Dmitry Khovratovich
|
|
||||
| Adresse postale |
Université du Luxembourg 2, Avenue de l'Université L-4365 Esch-sur-Alzette |
||||
Dmitry Khovratovich is a PhD student at the University of Luxembourg since December 2006. His supervisor is Prof. Dr. Alex Biryukov. Dmitry obtained his Master degree (diploma with honor) at the Moscow State University in 2005 (Computational Mathematics and Cybernetics Department).
His research area includes design and analysis of symmetric ciphers as well as mathematic background of cryptanalysis (algebra, complexity theory). He also has publications on the combinatorial problems of multi-valued logic function classes.
His personal webpage is at http://lj.streamclub.ru/index_en.html . This site contains some cryptography course programs and links on surveys on cryptanalysis.
Last updated on: mercredi 14 octobre 2015
2019
Triathlon of Lightweight Block Ciphers for the Internet of Things; ; ; ; ;
in Journal of Cryptographic Engineering (2019), 9(3), 283-302
2017
2016
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications; ;
in IEEE European Symposium on Security and Privacy (2016)
Equihash: asymmetric proof-of-work based on the Generalized Birthday problem;
in Proceedings of NDSS 2016 (2016, February)
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs; ;
in IACR Transactions on Symmetric Cryptology (2016), 2016(2), 226-247
2015
Tradeoff Cryptanalysis of Memory-Hard Functions;
in 21st International Conference on the Theory and Application of Cryptology and Information Security (2015, December)
FELICS - Fair Evaluation of Lightweight Cryptographic Systems; ; ; ; ;
Scientific Conference (2015, July)
Triathlon of Lightweight Block Ciphers for the Internet of Things; ; ; ; ;
Scientific Conference (2015, July)
Rotational Cryptanalysis of ARX Revisited; ; ; ;
in Fast Software Encryption - 22nd International Workshop, FSE 2015 Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (2015)
2014
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key; ;
in 20th International Conference on the Theory and Application of Cryptology and Information Security (2014, December)
PAEQ: Parallelizable Permutation-Based Authenticated Encryption;
in 17th Information Security Conference (2014, November)
Deanonymisation of clients in Bitcoin P2P network; ;
in ACM Conference on Computer and Communications Security (CCS) (2014, November)
Key Wrapping with a Fixed Permutationin Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings (2014)
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64;
in Fast Software Encryption - 21th International Workshop, FSE 2014, London, March 3-5, 2014 (2014, March)
2010
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds; ; ; ;
in EUROCRYPT 2010 (2010)
Rotational Cryptanalysis of ARX;
in Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea (2010)
2009
Distinguisher and Related-Key Attack on the Full AES-256; ;
in Advances in Cryptology - CRYPTO (2009)
2007
Collision Attacks on AES-Based MAC: Alpha-MAC; ; ;
in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)
Two New Techniques of Side-Channel Cryptanalysis;
in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)














