Publications

2020

Full Text
See detailAlzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX)
Beierle, Christof; Biryukov, Alexei; Cardoso Dos Santos, Luan; Groszschädl, Johann; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Wang, Qingju

in Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (2020)

Full Text
See detailEnhancing CoAP Group Communication to Support mMTC Over Satellite Networks
Soua, Ridha; Palattella, Maria Rita; Stemper, André; Engel, Thomas

in IEEE International Conference on Communications (ICC) (2020, June)

Top of Page

2019

Full Text
See detailAlzette: A 64-bit ARX-box
Beierle, Christof; Biryukov, Alex; Cardoso Dos Santos, Luan; Groszschädl, Johann; Perrin, Léo Paul; Udovenko, Aleksei; Velichkov, Vesselin; Wang, Qingju

E-print/Working paper (2019)

Full Text
See detailLightweight AEAD and Hashing using the Sparkle Permutation Family
Beierle, Christof; Biryukov, Alex; Cardoso Dos Santos, Luan; Groszschädl, Johann; Perrin, Léo Paul; Udovenko, Aleksei; Velichkov, Vesselin; Wang, Qingju

in IACR Transactions on Symmetric Cryptology (2019)

Full Text
See detailOn degree-d zero-sum sets of full rank
Beierle, Christof; Biryukov, Alex; Udovenko, Aleksei

in Cryptography and Communications (2019)

Full Text
See detailCRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Beierle, Christof; Leander, Gregor; Moradi, Amir; Rasoolzadeh, Shahram

in IACR Transactions on Symmetric Cryptology (2019), 2019(1), 5-45

Full Text
See detailCryptanalysis of the Legendre PRF and generalizations
Beullens, Ward; Beyne, Tim; Udovenko, Aleksei; Vitto, Giuseppe

E-print/Working paper (2019)

Full Text
See detailWhite-Box and Asymmetrically Hard Crypto Design
Biryukov, Alex

Presentation (2019, May 18)

Full Text
See detailPortrait of a Miner in a Landscape
Biryukov, Alex; Feher, Daniel

in IEEE INFOCOM 2019 Workshop Proceedings (2019)

Full Text
See detailPrivacy and Linkability of Mining in Zcash
Biryukov, Alex; Feher, Daniel

in 2019 IEEE Conference on Communications and Network Security (CNS) (2019)

Full Text
See detailReCon: Sybil-Resistant Consensus from Reputation
Biryukov, Alex; Feher, Daniel

in Pervasive and Mobile Computing (2019)

Full Text
See detailPrivacy Aspects and Subliminal Channels in Zcash
Biryukov, Alex; Feher, Daniel; Vitto, Giuseppe

in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Securit (2019, November)

Full Text
See detailCryptocurrencies and Blockchain Technology
Biryukov, Alex; García-Alfaro

in Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops (2019, September)

Full Text
See detailDeanonymization and linkability of cryptocurrency transactions based on network analysis
Biryukov, Alex; Tikhomirov, Sergei

in Proceedings of 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (2019)

Full Text
See detailSecurity and Privacy of Mobile Wallet Users in Bitcoin, Dash, Monero, and Zcash
Biryukov, Alex; Tikhomirov, Sergei

in Pervasive and Mobile Computing (2019)

Full Text
See detailTransaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains
Biryukov, Alex; Tikhomirov, Sergei

in IEEE INFOCOM 2019 Workshop Proceedings (2019)

Full Text
See detailFELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms
Cardoso Dos Santos, Luan; Groszschädl, Johann; Biryukov, Alex

in Smart Card Research and Advanced Applications, 18th International Conference (2019)

Full Text
See detailA Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things
Cheng, Hao; Dinu, Dumitru-Daniel; Groszschädl, Johann; Roenne, Peter; Ryan, Peter

in Laurent, Maryline; Giannetsos, Thanassis (Eds.) Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (2019, December)

