Alex Biryukov

Alex Biryukov

Professor in Computer Science, specialized in cryptology and/or security of information systems

Discipline(s) Finance / Computer science / Mathematics
Sujets de recherche Cryptography, Cryptanalysis, Information Security
Faculté ou Centre Faculté des Sciences, de la Technologie et de la Communication
Unité de recherche CSC
Adresse postale Université du Luxembourg
Maison du Nombre
6, Avenue de la Fonte
L-4364 Esch-sur-Alzette
Bureau sur le campus MNO, E02 0245-010
E-mail
Téléphone (+352) 46 66 44 6793
Fax (+352) 46 66 44 5500
Réseaux sociaux & blogs
Langues parlées English, French
Séjours de recherche en Belgium, Luxembourg, US, Israel

I am full professor in "Cryptography and Information Security" at the University of Luxembourg in the Computer Science and Communications Research Unit.  Formerly I was an associate professor at the same faculty. I am also a faculty member of the Interdisciplinary Centre for Security, Reliability and Trust (SnT).
I am teaching classes on "Information Security Basics", "Symmetric Cryptography and Security of Communications", "Cryptography in the Real World" and guide several Ph.D. students and postdocs.
In  the past  I was a visiting professor at K.U.Leuven (ESAT, COSIC group), working with Prof. Bart Preneel and participating in the development of European standards for Signature, Integrity and Encryption Schemes (NESSIE project). I have received my M.Sc. and Ph.D. from the Technion - Israel Institute of Technology in 1994 and 1999 respectively working with Prof. Eli Biham, Prof. Shimon Even and Prof. Eyal Kushilevitz. I have been a post-doc at the Computer Science faculty of Weizmann Institute of Science (Rehovot, Israel), working with Prof. Adi Shamir. I have taught graduate courses on "Methods of Cryptanalysis" and "Advanced Symmetric Cryptography" at Weizmann Institute and K.U.Leuven.
I am interested in cryptographic research, especially in cryptanalysis and design of ciphers, hash functions. I am also interested in privacy and anonymity, studying anonymity networks like Tor or crypto-currencies like Bitcoin. I have been a member of  International Association for Cryptologic Research (IACR) since 1994. I am frequently invited to program committees of international conferences (around 40 so far) including such top conferences like EUROCRYPT, CRYPTO, ASIACRYPT (with acceptance rates below 1/5).

I am currently the PI of an FNR CORE project ACRYPT on "Lightweight Cryptography for the Internet of Things". I am also MC member of the COST Action IC1403 on "Cryptanalysis of ubiquitous computing systems".

For more Information please see here.

Last updated on: mercredi, 14 octobre 2015

powered by
orbilu.uni.lu

2017

Full Text
See detailTopics and Research Directions for Symmetric Cryptography
Biryukov, Alex; Daemen, Joan; Lucks, Stefan; Vaudenay, Serge

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

Full Text
See detailSide-Channel Attacks meet Secure Network Protocols
Biryukov, Alex; Dinu, Dumitru-Daniel; Le Corre, Yann

in Gollmann, Dieter; Miyaji, Atsuko; Kikuchi, Hiroaki (Eds.) Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (2017, June)

Full Text
See detailGuru: Universal Reputation Module for Distributed Consensus Protocols
Biryukov, Alex; Feher, Daniel; Khovratovich, Dmitry

Report (2017)

Full Text
See detailFindel: Secure Derivative Contracts for Ethereum
Biryukov, Alex; Khovratovich, Dmitry; Tikhomirov, Sergei

Scientific Conference (2017, April 07)

Full Text
See detailState of the Art in Lightweight Symmetric Cryptography
Biryukov, Alex; Perrin, Léo Paul

E-print/Working paper (2017)

Full Text
See detailSummary of an Open Discussion on IoT and Lightweight Cryptography
Shamir, Adi; Biryukov, Alex; Perrin, Léo Paul

