![]() |
![]() ![]() | BIRYUKOV, A., Fisch, B., Herold, G., KHOVRATOVICH, D., Leurent, G., Naya-Plasencia, M., & Wesolowski, B. (2024). Cryptanalysis of Algebraic Verifiable Delay Functions. In L. Reyzin (Ed.), Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-68382-4_14 ![]() |
![]() ![]() | BIRYUKOV, A., & LOMBARD-PLATET, M. (2023). PURED: A unified framework for resource-hard functions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/58774. |
![]() ![]() | BIRYUKOV, A., LAMBIN, B., & UDOVENKO, A. (09 June 2023). Cryptanalysis of ARX-based White-box Implementations. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (3), 97-135. doi:10.46586/tches.v2023.i3.97-135 ![]() |
![]() ![]() | BIRYUKOV, A., CARDOSO DOS SANTOS, L., TEH, J. S., UDOVENKO, A., & Velichkov, V. (2023). Meet-in-the-Filter and Dynamic Counting with Applications to Speck. In M. Tibouchi & X. Wang (Eds.), Applied Cryptography and Network Security, 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I (pp. 149-177). Springer. doi:10.1007/978-3-031-33488-7_6 ![]() |
![]() ![]() | TEH, J. S., & BIRYUKOV, A. (November 2022). Differential cryptanalysis of WARP. Journal of Information Security and Applications, 70, 103316. doi:10.1016/j.jisa.2022.103316 ![]() |
![]() ![]() | BIRYUKOV, A., Naumenko, G., & TIKHOMIROV, S. (2022). Analysis and Probing of Parallel Channels in the Lightning Network. In inancial Cryptography and Data Security - 26th International Conference, FC 2022. Springer. doi:10.1007/978-3-031-18283-9_16 ![]() |
![]() ![]() | BIRYUKOV, A., CARDOSO DOS SANTOS, L., FEHER, D., Velichkov, V., & VITTO, G. (2022). Automated Truncation of Differential Trails and Trail Clustering in ARX. In Selected Areas in Cryptography - 28th International Conference, Revised Selected Papers. Springer. doi:10.1007/978-3-030-99277-4_14 ![]() |
![]() ![]() | VITTO, G., & BIRYUKOV, A. (2022). Dynamic Universal Accumulator with Batch Update over Bilinear Groups. In Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022. Springer. doi:10.1007/978-3-030-95312-6_17 ![]() ![]() |
![]() ![]() | BIRYUKOV, A., & UDOVENKO, A. (2021). Dummy Shuffling Against Algebraic Attacks in White-Box Implementations. In A. Canteaut & F.-X. Standaert (Eds.), Advances in Cryptology -- EUROCRYPT 2021 (pp. 219--248). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-77886-6_8 ![]() |
![]() ![]() | BIRYUKOV, A., UDOVENKO, A., & VITTO, G. (2021). Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups. In Topics in Cryptology – CT-RSA 2021. doi:10.1007/978-3-030-75539-3_12 ![]() |
![]() ![]() | Beierle, C., BIRYUKOV, A., CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., Perrin, L., Udovenko, A., Velichkov, V., & WANG, Q. (2020). Alzette: A 64-Bit ARX-box (Feat. CRAX and TRAX). In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology -- CRYPTO 2020, 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (pp. 419-448). Springer Verlag. doi:10.1007/978-3-030-56877-1_15 ![]() |
![]() ![]() | BEIERLE, C., BIRYUKOV, A., CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., & WANG, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261 ![]() |
![]() ![]() | BIRYUKOV, A., & FEHER, D. (2020). ReCon: Sybil-Resistant Consensus from Reputation. Pervasive and Mobile Computing. doi:10.1016/j.pmcj.2019.101109 ![]() |
![]() ![]() | BEIERLE, C., BIRYUKOV, A., & UDOVENKO, A. (2019). On degree-d zero-sum sets of full rank. Cryptography and Communications, 1-26. doi:10.1007/s12095-019-00415-0 ![]() |
![]() ![]() | CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., & BIRYUKOV, A. (2019). FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms. In S. Belaïd & T. Güneysu (Eds.), Smart Card Research and Advanced Applications, 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers (pp. 216-233). Springer Verlag. doi:10.1007/978-3-030-42068-0_13 ![]() |
![]() ![]() | BIRYUKOV, A., FEHER, D., & VITTO, G. (2019). Privacy Aspects and Subliminal Channels in Zcash. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Securit. doi:10.1145/3319535.3345663 ![]() |
