| 2009 |
| 72 | EE | Dmitry Khovratovich,
Alex Biryukov,
Ivica Nikolic:
Speeding up Collision Search for Byte-Oriented Hash Functions.
CT-RSA 2009: 164-181 |
| 2008 |
| 71 | EE | Ivica Nikolic,
Alex Biryukov:
Collisions for Step-Reduced SHA-256.
FSE 2008: 1-15 |
| 70 | EE | Deike Priemuth-Schmid,
Alex Biryukov:
Slid Pairs in Salsa20 and Trivium.
INDOCRYPT 2008: 1-14 |
| 2007 |
| 69 | | Alex Biryukov:
Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers
Springer 2007 |
| 68 | EE | Alex Biryukov,
Andrey Bogdanov,
Dmitry Khovratovich,
Timo Kasper:
Collision Attacks on AES-Based MAC: Alpha-MAC.
CHES 2007: 166-180 |
| 67 | EE | Alex Biryukov,
Dmitry Khovratovich:
Two New Techniques of Side-Channel Cryptanalysis.
CHES 2007: 195-208 |
| 66 | EE | Alexander Maximov,
Alex Biryukov:
Two Trivial Attacks on Trivium.
Selected Areas in Cryptography 2007: 36-55 |
| 65 | EE | Alex Biryukov:
Block and Stream Ciphers and the Creatures in Between.
Symmetric Cryptography 2007 |
| 2006 |
| 64 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
SCN 2006: 242-256 |
| 63 | EE | Alex Biryukov:
The Design of a Stream Cipher LEX.
Selected Areas in Cryptography 2006: 67-75 |
| 2005 |
| 62 | EE | Alex Biryukov,
Adi Shamir:
Analysis of the Non-linear Part of Mugi.
FSE 2005: 320-329 |
| 61 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
ICICS 2005: 147-158 |
| 60 | EE | Alex Biryukov,
Sourav Mukhopadhyay,
Palash Sarkar:
Improved Time-Memory Trade-Offs with Multiple Data.
Selected Areas in Cryptography 2005: 110-127 |
| 59 | EE | Hirotaka Yoshida,
Alex Biryukov:
Analysis of a SHA-256 Variant.
Selected Areas in Cryptography 2005: 245-260 |
| 58 | EE | Alex Biryukov:
Adaptive Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
| 57 | EE | Alex Biryukov:
Adaptive Chosen Plaintext Attack.
Encyclopedia of Cryptography and Security 2005 |
| 56 | EE | Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
| 55 | EE | Alex Biryukov:
Boomerang Attack.
Encyclopedia of Cryptography and Security 2005 |
| 54 | EE | Alex Biryukov:
Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
| 53 | EE | Alex Biryukov:
Chosen Plaintext Attack.
Encyclopedia of Cryptography and Security 2005 |
| 52 | EE | Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
| 51 | EE | Alex Biryukov:
Ciphertext-Only Attack.
Encyclopedia of Cryptography and Security 2005 |
| 50 | EE | Alex Biryukov:
Codebook Attack.
Encyclopedia of Cryptography and Security 2005 |
| 49 | EE | Alex Biryukov:
DES-X (or DESX).
Encyclopedia of Cryptography and Security 2005 |
| 48 | EE | Alex Biryukov,
Christophe De Cannière:
Data encryption standard (DES).
Encyclopedia of Cryptography and Security 2005 |
| 47 | EE | Alex Biryukov:
Dictionary Attack (I).
Encyclopedia of Cryptography and Security 2005 |
| 46 | EE | Alex Biryukov:
Differential-Linear Attack.
Encyclopedia of Cryptography and Security 2005 |
| 45 | EE | Alex Biryukov:
Feistel Cipher.
Encyclopedia of Cryptography and Security 2005 |
| 44 | EE | Alex Biryukov:
IDEA.
Encyclopedia of Cryptography and Security 2005 |
| 43 | EE | Alex Biryukov:
IPES.
Encyclopedia of Cryptography and Security 2005 |
| 42 | EE | Alex Biryukov:
Impossible Differential Attack.
Encyclopedia of Cryptography and Security 2005 |
| 41 | EE | Alex Biryukov:
Known plaintext attack.
Encyclopedia of Cryptography and Security 2005 |
| 40 | EE | Alex Biryukov,
Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers.
Encyclopedia of Cryptography and Security 2005 |
| 39 | EE | Alex Biryukov:
Meet-in-the-Middle Attack.
Encyclopedia of Cryptography and Security 2005 |
| 38 | EE | Alex Biryukov:
Miss-in-the-Middle Attack.
Encyclopedia of Cryptography and Security 2005 |
| 37 | EE | Alex Biryukov:
Multiple Encryption.
Encyclopedia of Cryptography and Security 2005 |
| 36 | EE | Alex Biryukov:
Multiset Attack.
Encyclopedia of Cryptography and Security 2005 |
| 35 | EE | Alex Biryukov:
Product Cipher, Superencryption.
Encyclopedia of Cryptography and Security 2005 |
| 34 | EE | Alex Biryukov:
Related Key Attack.