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

Top of Page

2016

Full Text
See detailCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
Biryukov, Alex; Dinu, Dumitru-Daniel; Groszschädl, Johann

in Manulis, Mark; Sadeghi, Ahmad-Reza; Schneider, Steve (Eds.) Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (2016, June)

Full Text
See detailArgon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications
Biryukov, Alex; Dinu, Dumitru-Daniel; Khovratovich, Dmitry

in IEEE European Symposium on Security and Privacy (2016)

Full Text
See detailEquihash: asymmetric proof-of-work based on the Generalized Birthday problem
Biryukov, Alex; Khovratovich, Dmitry

in Proceedings of NDSS 2016 (2016, February)

Full Text
See detailEgalitarian computing
Biryukov, Alex; Khovratovich, Dmitry

in USENIX Security 2016 (2016)

Full Text
See detailMultiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
Biryukov, Alex; Khovratovich, Dmitry; Perrin, Léo Paul

in IACR Transactions on Symmetric Cryptology (2016), 2016(2), 226-247

Full Text
See detailCryptanalysis of Feistel Networks with Secret Round Functions
Biryukov, Alex; Leurent, Gaëtan; Perrin, Léo Paul

in Dunkelman, Orr; Keliher, Liam (Eds.) Selected Areas in Cryptography -- SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (2016, March)

Full Text
See detailReverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
Biryukov, Alex; Perrin, Léo Paul; Udovenko, Aleksei

in Fischlin, Marc, Coron, Jean-Sébastien (Ed.) Advances in Cryptology – EUROCRYPT 2016 (2016, April 28)

Full Text
See detailAutomatic Search for the Best Trails in ARX: Application to Block Cipher Speck
Biryukov, Alex; Velichkov, Vesselin; Le Corre, Yann

in Fast Software Encryption - FSE 2016 (2016)

Full Text
See detailDesign Strategies for ARX with Provable Bounds: SPARX and LAX
Dinu, Dumitru-Daniel; Perrin, Léo Paul; Udovenko, Aleksei; Velichkov, Vesselin; Groszschädl, Johann; Biryukov, Alex

in Cheon, Jung Hee; Takagi, Tsuyoshi (Eds.) Advances in Cryptology - ASIACRYPT 2016 (2016)

Full Text
See detailCryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
Perrin, Léo Paul; Udovenko, Aleksei; Biryukov, Alex

in Robshaw, Matthew; Katz, Jonathan (Eds.) Advances in Cryptology – CRYPTO 2016 (2016, July 21)

Top of Page

2015

Full Text
See detailDifferential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
Biryukov, Alex; Derbez, Patrick; Perrin, Léo Paul

in Leander, Gregor (Ed.) Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (2015, March)

Full Text
See detailArgon and Argon2
Biryukov, Alex; Dinu, Dumitru-Daniel; Khovratovich, Dmitry

Report (2015)

Full Text
See detailTradeoff Cryptanalysis of Memory-Hard Functions
Biryukov, Alex; Khovratovich, Dmitry

in 21st International Conference on the Theory and Application of Cryptology and Information Security (2015, December)

Full Text
See detailThe memory-hard Argon2 password hash function
Biryukov, Alex; Khovratovich, Dmitry; Dinu, Dumitru-Daniel; Josefsson, Simon

Report (2015)

Full Text
See detailOn Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Biryukov, Alex; Perrin, Léo Paul

in Gennaro, Rosario; Robshaw, Matthew (Eds.) Advances in Cryptology -- CRYPTO 2015, (2015, August)

Full Text
See detailProof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Biryukov, Alex; Pustogarov, Ivan

in Financial Cryptography and Data Security - 19th International Conference (2015, January)

Full Text
See detailTriathlon of Lightweight Block Ciphers for the Internet of Things
Dinu, Daniel; Corre, Yann Le; Khovratovich, Dmitry; Perrin, Léo; Großschädl, Johann; Biryukov, Alex

Report (2015)