![]() ![]() | DINU, D.-D., LE CORRE, Y., KHOVRATOVICH, D., PERRIN, L. P., GROSZSCHÄDL, J., & BIRYUKOV, A. (September 2019). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering, 9 (3), 283-302. doi:10.1007/s13389-018-0193-x ![]() |
![]() ![]() | BIRYUKOV, A., & García-Alfaro (Eds.). (2019). Cryptocurrencies and Blockchain Technology. Springer. ![]() |
![]() ![]() | BIRYUKOV, A. (18 May 2019). White-Box and Asymmetrically Hard Crypto Design [Paper presentation]. Whibox, workshop affiliated with Eurocrypt'2019, Darmstadt, Germany. |
![]() ![]() | BIRYUKOV, A., & FEHER, D. (2019). Portrait of a Miner in a Landscape. IEEE INFOCOM 2019 Workshop Proceedings. ![]() |
![]() ![]() | BIRYUKOV, A., & TIKHOMIROV, S. (2019). Security and Privacy of Mobile Wallet Users in Bitcoin, Dash, Monero, and Zcash. Pervasive and Mobile Computing. doi:10.1016/j.pmcj.2019.101030 ![]() |
![]() ![]() | BIRYUKOV, A., & TIKHOMIROV, S. (2019). Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains. IEEE INFOCOM 2019 Workshop Proceedings. ![]() |
![]() ![]() | BIRYUKOV, A., & TIKHOMIROV, S. (2019). Deanonymization and linkability of cryptocurrency transactions based on network analysis. Proceedings of 2019 IEEE European Symposium on Security and Privacy (EuroS&P). doi:10.1109/EuroSP.2019.00022 ![]() |
![]() ![]() | BIRYUKOV, A., & FEHER, D. (2019). Privacy and Linkability of Mining in Zcash. In 2019 IEEE Conference on Communications and Network Security (CNS). IEEE. doi:10.1109/CNS.2019.8802711 ![]() |
![]() ![]() | BEIERLE, C., BIRYUKOV, A., CARDOSO DOS SANTOS, L., GROSZSCHÄDL, J., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., & WANG, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994. |
![]() ![]() | BEIERLE, C., BIRYUKOV, A., & UDOVENKO, A. (2018). On Degree-d Zero-Sum Sets of Full Rank. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40729. |
![]() ![]() | BIRYUKOV, A., & UDOVENKO, A. (2018). Attacks and Countermeasures for White-box Designs. In T. Peyrin & S. Galbraith (Eds.), Advances in Cryptology – ASIACRYPT 2018 (pp. 373-402). Springer International Publishing. doi:10.1007/978-3-030-03329-3 ![]() |
![]() ![]() | BIRYUKOV, A., Khovratovich, D., & TIKHOMIROV, S. (09 May 2018). Privacy-preserving KYC on Ethereum [Paper presentation]. 1st ERCIM Blockchain Workshop 2018, Amsterdam, Netherlands. doi:10.18420/blockchain2018_09 |
![]() ![]() | BIRYUKOV, A., DINU, D.-D., LE CORRE, Y., & UDOVENKO, A. (2018). Optimal First-Order Boolean Masking for Embedded IoT Devices. In CARDIS 2017: Smart Card Research and Advanced Applications (pp. 22-41). Springer, Cham. doi:10.1007/978-3-319-75208-2_2 ![]() |
![]() ![]() | BIRYUKOV, A., FEHER, D., & KHOVRATOVICH, D. (2017). Guru: Universal Reputation Module for Distributed Consensus Protocols. Luxembourg, Luxembourg: University of Luxembourg. https://orbilu.uni.lu/handle/10993/31586 |
![]() ![]() | BIRYUKOV, A., & PERRIN, L. P. (2017). State of the Art in Lightweight Symmetric Cryptography. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/31319. |
![]() ![]() | BIRYUKOV, A., DINU, D.-D., & LE CORRE, Y. (2017). Side-Channel Attacks meet Secure Network Protocols. In D. Gollmann, A. Miyaji, ... H. Kikuchi (Eds.), Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (pp. 435-454). Springer Verlag. doi:10.1007/978-3-319-61204-1_22 ![]() |
![]() ![]() | BIRYUKOV, A., KHOVRATOVICH, D., & TIKHOMIROV, S. (07 April 2017). Findel: Secure Derivative Contracts for Ethereum [Paper presentation]. 1st Workshop on Trusted Smart Contracts (In Association with Financial Cryptography and Data Security 2017), Sliema, Malta. |
![]() ![]() | Shamir, A., BIRYUKOV, A., & PERRIN, L. P. (2017). Summary of an Open Discussion on IoT and Lightweight Cryptography. In Proceedings of Early Symmetric Crypto workshop, 2017. Luxembourg, Luxembourg: University of Luxembourg. ![]() |
