2009 |
72 | EE | Dmitry Khovratovich,
Alex Biryukov,
Ivica Nikolic:
Speeding up Collision Search for Byte-Oriented Hash Functions.
CT-RSA 2009: 164-181 |
2008 |
71 | EE | Ivica Nikolic,
Alex Biryukov:
Collisions for Step-Reduced SHA-256.
FSE 2008: 1-15 |
70 | EE | Deike Priemuth-Schmid,
Alex Biryukov:
Slid Pairs in Salsa20 and Trivium.
INDOCRYPT 2008: 1-14 |
2007 |
69 | | Alex Biryukov:
Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers
Springer 2007 |
68 | EE | Alex Biryukov,
Andrey Bogdanov,
Dmitry Khovratovich,
Timo Kasper:
Collision Attacks on AES-Based MAC: Alpha-MAC.
CHES 2007: 166-180 |
67 | EE | Alex Biryukov,
Dmitry Khovratovich:
Two New Techniques of Side-Channel Cryptanalysis.
CHES 2007: 195-208 |
66 | EE | Alexander Maximov,
Alex Biryukov:
Two Trivial Attacks on Trivium.
Selected Areas in Cryptography 2007: 36-55 |
65 | EE | Alex Biryukov:
Block and Stream Ciphers and the Creatures in Between.
Symmetric Cryptography 2007 |
2006 |
64 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
SCN 2006: 242-256 |
63 | EE | Alex Biryukov:
The Design of a Stream Cipher LEX.
Selected Areas in Cryptography 2006: 67-75 |
2005 |
62 | EE | Alex Biryukov,
Adi Shamir:
Analysis of the Non-linear Part of Mugi.
FSE 2005: 320-329 |
61 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
ICICS 2005: 147-158 |
60 | EE | Alex Biryukov,
Sourav Mukhopadhyay,
Palash Sarkar:
Improved Time-Memory Trade-Offs with Multiple Data.
Selected Areas in Cryptography 2005: 110-127 |
59 | EE | Hirotaka Yoshida,
Alex Biryukov:
Analysis of a SHA-256 Variant.
Selected Areas in Cryptography 2005: 245-260 |
58 | EE | Alex Biryukov:
Adaptive Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
57 | EE | Alex Biryukov:
Adaptive Chosen Plaintext Attack.
Encyclopedia of Cryptography and Security 2005 |
56 | EE | Alex Biryukov:
Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
55 | EE | Alex Biryukov:
Boomerang Attack.
Encyclopedia of Cryptography and Security 2005 |
54 | EE | Alex Biryukov:
Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
53 | EE | Alex Biryukov:
Chosen Plaintext Attack.
Encyclopedia of Cryptography and Security 2005 |
52 | EE | Alex Biryukov:
Chosen Plaintext and Chosen Ciphertext Attack.
Encyclopedia of Cryptography and Security 2005 |
51 | EE | Alex Biryukov:
Ciphertext-Only Attack.
Encyclopedia of Cryptography and Security 2005 |
50 | EE | Alex Biryukov:
Codebook Attack.
Encyclopedia of Cryptography and Security 2005 |
49 | EE | Alex Biryukov:
DES-X (or DESX).
Encyclopedia of Cryptography and Security 2005 |
48 | EE | Alex Biryukov,
Christophe De Cannière:
Data encryption standard (DES).
Encyclopedia of Cryptography and Security 2005 |
47 | EE | Alex Biryukov:
Dictionary Attack (I).
Encyclopedia of Cryptography and Security 2005 |
46 | EE | Alex Biryukov:
Differential-Linear Attack.
Encyclopedia of Cryptography and Security 2005 |
45 | EE | Alex Biryukov:
Feistel Cipher.
Encyclopedia of Cryptography and Security 2005 |
44 | EE | Alex Biryukov:
IDEA.
Encyclopedia of Cryptography and Security 2005 |
43 | EE | Alex Biryukov:
IPES.
Encyclopedia of Cryptography and Security 2005 |
42 | EE | Alex Biryukov:
Impossible Differential Attack.
Encyclopedia of Cryptography and Security 2005 |
41 | EE | Alex Biryukov:
Known plaintext attack.
Encyclopedia of Cryptography and Security 2005 |
40 | EE | Alex Biryukov,
Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers.
Encyclopedia of Cryptography and Security 2005 |
39 | EE | Alex Biryukov:
Meet-in-the-Middle Attack.
Encyclopedia of Cryptography and Security 2005 |
38 | EE | Alex Biryukov:
Miss-in-the-Middle Attack.
Encyclopedia of Cryptography and Security 2005 |
37 | EE | Alex Biryukov:
Multiple Encryption.
Encyclopedia of Cryptography and Security 2005 |
36 | EE | Alex Biryukov:
Multiset Attack.
Encyclopedia of Cryptography and Security 2005 |
35 | EE | Alex Biryukov:
Product Cipher, Superencryption.
