Alex Biryukov

Alex Biryukov

Assistant professeur en Informatique
Responsable de l'UR LACS

Discipline(s) Archaeology / Art & art history / History / Finance / Macroeconomics & monetary economics / Microeconomics / Architecture / Computer science / Electrical & electronics engineering / Aquatic sciences & oceanology / Zoology / Mathematics / Space science, astronomy & astrophysics / Anthropology
Sujets de recherche Cryptography, Cryptanalysis, Information Security
Faculté ou Centre Faculté des Sciences, de la Technologie et de la Communication
Unité de recherche CSC
Adresse postale Campus Kirchberg, Université du Luxembourg
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg
Bureau sur le campus E 207
Email
Téléphone (+352) 46 66 44 6793
Fax (+352) 46 66 44 5500
Réseaux sociaux & blogs
Video Prof. Alex Biryukov (SnT)
Prof. Alex Biryukov (SnT)
Langues parlées English, French
Séjours de recherche en Belgium, Luxembourg, US, Israel
À l'Université depuis 2007
 
Alex Biryukov - Associate professor in computer science and Responsible of RU LACS

Alex Biryukov is an Associate-professor. He teaches "Computer Networks" and "Cryptology". Formerly he was a visiting professor at K.U.Leuven (ESAT, COSIC group), working with Prof. Bart Preneel and participating in the development of European standards for Signature, Integrity and Encryption Schemes (NESSIE project). He has received his M.Sc. and Ph.D. from the Technion - Israel Institute of Technology in 1994 and 1999 respectively working with Prof. Eli Biham, Prof. Shimon Even and Prof. Eyal Kushilevitz. He has been a post-doc at the Computer Science faculty of Weizmann Institute of Science (Rehovot, Israel), working with Prof. Adi Shamir. He has taught graduate courses on "Methods of Cryptanalysis" and "Advanced Symmetric Cryptography" at Weizmann Institute and K.U.Leuven. Alex Biryukov is actively involved in cryptographic research, often gives talks at the international conferences and workshops, consults in applied cryptography. He has authored and co-authored more than 40 papers in international journals and conferences and was invited to contribute 30 articles for the Encyclopedia of Cryptography and Security (Springer). He has served on program committees of more than 15 international conferences and workshops, including the top conferences in the field of cryptography such as EUROCRYPT, CRYPTO, ASIACRYPT (with acceptance rates below 1/5). He is a member of the International Association for Cryptologic Research (IACR) since 1994. His expertise includes all aspects of analysis and design of secure cryptographic primitives and protocols. Interests include all aspects of information security, knowledge management, data-mining, computer-intelligence and algorithms in general.

Last updated on: jeudi, 07 juin 2012

powered by
orbilu.uni.lu

2014

Full Text
See detailCryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Biryukov, Alex; Bouillaguet, Charles; Khovratovich, Dmitry

in 20th International Conference on the Theory and Application of Cryptology and Information Security (2014, December)

Full Text
See detailPAEQ: Parallelizable Permutation-Based Authenticated Encryption
Biryukov, Alex; Khovratovich, Dmitry

in 17th Information Security Conference (2014, November)

Full Text
See detailDeanonymisation of clients in Bitcoin P2P network
Biryukov, Alex; Khovratovich, Dmitry; Pustogarov, Ivan

in Conference on Computer and Communications Security (CCS) (2014, November)

Full Text
See detailDifferential entropy analysis of the IDEA block cipher
Biryukov, Alex; Nakahara, Jorge; Murat Yildirim, Hamdi

in Journal of Computational & Applied Mathematics (2014), 259(Part B), 561570

Full Text
See detailColliding Keys for SC2000-256
Biryukov, Alex; Nikolic, Ivica

in Selected Areas in Cryptography, Lecture Notes in Computer Science (2014)

Full Text
See detailBitcoin over Tor isn't a good idea
Biryukov, Alex; Pustogarov, Ivan

E-print/Working paper (2014)

Full Text
See detailContent and popularity analysis of Tor hidden services
Biryukov, Alex; Pustogarov, Ivan; Thill, Fabrice; Weinmann, Ralf-Philipp

in proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (2014, June)

Full Text
See detailDifferential Analysis of Block Ciphers SIMON and SPECK
Biryukov, Alex; Roy, Arnab; Velichkov, Vesselin

E-print/Working paper (2014)

Full Text
See detailAutomatic Search for Differential Trails in ARX Ciphers
Biryukov, Alex; Velichkov, Vesselin

in Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (2014)

Top of Page

2013

Full Text
See detailComplementing Feistel Ciphers
Biryukov, Alex; Nikolic, Ivica

in Lecture Notes in Computer Science (2013)

Full Text
See detailSecurity Analysis of the Block Cipher SC2000
Biryukov, Alex; Nikolic, Ivica

Report (2013)