![]() ![]() | BIRYUKOV, A., Daemen, J., Lucks, S., & Vaudenay, S. (2017). Topics and Research Directions for Symmetric Cryptography. In Proceedings of Early Symmetric Crypto workshop, 2017 (pp. 4). Luxembourg, Luxembourg: University of Luxembourg. ![]() |
![]() ![]() | BIRYUKOV, A., UDOVENKO, A., & VELICHKOV, V. (2017). Analysis of the NORX Core Permutation. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40730. |
![]() ![]() | DINU, D.-D., PERRIN, L. P., UDOVENKO, A., VELICHKOV, V., GROSZSCHÄDL, J., & BIRYUKOV, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18 ![]() |
![]() ![]() | PERRIN, L. P., UDOVENKO, A., & BIRYUKOV, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In M. Robshaw & J. Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (pp. 93-122). Berlin, Germany: Springer Berlin Heidelberg. doi:10.1007/978-3-662-53008-5_4 ![]() |
![]() ![]() | BIRYUKOV, A., DINU, D.-D., & GROSZSCHÄDL, J. (2016). Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. In M. Manulis, A.-R. Sadeghi, ... S. Schneider (Eds.), Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (pp. 537-557). Springer Verlag. doi:10.1007/978-3-319-39555-5_29 ![]() |
![]() ![]() | BIRYUKOV, A., PERRIN, L. P., & UDOVENKO, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In C. J.-S. Fischlin, Marc (Ed.), Advances in Cryptology – EUROCRYPT 2016 (pp. 372-402). Springer Berlin Heidelberg. doi:10.1007/978-3-662-49890-3_15 ![]() |
![]() ![]() | BIRYUKOV, A., LEURENT, G., & PERRIN, L. P. (2016). Cryptanalysis of Feistel Networks with Secret Round Functions. In O. Dunkelman & L. Keliher (Eds.), Selected Areas in Cryptography -- SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (pp. 102-121). Springer International Publishing. ![]() |
![]() ![]() | BIRYUKOV, A., & KHOVRATOVICH, D. (2016). Equihash: asymmetric proof-of-work based on the Generalized Birthday problem. In Proceedings of NDSS 2016 (pp. 13). ![]() |
![]() ![]() | BIRYUKOV, A., VELICHKOV, V., & LE CORRE, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. In Fast Software Encryption - FSE 2016. ![]() |
![]() ![]() | BIRYUKOV, A., KHOVRATOVICH, D., & PERRIN, L. P. (2016). Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Transactions on Symmetric Cryptology, 2016 (2), 226-247. doi:10.13154/tosc.v2016.i2.226-247 ![]() |
![]() ![]() | BIRYUKOV, A., & KHOVRATOVICH, D. (2016). Egalitarian computing. USENIX Security 2016. ![]() |
![]() ![]() | BIRYUKOV, A., DINU, D.-D., & KHOVRATOVICH, D. (2016). Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. In IEEE European Symposium on Security and Privacy (pp. 292-302). doi:10.1109/EuroSP.2016.31 ![]() |
![]() ![]() | BIRYUKOV, A., & KHOVRATOVICH, D. (2015). Tradeoff Cryptanalysis of Memory-Hard Functions. In 21st International Conference on the Theory and Application of Cryptology and Information Security. Springer. doi:10.1007/978-3-662-48800-3_26 ![]() |
![]() ![]() | BIRYUKOV, A., KHOVRATOVICH, D., DINU, D.-D., & Josefsson, S. (2015). The memory-hard Argon2 password hash function. (Network Working Group / Internet-Draft). IETF. https://orbilu.uni.lu/handle/10993/26817 |
![]() ![]() | BIRYUKOV, A., & PERRIN, L. P. (2015). On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. In R. Gennaro & M. Robshaw (Eds.), Advances in Cryptology -- CRYPTO 2015 (pp. 116-140). Berlin, Germany: Springer-Verlag. doi:10.1007/978-3-662-47989-6 ![]() |
DINU, D.-D., BIRYUKOV, A., GROSZSCHÄDL, J., KHOVRATOVICH, D., LE CORRE, Y., & PERRIN, L. P. (July 2015). FELICS - Fair Evaluation of Lightweight Cryptographic Systems [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland. |
DINU, D.-D., LE CORRE, Y., KHOVRATOVICH, D., PERRIN, L. P., GROSZSCHÄDL, J., & BIRYUKOV, A. (July 2015). Triathlon of Lightweight Block Ciphers for the Internet of Things [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland. |
