Alex Biryukov
Alex Biryukov
Full Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
E Biham, A Biryukov, A Shamir
Advances in Cryptology—Eurocrypt’99, 12-23, 1999
6901999
Real Time Cryptanalysis of A5/1 on a PC
A Biryukov, A Shamir, D Wagner
Fast Software Encryption, 37-44, 2001
6282001
Related-key Cryptanalysis of the Full AES-192 and AES-256
A Biryukov, D Khovratovich
Advances in Cryptology–ASIACRYPT 2009, 1-18, 2009
4792009
Slide attacks
A Biryukov, D Wagner
Fast Software Encryption, 245-259, 1999
4451999
Cryptanalytic time/memory/data tradeoffs for stream ciphers
A Biryukov, A Shamir
Advances in Cryptology—ASIACRYPT 2000, 1-13, 2000
4252000
Distinguisher and related-key attack on the full AES-256
A Biryukov, D Khovratovich, I Nikolić
Advances in Cryptology-CRYPTO 2009, 231-249, 2009
3552009
Deanonymisation of clients in Bitcoin P2P network
A Biryukov, D Khovratovich, I Pustogarov
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3022014
Advanced slide attacks
A Biryukov, D Wagner
Advances in Cryptology—EUROCRYPT 2000, 589-606, 2000
2892000
Miss in the Middle Attacks on IDEA and Khufu
E Biham, A Biryukov, A Shamir
Fast Software Encryption, 124-138, 1999
2151999
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Advances in Cryptology–EUROCRYPT 2010, 299-319, 2010
2132010
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
A Biryukov, I Pustogarov, RP Weinmann
IEEE Symposium on Security and Privacy (S&P), 80 - 94, 2013
1932013
On multiple linear approximations
A Biryukov, C De Canniere, M Quisquater
Advances in Cryptology–CRYPTO 2004, 1-22, 2004
1902004
Structural cryptanalysis of SASAS
A Biryukov, A Shamir
Advances in Cryptology—EUROCRYPT 2001, 395-405, 2001
1902001
A toolbox for cryptanalysis: Linear and affine equivalence algorithms
A Biryukov, C De Canniere, A Braeken, B Preneel
Advances in Cryptology—EUROCRYPT 2003, 33-50, 2003
1752003
Bitcoin over Tor isn't a good idea
A Biryukov, I Pustogarov
36th IEEE Symposium on Security and Privacy, 122 - 134, 2015
1342015
Improved cryptanalysis of RC5
A Biryukov, E Kushilevitz
Advances in Cryptology—EUROCRYPT'98, 85-99, 1998
1301998
Differential analysis of block ciphers SIMON and SPECK
A Biryukov, A Roy, V Velichkov
Fast Software Encryption, 546-570, 2014
1212014
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
J Kim, A Biryukov, B Preneel, S Hong
Security and Cryptography for Networks, 242-256, 2006
1202006
Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, camellia, khazad and others
A Biryukov, I Nikolić
Advances in Cryptology–EUROCRYPT 2010, 322-344, 2010
1192010
Two trivial attacks on TRIVIUM
A Maximov, A Biryukov
Selected Areas in Cryptography, 36-55, 2007
1192007
The system can't perform the operation now. Try again later.
Articles 1–20