Full Text
See detailA Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers
Cheng, Hao; Groszschädl, Johann; Roenne, Peter; Ryan, Peter

Scientific Conference (2019, August)

Full Text
See detailCryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition
Derbez, Patrick; Lallemand, Virginie; Udovenko, Aleksei

in Patterson, Kenneth G.; Stebila, Douglas (Eds.) Selected Areas in Cryptography -- SAC 2019 (2019)

Full Text
See detailAggregation of MQTT Topics over Integrated Satellite Terrestrial Networks
Palattella, Maria Rita; Soua, Ridha; Stemper, André; Engel, Thomas

in ACM SIGMETRICS Performance Evaluation Review (2019, January)

Top of Page

2018

Full Text
See detailOn Degree-d Zero-Sum Sets of Full Rank
Beierle, Christof; Biryukov, Alex; Udovenko, Aleksei

E-print/Working paper (2018)

Full Text
See detailNonlinear Approximations in Cryptanalysis Revisited
Beierle, Christof; Canteaut, Anne; Leander, Gregor

in IACR Transactions on Symmetric Cryptology (2018), 2018(4), 80-101

Full Text
See detailOptimal First-Order Boolean Masking for Embedded IoT Devices
Biryukov, Alex; Dinu, Dumitru-Daniel; Le Corre, Yann; Udovenko, Aleksei

in CARDIS 2017: Smart Card Research and Advanced Applications (2018, January 26)

Full Text
See detailPrivacy-preserving KYC on Ethereum
Biryukov, Alex; Khovratovich, Dmitry; Tikhomirov, Sergei

Scientific Conference (2018, May 09)

Full Text
See detailAttacks and Countermeasures for White-box Designs
Biryukov, Alex; Udovenko, Aleksei

in Peyrin, Thomas; Galbraith, Steven (Eds.) Advances in Cryptology – ASIACRYPT 2018 (2018, November)

Full Text
See detailEfficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers
Cheng, Hao; Dinu, Dumitru-Daniel; Groszschädl, Johann

in Lanet, Jean-Louis; Toma, Cristian (Eds.) Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (2018, November)

Full Text
See detailTriathlon of Lightweight Block Ciphers for the Internet of Things
Dinu, Dumitru-Daniel; Le Corre, Yann; Khovratovich, Dmitry; Perrin, Léo Paul; Groszschädl, Johann; Biryukov, Alex

in Journal of Cryptographic Engineering (2018)

Full Text
See detailEnergy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers
Franck, Christian; Groszschädl, Johann; Le Corre, Yann; Lenou Tago, Cyrille

in Awan, Irfan; Younas, Muhammad; Portela, Filipe (Eds.) Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops (W-FICLOUD 2018) (2018, August)

Full Text
See detailA Family of Lightweight Twisted Edwards Curves for the Internet of Things
Ghatpande, Sankalp; Groszschädl, Johann; Liu, Zhe

in Blazy, Olivier; Yeun, Chan Y. (Eds.) Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (2018, December)

Full Text
See detailMicro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
Le Corre, Yann; Groszschädl, Johann; Dinu, Dumitru-Daniel

in Fan, Junfeng; Gierlichs, Benedikt (Eds.) Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (2018, April)

Full Text
See detailMicro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
Le Corre, Yann; Groszschädl, Johann; Dinu, Dumitru-Daniel

in Fan, Junfeng; Gierlichs, Benedikt (Eds.) Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (2018, April)

Full Text
See detailSecuring Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
Liu, Zhe; Choo, Kim-Kwang Raymond; Groszschädl, Johann

in IEEE Communications Magazine (2018), 56(2), 158-162

Top of Page

2017

Full Text
See detailTopics and Research Directions for Symmetric Cryptography
Biryukov, Alex; Daemen, Joan; Lucks, Stefan; Vaudenay, Serge