![]() ![]() | BIRYUKOV, A., DERBEZ, P., & PERRIN, L. P. (2015). Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. In G. Leander (Ed.), Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (pp. 3-27). Berlin, Germany: Springer-Verlag. doi:10.1007/978-3-662-48116-5_1 ![]() |
BIRYUKOV, A., & Vipul, G. (Eds.). (2015). Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India. Springer. doi:10.1007/978-3-319-26617-6 |
![]() ![]() | BIRYUKOV, A., DINU, D.-D., & KHOVRATOVICH, D. (2015). Argon and Argon2. Password Hashing Competition (PHC). https://orbilu.uni.lu/handle/10993/19901 |
![]() ![]() | BIRYUKOV, A., & PUSTOGAROV, I. (2015). Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. In Financial Cryptography and Data Security - 19th International Conference (pp. 10). Springer International Publishing. ![]() |
![]() ![]() | BIRYUKOV, A., Bouillaguet, C., & KHOVRATOVICH, D. (2014). Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. In 20th International Conference on the Theory and Application of Cryptology and Information Security. Springer International Publishing. ![]() |
![]() ![]() | BIRYUKOV, A., & KHOVRATOVICH, D. (2014). PAEQ: Parallelizable Permutation-Based Authenticated Encryption. In 17th Information Security Conference. Springer International Publishing. ![]() |
![]() ![]() | BIRYUKOV, A., KHOVRATOVICH, D., & PUSTOGAROV, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. ![]() |
![]() ![]() | BIRYUKOV, A., & PUSTOGAROV, I. (2014). Bitcoin over Tor isn't a good idea. In 2015 IEEE Symposium on Security and Privacy (pp. 122-134). IEEE Computer Society. ![]() |
![]() ![]() | BIRYUKOV, A., PUSTOGAROV, I., Thill, F., & WEINMANN, R.-P. (2014). Content and popularity analysis of Tor hidden services. In proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society. ![]() |
![]() ![]() | BIRYUKOV, A., Nakahara, J., & Murat Yildirim, H. (15 March 2014). Differential entropy analysis of the IDEA block cipher. Journal of Computational and Applied Mathematics, 259 (Part B), 561–570. doi:10.1016/j.cam.2013.08.002 ![]() |
![]() ![]() | BIRYUKOV, A., & Nikolic, I. (2014). Colliding Keys for SC2000-256. In Selected Areas in Cryptography, Lecture Notes in Computer Science. Springer International Publishing. ![]() |
![]() ![]() | BIRYUKOV, A., & VELICHKOV, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. In Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing. doi:10.1007/978-3-319-04852-9_12 ![]() |
![]() ![]() | BIRYUKOV, A., Roy, A., & VELICHKOV, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing. doi:10.1007/978-3-662-46706-0_28 ![]() |
![]() ![]() | BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In 2013 IEEE Symposium on Security and Privacy (SP). United States: IEEE Computer Society. doi:10.1109/SP.2013.15 ![]() |
![]() ![]() | BIRYUKOV, A., & Nikolic, I. (2013). Security Analysis of the Block Cipher SC2000. Cryptrec. https://orbilu.uni.lu/handle/10993/18748 |
![]() ![]() | BIRYUKOV, A., & Nikolic, I. (2013). Complementing Feistel Ciphers. In Fast Software Encryption, 20th International Workshop, Lecture Notes in Computer Science (pp. 3-8). Springer International Publishing. ![]() |
![]() ![]() | BIRYUKOV, A., & GROSZSCHÄDL, J. (April 2012). Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. Fundamenta Informaticae, 114 (3-4), 221-237. doi:10.3233/FI-2012-626 ![]() |
![]() ![]() | BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2012). TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News, (90), 29-29. ![]() |