See detailFELICS - Fair Evaluation of Lightweight Cryptographic Systems
Dinu, Dumitru-Daniel; Biryukov, Alex; Groszschädl, Johann; Khovratovich, Dmitry; Le Corre, Yann; Perrin, Léo Paul

Scientific Conference (2015, July)

See detailTriathlon of Lightweight Block Ciphers for the Internet of Things
Dinu, Dumitru-Daniel; Le Corre, Yann; Khovratovich, Dmitry; Perrin, Léo Paul; Groszschädl, Johann; Biryukov, Alex

Scientific Conference (2015, July)

Top of Page

2014

Full Text
See detailCryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Biryukov, Alex; Bouillaguet, Charles; Khovratovich, Dmitry

in 20th International Conference on the Theory and Application of Cryptology and Information Security (2014, December)

Full Text
See detailPAEQ: Parallelizable Permutation-Based Authenticated Encryption
Biryukov, Alex; Khovratovich, Dmitry

in 17th Information Security Conference (2014, November)

Full Text
See detailDeanonymisation of clients in Bitcoin P2P network
Biryukov, Alex; Khovratovich, Dmitry; Pustogarov, Ivan

in ACM Conference on Computer and Communications Security (CCS) (2014, November)

Full Text
See detailDifferential entropy analysis of the IDEA block cipher
Biryukov, Alex; Nakahara, Jorge; Murat Yildirim, Hamdi

in Journal of Computational & Applied Mathematics (2014), 259(Part B), 561570

Full Text
See detailColliding Keys for SC2000-256
Biryukov, Alex; Nikolic, Ivica

in Selected Areas in Cryptography, Lecture Notes in Computer Science (2014)

Full Text
See detailBitcoin over Tor isn't a good idea
Biryukov, Alex; Pustogarov, Ivan

in 2015 IEEE Symposium on Security and Privacy (2014, November)

Full Text
See detailContent and popularity analysis of Tor hidden services
Biryukov, Alex; Pustogarov, Ivan; Thill, Fabrice; Weinmann, Ralf-Philipp

in proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (2014, June)

Full Text
See detailDifferential Analysis of Block Ciphers SIMON and SPECK
Biryukov, Alex; Roy, Arnab; Velichkov, Vesselin

in Fast Software Encryption - 21st International Workshop (2014)

Full Text
See detailAutomatic Search for Differential Trails in ARX Ciphers
Biryukov, Alex; Velichkov, Vesselin

in Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (2014)

Top of Page

2013

Full Text
See detailComplementing Feistel Ciphers
Biryukov, Alex; Nikolic, Ivica

in Fast Software Encryption, 20th International Workshop, Lecture Notes in Computer Science (2013)

Full Text
See detailSecurity Analysis of the Block Cipher SC2000
Biryukov, Alex; Nikolic, Ivica

Report (2013)

Full Text
See detailTrawling for tor hidden services: Detection, measurement, deanonymization
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in 2013 IEEE Symposium on Security and Privacy (SP) (2013, May 19)

Top of Page

2012

Full Text
See detailCryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Biryukov, Alex; Groszschädl, Johann

in Fundamenta Informaticae (2012), 114(3-4), 221-237

Full Text
See detailCryptanalysis of the Loiss Stream Cipher
Biryukov, Alex; Kircanski, Aleksandar; Youssef, Amr M.

in Selected Areas in Cryptography (2012)

Full Text
See detailCryptanalysis of the "Kindle" Cipher
Biryukov, Alex; Leurent, Gaëtan; Roy, Arnab

in Selected Areas in Cryptography (2012)

Full Text
See detailTorScan: Deanonymizing Connections Using Topology Leaks
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in ERCIM News (2012), (90), 29-29

Full Text
See detailTorScan: Tracing Long-Lived Connections and Differential Scanning Attacks
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (2012)

Top of Page

2011

Full Text
See detailData Encryption Standard (DES)
Biryukov, Alex; De Cannière, Christophe

in Henk C. A. van Tilborg, Sushil Jajodia (Ed.) Encyclopedia of Cryptography and Security (2011)