Encyclopedia of Cryptography and Security 2005 |
| 33 | EE | Alex Biryukov:
Resynchronization Attack.
Encyclopedia of Cryptography and Security 2005 |
| 32 | EE | Alex Biryukov:
Skipjack.
Encyclopedia of Cryptography and Security 2005 |
| 31 | EE | Alex Biryukov:
Slide Attack.
Encyclopedia of Cryptography and Security 2005 |
| 30 | EE | Alex Biryukov:
Structural Cryptanalysis.
Encyclopedia of Cryptography and Security 2005 |
| 29 | EE | Alex Biryukov:
Substitution-Permutation (SP) Network.
Encyclopedia of Cryptography and Security 2005 |
| 28 | EE | Alex Biryukov:
Truncated Differentials.
Encyclopedia of Cryptography and Security 2005 |
| 27 | EE | Alex Biryukov:
Weak keys.
Encyclopedia of Cryptography and Security 2005 |
| 26 | EE | Alex Biryukov,
Joseph Lano,
Bart Preneel:
Recent attacks on alleged SecurID and their practical implications.
Computers & Security 24(5): 364-370 (2005) |
| 25 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptology 18(4): 291-311 (2005) |
| 2004 |
| 24 | EE | Alex Biryukov:
The Boomerang Attack on 5 and 6-Round Reduced AES.
AES Conference 2004: 11-15 |
| 23 | EE | Alex Biryukov,
Christophe De Cannière,
Michaël Quisquater:
On Multiple Linear Approximations.
CRYPTO 2004: 1-22 |
| 22 | EE | Hirotaka Yoshida,
Alex Biryukov,
Christophe De Cannière,
Joseph Lano,
Bart Preneel:
Non-randomness of the Full 4 and 5-Pass HAVAL.
SCN 2004: 324-336 |
| 2003 |
| 21 | EE | Bart Van Rompay,
Alex Biryukov,
Bart Preneel,
Joos Vandewalle:
Cryptanalysis of 3-Pass HAVAL.
ASIACRYPT 2003: 228-245 |
| 20 | EE | Alex Biryukov,
Christophe De Cannière,
Gustaf Dellkrantz:
Cryptanalysis of SAFER++.
CRYPTO 2003: 195-211 |
| 19 | EE | Alex Biryukov,
Christophe De Cannière,
An Braeken,
Bart Preneel:
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
EUROCRYPT 2003: 33-50 |
| 18 | EE | Alex Biryukov,
Christophe De Cannière:
Block Ciphers and Systems of Quadratic Equations.
FSE 2003: 274-289 |
| 17 | EE | Alex Biryukov:
Analysis of Involutional Ciphers: Khazad and Anubis.
FSE 2003: 45-53 |
| 16 | EE | Alex Biryukov,
Joseph Lano,
Bart Preneel:
Cryptanalysis of the Alleged SecurID Hash Function.
Selected Areas in Cryptography 2003: 130-144 |
| 15 | EE | Dai Watanabe,
Alex Biryukov,
Christophe De Cannière:
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Selected Areas in Cryptography 2003: 222-233 |
| 2002 |
| 14 | EE | Alex Biryukov,
Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle:
New Weak-Key Classes of IDEA.
ICICS 2002: 315-326 |
| 2001 |
| 13 | EE | Alex Biryukov,
Adi Shamir:
Structural Cryptanalysis of SASAS.
EUROCRYPT 2001: 394-405 |
| 2000 |
| 12 | EE | Alex Biryukov,
Adi Shamir:
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
ASIACRYPT 2000: 1-13 |
| 11 | EE | Alex Biryukov,
David Wagner:
Advanced Slide Attacks.
EUROCRYPT 2000: 589-606 |
| 10 | EE | Alex Biryukov,
Adi Shamir,
David Wagner:
Real Time Cryptanalysis of A5/1 on a PC.
FSE 2000: 1-18 |
| 1999 |
| 9 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
EUROCRYPT 1999: 12-23 |
| 8 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Miss in the Middle Attacks on IDEA and Khufu.
FSE 1999: 124-138 |
| 7 | EE | Alex Biryukov,
David Wagner:
Slide Attacks.
FSE 1999: 245-259 |
| 1998 |
| 6 | EE | Alex Biryukov,
Eyal Kushilevitz:
From Differential Cryptoanalysis to Ciphertext-Only Attacks.
CRYPTO 1998: 72-88 |
| 5 | EE | Alex Biryukov,
Eyal Kushilevitz:
Improved Cryptanalysis of RC5.
EUROCRYPT 1998: 85-99 |
| 4 | EE | Eli Biham,
Alex Biryukov,
Orr Dunkelman,
Eran Richardson,
Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Selected Areas in Cryptography 1998: 362-376 |
| 1997 |
| 3 | | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
J. Cryptology 10(3): 195-206 (1997) |
| 1994 |
| 2 | | Eli Biham,
Alex Biryukov:
How to Strengthen DES Using Existing Hardware.
ASIACRYPT 1994: 398-412 |
| 1 | EE | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
EUROCRYPT 1994: 461-467 |