Full Text
See detailTrawling for tor hidden services: Detection, measurement, deanonymization
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in 2013 IEEE Symposium on Security and Privacy (SP) (2013, May 19)

Top of Page

2012

Full Text
See detailCryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Biryukov, Alex; Groszschädl, Johann

in Fundamenta Informaticae (2012), 114(3-4), 221-237

Full Text
See detailCryptanalysis of the Loiss Stream Cipher
Biryukov, Alex; Kircanski, Aleksandar; Youssef, Amr M.

in Selected Areas in Cryptography (2012)

Full Text
See detailCryptanalysis of the "Kindle" Cipher
Biryukov, Alex; Leurent, Gaëtan; Roy, Arnab

in Selected Areas in Cryptography (2012)

Full Text
See detailTorScan: Deanonymizing Connections Using Topology Leaks
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in ERCIM News (2012), (90), 29-29

Full Text
See detailTorScan: Tracing Long-Lived Connections and Differential Scanning Attacks
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (2012)

Top of Page

2011

Full Text
See detailData Encryption Standard (DES)
Biryukov, Alex; De Cannière, Christophe

in Henk C. A. van Tilborg, Sushil Jajodia (Ed.) Encyclopedia of Cryptography and Security (2011)

Full Text
See detailLinear Cryptanalysis for Block Ciphers
Biryukov, Alex; De Cannière, Christophe

in Henk C. A. van Tilborg, Sushil Jajodia (Ed.) Encyclopedia of Cryptography and Security (2011)

Full Text
See detailCryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
Biryukov, Alex; Kizhvatov, Ilya; Zhang, Bin

in Applied Cryptography and Network Security - 9th International Conference (2011)

Full Text
See detailSecond-Order Differential Collisions for Reduced SHA-256.
Biryukov, Alex; Lamberger, Mario; Mendel, Florian; Nikolic, Ivica

(2011)

Full Text
See detailSearch for Related-Key Differential Characteristics in DES-Like Ciphers.
Biryukov, Alex; Nikolic, Ivica

in Fast Software Encryption - 18th International Workshop (2011)

Full Text
See detailBoomerang Attacks on BLAKE-32
Biryukov, Alex; Nikolic, Ivica; Roy, Arnab

in Fast Software Encryption - 18th International Workshop (2011)

Full Text
See detailSelected Areas in Cryptography 7th International Workshop, SAC 2010, Revised Selected Papers
Gong, Guang; Stinson, Douglas; Biryukov, Alex

Book published by Springer (2011)

Top of Page

2010

Full Text
See detailKey Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi

in EUROCRYPT 2010 (2010)

Full Text
See detailAnalysis of SNOW 3G XOR Resynchronization Mechanism
Biryukov, Alex; Priemuth-Schmid, Deike; Zhang, Bin

in SECRYPT 2010 (2010)

Full Text
See detailMultiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+)
Biryukov, Alex; Priemuth-Schmid, Deike; Zhang, Bin

in ACNS 2010 (2010)

Full Text
See detailStructural Cryptanalysis of SASAS
Biryukov, Alex; Shamir, Adi

in Journal of Cryptology (2010), 23(4), 505-518

Top of Page

2009

Full Text
See detailCryptanalysis of the LAKE Hash Family
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolic, Ivica; Pieprzyk, Josef; Wang, Huaxiong

in Fast Software Encryption (2009)

Full Text
See detailRelated-Key Cryptanalysis of the Full AES-192 and AES-256
Biryukov, Alex; Khovratovich, Dmitry

in ASIACRYPT 2009 (2009)

Full Text
See detailDistinguisher and Related-Key Attack on the Full AES-256
Biryukov, Alex; Khovratovich, Dmitry; Nikolic, Ivica

in Advances in Cryptology - CRYPTO (2009)

Full Text
See detailSpeeding up Collision Search for Byte-Oriented Hash Functions
Khovratovich, Dmitry; Biryukov, Alex; Nikolic, Ivica

in CT-RSA (2009)

Top of Page

2008

See detailDesign of a New Stream Cipher - LEX
Biryukov, Alex

Part of book (2008)

See detailCollisions for Step-Reduced SHA-256
Nikolic, Ivica; Biryukov, Alex

in Fast Software Encryption - 15th International Workshop, Revised Selected Papers (2008)

See detailSlid Pairs in Salsa20 and Trivium
Priemuth-Schmid, Deike; Biryukov, Alex

in INDOCRYPT (2008)

Top of Page

2007

See detailFast Software Encryption 14th International Workshop, FSE 2007
Biryukov, Alex

Book published by Springer (2007)

Full Text
See detailCollision Attacks on AES-Based MAC: Alpha-MAC
Biryukov, Alex; Bogdanov, Andrey; Khovratovich, Dmitry; Kasper, Timo

in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

Full Text
See detailTwo New Techniques of Side-Channel Cryptanalysis
Biryukov, Alex; Khovratovich, Dmitry

in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

Top of Page