BIRYUKOV, A., Fisch, B., Herold, G., KHOVRATOVICH, D., Leurent, G., Naya-Plasencia, M., & Wesolowski, B. (2024). Cryptanalysis of Algebraic Verifiable Delay Functions. In L. Reyzin (Ed.), Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-68382-4_14 Peer reviewed |
DINU, D.-D., LE CORRE, Y., KHOVRATOVICH, D., PERRIN, L. P., GROSZSCHÄDL, J., & BIRYUKOV, A. (September 2019). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering, 9 (3), 283-302. doi:10.1007/s13389-018-0193-x Peer Reviewed verified by ORBi |
BIRYUKOV, A., FEHER, D., & KHOVRATOVICH, D. (2017). Guru: Universal Reputation Module for Distributed Consensus Protocols. Luxembourg, Luxembourg: University of Luxembourg. https://orbilu.uni.lu/handle/10993/31586 |
BIRYUKOV, A., KHOVRATOVICH, D., & TIKHOMIROV, S. (07 April 2017). Findel: Secure Derivative Contracts for Ethereum [Paper presentation]. 1st Workshop on Trusted Smart Contracts (In Association with Financial Cryptography and Data Security 2017), Sliema, Malta. |
BIRYUKOV, A., & KHOVRATOVICH, D. (2016). Equihash: asymmetric proof-of-work based on the Generalized Birthday problem. In Proceedings of NDSS 2016 (pp. 13). Peer reviewed |
BIRYUKOV, A., KHOVRATOVICH, D., & PERRIN, L. P. (2016). Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Transactions on Symmetric Cryptology, 2016 (2), 226-247. doi:10.13154/tosc.v2016.i2.226-247 Peer Reviewed verified by ORBi |
BIRYUKOV, A., & KHOVRATOVICH, D. (2016). Egalitarian computing. USENIX Security 2016. Peer reviewed |
BIRYUKOV, A., DINU, D.-D., & KHOVRATOVICH, D. (2016). Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. In IEEE European Symposium on Security and Privacy (pp. 292-302). doi:10.1109/EuroSP.2016.31 Peer reviewed |
BIRYUKOV, A., & KHOVRATOVICH, D. (2015). Tradeoff Cryptanalysis of Memory-Hard Functions. In 21st International Conference on the Theory and Application of Cryptology and Information Security. Springer. doi:10.1007/978-3-662-48800-3_26 Peer reviewed |
BIRYUKOV, A., KHOVRATOVICH, D., DINU, D.-D., & Josefsson, S. (2015). The memory-hard Argon2 password hash function. (Network Working Group / Internet-Draft). IETF. https://orbilu.uni.lu/handle/10993/26817 |
DINU, D.-D., LE CORRE, Y., KHOVRATOVICH, D., PERRIN, L. P., GROSZSCHÄDL, J., & BIRYUKOV, A. (July 2015). Triathlon of Lightweight Block Ciphers for the Internet of Things [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland. |
DINU, D.-D., BIRYUKOV, A., GROSZSCHÄDL, J., KHOVRATOVICH, D., LE CORRE, Y., & PERRIN, L. P. (July 2015). FELICS - Fair Evaluation of Lightweight Cryptographic Systems [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland. |
BIRYUKOV, A., DINU, D.-D., & KHOVRATOVICH, D. (2015). Argon and Argon2. Password Hashing Competition (PHC). https://orbilu.uni.lu/handle/10993/19901 |
KHOVRATOVICH, D., Nikolic, I., Pieprzyk, J., Sokolowski, P., & Steinfeld, R. (2015). Rotational Cryptanalysis of ARX Revisited. In Fast Software Encryption - 22nd International Workshop, FSE 2015 Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Springer. doi:10.1007/978-3-662-48116-5_25 Peer reviewed |
BIRYUKOV, A., Bouillaguet, C., & KHOVRATOVICH, D. (2014). Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. In 20th International Conference on the Theory and Application of Cryptology and Information Security. Springer International Publishing. Peer reviewed |
BIRYUKOV, A., & KHOVRATOVICH, D. (2014). PAEQ: Parallelizable Permutation-Based Authenticated Encryption. In 17th Information Security Conference. Springer International Publishing. Peer reviewed |
BIRYUKOV, A., KHOVRATOVICH, D., & PUSTOGAROV, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. Peer reviewed |
PERRIN, L. P., & KHOVRATOVICH, D. (2014). Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. In Fast Software Encryption - 21th International Workshop, FSE 2014, London, March 3-5, 2014 (pp. 82-103). Springer. doi:10.1007/978-3-662-46706-0_5 Peer reviewed |
KHOVRATOVICH, D. (2014). Key Wrapping with a Fixed Permutation. In Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings (pp. 481-499). Peer reviewed |
KHOVRATOVICH, D. (2010). New approaches to the cryptanalysis of symmetric primitives [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/15443 |
BIRYUKOV, A., Dunkelman, O., Keller, N., KHOVRATOVICH, D., & Shamir, A. (2010). Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. In EUROCRYPT 2010 (pp. 299-319). Springer. Peer reviewed |
KHOVRATOVICH, D., & Nikolic, I. (2010). Rotational Cryptanalysis of ARX. In Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea (pp. 333-346). Peer reviewed |
BIRYUKOV, A., KHOVRATOVICH, D., & NIKOLIC, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14 Peer reviewed |
BIRYUKOV, A., Gauravaram, P., Guo, J., KHOVRATOVICH, D., Ling, S., Matusiewicz, K., NIKOLIC, I., Pieprzyk, J., & Wang, H. (2009). Cryptanalysis of the LAKE Hash Family. In Fast Software Encryption (pp. 156-179). Springer. doi:10.1007/978-3-642-03317-9_10 Peer reviewed |
KHOVRATOVICH, D., BIRYUKOV, A., & NIKOLIC, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11 Peer reviewed |
BIRYUKOV, A., & KHOVRATOVICH, D. (2009). Related-Key Cryptanalysis of the Full AES-192 and AES-256. In ASIACRYPT 2009 (pp. 1-18). Springer. Peer reviewed |
BIRYUKOV, A., Bogdanov, A., KHOVRATOVICH, D., & Kasper, T. (2007). Collision Attacks on AES-Based MAC: Alpha-MAC. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 166-180). Springer. Peer reviewed |
BIRYUKOV, A., & KHOVRATOVICH, D. (2007). Two New Techniques of Side-Channel Cryptanalysis. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 195-208). doi:10.1007/978-3-540-74735-2_14 Peer reviewed |