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

Full Text
See detailSide-Channel Attacks meet Secure Network Protocols
Biryukov, Alex; Dinu, Dumitru-Daniel; Le Corre, Yann

in Gollmann, Dieter; Miyaji, Atsuko; Kikuchi, Hiroaki (Eds.) Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (2017, June)

Full Text
See detailGuru: Universal Reputation Module for Distributed Consensus Protocols
Biryukov, Alex; Feher, Daniel; Khovratovich, Dmitry

Report (2017)

Full Text
See detailFindel: Secure Derivative Contracts for Ethereum
Biryukov, Alex; Khovratovich, Dmitry; Tikhomirov, Sergei

Scientific Conference (2017, April 07)

Full Text
See detailState of the Art in Lightweight Symmetric Cryptography
Biryukov, Alex; Perrin, Léo Paul

E-print/Working paper (2017)

Full Text
See detailAnalysis of the NORX Core Permutation
Biryukov, Alex; Udovenko, Aleksei; Velichkov, Vesselin

E-print/Working paper (2017)

Full Text
See detailEfficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares
Dinu, Dumitru-Daniel; Groszschädl, Johann; Le Corre, Yann

in Nguyen, Phong Q.; Zhou, Jianying (Eds.) Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (2017, November)

Full Text
See detailEfficient Implementation of Pedersen Commitments Using Twisted Edwards Curves
Franck, Christian; Groszschädl, Johann

in Bouzefrane, Samia; Banerjee, Soumya; Sailhan, Françoise; Boumerdassi, Selma; Renault, Eric (Eds.) Mobile, Secure, and Programmable Networking - Third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised Selected Papers (2017, June)

Full Text
See detailElliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things
Liu, Zhe; Groszschädl, Johann; Hu, Zhi; Järvinen, Kimmo; Wang, Husen; Verbauwhede, Ingrid

in IEEE Transactions on Computers (2017), 66(5), 773-785

Full Text
See detailHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers
Liu, Zhe; Pöppelmann, Thomas; Oder, Tobias; Seo, Hwajeong; Roy, Sujoy Sinha; Güneysu, Tim; Groszschädl, Johann; Kim, Howon; Verbauwhede, Ingrid

in ACM Transactions on Embedded Computing Systems (2017), 16(4), 117

Full Text
See detailExponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
Perrin, Léo Paul; Udovenko, Aleksei

in IACR Transactions on Symmetric Cryptology (2017), 2016(2), 99-124

Full Text
See detailSummary of an Open Discussion on IoT and Lightweight Cryptography
Shamir, Adi; Biryukov, Alex; Perrin, Léo Paul

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

Top of Page

2016

Full Text
See detailCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
Biryukov, Alex; Dinu, Dumitru-Daniel; Groszschädl, Johann

in Manulis, Mark; Sadeghi, Ahmad-Reza; Schneider, Steve (Eds.) Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (2016, June)

Full Text
See detailArgon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications
Biryukov, Alex; Dinu, Dumitru-Daniel; Khovratovich, Dmitry

in IEEE European Symposium on Security and Privacy (2016)

Full Text
See detailEgalitarian computing
Biryukov, Alex; Khovratovich, Dmitry

in USENIX Security 2016 (2016)

Full Text
See detailEquihash: asymmetric proof-of-work based on the Generalized Birthday problem
Biryukov, Alex; Khovratovich, Dmitry

in Proceedings of NDSS 2016 (2016, February)

Full Text
See detailMultiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
Biryukov, Alex; Khovratovich, Dmitry; Perrin, Léo Paul

in IACR Transactions on Symmetric Cryptology (2016), 2016(2), 226-247

Full Text
See detailCryptanalysis of Feistel Networks with Secret Round Functions
Biryukov, Alex; Leurent, Gaëtan; Perrin, Léo Paul

in Dunkelman, Orr; Keliher, Liam (Eds.) Selected Areas in Cryptography -- SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (2016, March)