![]() ![]() | BIRYUKOV, A., PUSTOGAROV, I., & WEINMANN, R.-P. (2012). TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (pp. 469-486). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., Kircanski, A., & Youssef, A. M. (2012). Cryptanalysis of the Loiss Stream Cipher. In Selected Areas in Cryptography (pp. 119-134). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., LEURENT, G., & ROY, A. (2012). Cryptanalysis of the "Kindle" Cipher. In Selected Areas in Cryptography (pp. 86-103). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., KIZHVATOV, I., & ZHANG, B. (2011). Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. In Applied Cryptography and Network Security - 9th International Conference (pp. 91-109). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., & NIKOLIC, I. (2011). Search for Related-Key Differential Characteristics in DES-Like Ciphers. In Fast Software Encryption - 18th International Workshop (pp. 18-34). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., NIKOLIC, I., & ROY, A. (2011). Boomerang Attacks on BLAKE-32. In Fast Software Encryption - 18th International Workshop (pp. 218-237). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., & De Cannière, C. (2011). Data Encryption Standard (DES). In S. J. Henk C. A. van Tilborg (Ed.), Encyclopedia of Cryptography and Security (pp. 295-301). Springer. |
![]() ![]() | Gong, G., Stinson, D., & BIRYUKOV, A. (Eds.). (2011). Selected Areas in Cryptography 7th International Workshop, SAC 2010, Revised Selected Papers. Berlin, Germany, Unknown/unspecified: Springer. |
![]() ![]() | BIRYUKOV, A., & De Cannière, C. (2011). Linear Cryptanalysis for Block Ciphers. In S. J. Henk C. A. van Tilborg (Ed.), Encyclopedia of Cryptography and Security (pp. 722-725). Springer. |
![]() ![]() | BIRYUKOV, A., Lamberger, M., Mendel, F., & NIKOLIC, I. (2011). Second-Order Differential Collisions for Reduced SHA-256. In 17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 270-287). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., & NIKOLIC, I. (2010). Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. In EUROCRYPT (pp. 322-344). ![]() |
![]() ![]() | BIRYUKOV, A., & Shamir, A. (2010). Structural Cryptanalysis of SASAS. Journal of Cryptology, 23 (4), 505-518. doi:10.1007/s00145-010-9062-1 ![]() |
![]() ![]() | BIRYUKOV, A., Dunkelman, O., Keller, N., KHOVRATOVICH, D., & Shamir, A. (2010). Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. In EUROCRYPT 2010 (pp. 299-319). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., PRIEMUTH-SCHMID, D., & ZHANG, B. (2010). Analysis of SNOW 3G XOR Resynchronization Mechanism. In SECRYPT 2010 (pp. 327-333). ![]() |
![]() ![]() | BIRYUKOV, A., PRIEMUTH-SCHMID, D., & ZHANG, B. (2010). Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+). In ACNS 2010 (pp. 139-153). Springer-Verlag. doi:10.1007/978-3-642-13708-2_9 ![]() |
![]() ![]() | BIRYUKOV, A., KHOVRATOVICH, D., & NIKOLIC, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14 ![]() |
![]() ![]() | BIRYUKOV, A., Gauravaram, P., Guo, J., KHOVRATOVICH, D., Ling, S., Matusiewicz, K., NIKOLIC, I., Pieprzyk, J., & Wang, H. (2009). Cryptanalysis of the LAKE Hash Family. In Fast Software Encryption (pp. 156-179). Springer. doi:10.1007/978-3-642-03317-9_10 ![]() |
![]() ![]() | KHOVRATOVICH, D., BIRYUKOV, A., & NIKOLIC, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11 ![]() |
![]() ![]() | BIRYUKOV, A., & KHOVRATOVICH, D. (2009). Related-Key Cryptanalysis of the Full AES-192 and AES-256. In ASIACRYPT 2009 (pp. 1-18). Springer. ![]() |
NIKOLIC, I., & BIRYUKOV, A. (2008). Collisions for Step-Reduced SHA-256. In Fast Software Encryption - 15th International Workshop, Revised Selected Papers (pp. 1–15). Springer. ![]() |
![]() ![]() | PRIEMUTH-SCHMID, D., & BIRYUKOV, A. (2008). Slid Pairs in Salsa20 and Trivium. In INDOCRYPT (pp. 1–14). Springer. doi:10.1007/978-3-540-89754-5_1 ![]() ![]() |
BIRYUKOV, A. (2008). Design of a New Stream Cipher - LEX. doi:10.1007/978-3-540-68351-3_5 |
![]() ![]() | BIRYUKOV, A., Bogdanov, A., KHOVRATOVICH, D., & Kasper, T. (2007). Collision Attacks on AES-Based MAC: Alpha-MAC. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 166-180). Springer. ![]() |
![]() ![]() | BIRYUKOV, A., & KHOVRATOVICH, D. (2007). Two New Techniques of Side-Channel Cryptanalysis. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 195-208). doi:10.1007/978-3-540-74735-2_14 ![]() |
BIRYUKOV, A. (Ed.). (2007). Fast Software Encryption 14th International Workshop, FSE 2007. Springer. |