Full Text
See detailLinear Cryptanalysis for Block Ciphers
Biryukov, Alex; De Cannière, Christophe

in Henk C. A. van Tilborg, Sushil Jajodia (Ed.) Encyclopedia of Cryptography and Security (2011)

Full Text
See detailCryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
Biryukov, Alex; Kizhvatov, Ilya; Zhang, Bin

in Applied Cryptography and Network Security - 9th International Conference (2011)

Full Text
See detailSecond-Order Differential Collisions for Reduced SHA-256.
Biryukov, Alex; Lamberger, Mario; Mendel, Florian; Nikolic, Ivica

in 17th International Conference on the Theory and Application of Cryptology and Information Security (2011)

Full Text
See detailSearch for Related-Key Differential Characteristics in DES-Like Ciphers.
Biryukov, Alex; Nikolic, Ivica

in Fast Software Encryption - 18th International Workshop (2011)

Full Text
See detailBoomerang Attacks on BLAKE-32
Biryukov, Alex; Nikolic, Ivica; Roy, Arnab

in Fast Software Encryption - 18th International Workshop (2011)

Full Text
See detailSelected Areas in Cryptography 7th International Workshop, SAC 2010, Revised Selected Papers
Gong, Guang; Stinson, Douglas; Biryukov, Alex

Book published by Springer (2011)

Top of Page

2010

Full Text
See detailKey Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi

in EUROCRYPT 2010 (2010)

Full Text
See detailAnalysis of SNOW 3G XOR Resynchronization Mechanism
Biryukov, Alex; Priemuth-Schmid, Deike; Zhang, Bin

in SECRYPT 2010 (2010)

Full Text
See detailMultiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+)
Biryukov, Alex; Priemuth-Schmid, Deike; Zhang, Bin

in ACNS 2010 (2010)

Full Text
See detailStructural Cryptanalysis of SASAS
Biryukov, Alex; Shamir, Adi

in Journal of Cryptology (2010), 23(4), 505-518

Top of Page

2009

Full Text
See detailCryptanalysis of the LAKE Hash Family
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolic, Ivica; Pieprzyk, Josef; Wang, Huaxiong

in Fast Software Encryption (2009)

Full Text
See detailRelated-Key Cryptanalysis of the Full AES-192 and AES-256
Biryukov, Alex; Khovratovich, Dmitry

in ASIACRYPT 2009 (2009)

Full Text
See detailDistinguisher and Related-Key Attack on the Full AES-256
Biryukov, Alex; Khovratovich, Dmitry; Nikolic, Ivica

in Advances in Cryptology - CRYPTO (2009)

Full Text
See detailSpeeding up Collision Search for Byte-Oriented Hash Functions
Khovratovich, Dmitry; Biryukov, Alex; Nikolic, Ivica

in CT-RSA (2009)

Top of Page

2008

See detailDesign of a New Stream Cipher - LEX
Biryukov, Alex

Part of book (2008)

See detailCollisions for Step-Reduced SHA-256
Nikolic, Ivica; Biryukov, Alex

in Fast Software Encryption - 15th International Workshop, Revised Selected Papers (2008)

See detailSlid Pairs in Salsa20 and Trivium
Priemuth-Schmid, Deike; Biryukov, Alex

in INDOCRYPT (2008)

Top of Page

2007

See detailFast Software Encryption 14th International Workshop, FSE 2007
Biryukov, Alex

Book published by Springer (2007)

Full Text
See detailCollision Attacks on AES-Based MAC: Alpha-MAC
Biryukov, Alex; Bogdanov, Andrey; Khovratovich, Dmitry; Kasper, Timo

in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

Full Text
See detailTwo New Techniques of Side-Channel Cryptanalysis
Biryukov, Alex; Khovratovich, Dmitry

in Cryptographic Hardware and Embedded Systems - CHES 2007 (2007)

Top of Page