Encyclopedia of Cryptography and Security 2005 |
34 | EE | Alex Biryukov:
Related Key Attack.
Encyclopedia of Cryptography and Security 2005 |
33 | EE | Alex Biryukov:
Resynchronization Attack.
Encyclopedia of Cryptography and Security 2005 |
32 | EE | Alex Biryukov:
Skipjack.
Encyclopedia of Cryptography and Security 2005 |
31 | EE | Alex Biryukov:
Slide Attack.
Encyclopedia of Cryptography and Security 2005 |
30 | EE | Alex Biryukov:
Structural Cryptanalysis.
Encyclopedia of Cryptography and Security 2005 |
29 | EE | Alex Biryukov:
Substitution-Permutation (SP) Network.
Encyclopedia of Cryptography and Security 2005 |
28 | EE | Alex Biryukov:
Truncated Differentials.
Encyclopedia of Cryptography and Security 2005 |
27 | EE | Alex Biryukov:
Weak keys.
Encyclopedia of Cryptography and Security 2005 |
26 | EE | Alex Biryukov,
Joseph Lano,
Bart Preneel:
Recent attacks on alleged SecurID and their practical implications.
Computers & Security 24(5): 364-370 (2005) |
25 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptology 18(4): 291-311 (2005) |
2004 |
24 | EE | Alex Biryukov:
The Boomerang Attack on 5 and 6-Round Reduced AES.
AES Conference 2004: 11-15 |
23 | EE | Alex Biryukov,
Christophe De Cannière,
Michaël Quisquater:
On Multiple Linear Approximations.
CRYPTO 2004: 1-22 |
22 | EE | Hirotaka Yoshida,
Alex Biryukov,
Christophe De Cannière,
Joseph Lano,
Bart Preneel:
Non-randomness of the Full 4 and 5-Pass HAVAL.
SCN 2004: 324-336 |
2003 |
21 | EE | Bart Van Rompay,
Alex Biryukov,
Bart Preneel,
Joos Vandewalle:
Cryptanalysis of 3-Pass HAVAL.
ASIACRYPT 2003: 228-245 |
20 | EE | Alex Biryukov,
Christophe De Cannière,
Gustaf Dellkrantz:
Cryptanalysis of SAFER++.
CRYPTO 2003: 195-211 |
19 | EE | Alex Biryukov,
Christophe De Cannière,
An Braeken,
Bart Preneel:
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
EUROCRYPT 2003: 33-50 |
18 | EE | Alex Biryukov,
Christophe De Cannière:
Block Ciphers and Systems of Quadratic Equations.
FSE 2003: 274-289 |
17 | EE | Alex Biryukov:
Analysis of Involutional Ciphers: Khazad and Anubis.
FSE 2003: 45-53 |
16 | EE | Alex Biryukov,
Joseph Lano,
Bart Preneel:
Cryptanalysis of the Alleged SecurID Hash Function.
Selected Areas in Cryptography 2003: 130-144 |
15 | EE | Dai Watanabe,
Alex Biryukov,
Christophe De Cannière:
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Selected Areas in Cryptography 2003: 222-233 |
2002 |
14 | EE | Alex Biryukov,
Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle:
New Weak-Key Classes of IDEA.
ICICS 2002: 315-326 |
2001 |
13 | EE | Alex Biryukov,
Adi Shamir:
Structural Cryptanalysis of SASAS.
EUROCRYPT 2001: 394-405 |
2000 |
12 | EE | Alex Biryukov,
Adi Shamir:
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
ASIACRYPT 2000: 1-13 |
11 | EE | Alex Biryukov,
David Wagner:
Advanced Slide Attacks.
EUROCRYPT 2000: 589-606 |
10 | EE | Alex Biryukov,
Adi Shamir,
David Wagner:
Real Time Cryptanalysis of A5/1 on a PC.
FSE 2000: 1-18 |
1999 |
9 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
EUROCRYPT 1999: 12-23 |
8 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Miss in the Middle Attacks on IDEA and Khufu.
FSE 1999: 124-138 |
7 | EE | Alex Biryukov,
David Wagner:
Slide Attacks.
FSE 1999: 245-259 |
1998 |
6 | EE | Alex Biryukov,
Eyal Kushilevitz:
From Differential Cryptoanalysis to Ciphertext-Only Attacks.
CRYPTO 1998: 72-88 |
5 | EE | Alex Biryukov,
Eyal Kushilevitz:
Improved Cryptanalysis of RC5.
EUROCRYPT 1998: 85-99 |
4 | EE | Eli Biham,
Alex Biryukov,
Orr Dunkelman,
Eran Richardson,
Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Selected Areas in Cryptography 1998: 362-376 |
1997 |
3 | | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
J. Cryptology 10(3): 195-206 (1997) |
1994 |
2 | | Eli Biham,
Alex Biryukov:
How to Strengthen DES Using Existing Hardware.
ASIACRYPT 1994: 398-412 |
1 | EE | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
EUROCRYPT 1994: 461-467 |