Full Text
See detailReverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
Biryukov, Alex; Perrin, Léo Paul; Udovenko, Aleksei

in Fischlin, Marc, Coron, Jean-Sébastien (Ed.) Advances in Cryptology – EUROCRYPT 2016 (2016, April 28)

Full Text
See detailAutomatic Search for the Best Trails in ARX: Application to Block Cipher Speck
Biryukov, Alex; Velichkov, Vesselin; Le Corre, Yann

in Fast Software Encryption - FSE 2016 (2016)

Full Text
See detailDesign Strategies for ARX with Provable Bounds: SPARX and LAX
Dinu, Dumitru-Daniel; Perrin, Léo Paul; Udovenko, Aleksei; Velichkov, Vesselin; Groszschädl, Johann; Biryukov, Alex

in Cheon, Jung Hee; Takagi, Tsuyoshi (Eds.) Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (2016, December)

Full Text
See detailImplementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
Galindo, David; Groszschädl, Johann; Liu, Zhe; Vadnala, Praveen Kumar; Venkatesh, Srinivas Vivek

in Journal of Cryptographic Engineering (2016), 6(3), 229-238

Full Text
See detailEnergy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes
Liu, Zhe; Groszschädl, Johann; Li, Lin; Xu, Qiuliang

in Liu, Joseph K.; Steinfeld, Ron (Eds.) Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (2016, July)

Full Text
See detailEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in IEEE Transactions on Information Forensics and Security (2016), 11(7), 1385-1397

Full Text
See detailAlgebraic Insights into the Secret Feistel Network
Perrin, Léo Paul; Udovenko, Aleksei

in Peyrin, Thomas (Ed.) Fast Software Encryption - 23rd International Workshop, FSE 2016, Bochum, March 20-23, 2016 (2016)

Full Text
See detailCryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
Perrin, Léo Paul; Udovenko, Aleksei; Biryukov, Alex

in Robshaw, Matthew; Katz, Jonathan (Eds.) Advances in Cryptology – CRYPTO 2016 (2016, July 21)

Full Text
See detailEfficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Seo, Hwajeong; Liu, Zhe; Groszschädl, Johann; Kim, Howon

in Security and Communication Networks (2016), 9(18), 5401-5411

Top of Page

2015

Full Text
See detailDifferential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
Biryukov, Alex; Derbez, Patrick; Perrin, Léo Paul

in Leander, Gregor (Ed.) Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (2015, March)

Full Text
See detailArgon and Argon2
Biryukov, Alex; Dinu, Dumitru-Daniel; Khovratovich, Dmitry

Report (2015)

Full Text
See detailTradeoff Cryptanalysis of Memory-Hard Functions
Biryukov, Alex; Khovratovich, Dmitry

in 21st International Conference on the Theory and Application of Cryptology and Information Security (2015, December)

Full Text
See detailThe memory-hard Argon2 password hash function
Biryukov, Alex; Khovratovich, Dmitry; Dinu, Dumitru-Daniel; Josefsson, Simon

Report (2015)

Full Text
See detailOn Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Biryukov, Alex; Perrin, Léo Paul

in Gennaro, Rosario; Robshaw, Matthew (Eds.) Advances in Cryptology -- CRYPTO 2015, (2015, August)

Full Text
See detailProof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Biryukov, Alex; Pustogarov, Ivan

in Financial Cryptography and Data Security - 19th International Conference (2015, January)

Full Text
See detailConversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Coron, Jean-Sébastien; Groszschädl, Johann; Tibouchi, Mehdi; Vadnala, Praveen Kumar

in Leander, Gregor (Ed.) Fast Software Encryption, 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (2015, March)

See detailFELICS - Fair Evaluation of Lightweight Cryptographic Systems
Dinu, Dumitru-Daniel; Biryukov, Alex; Groszschädl, Johann; Khovratovich, Dmitry; Le Corre, Yann; Perrin, Léo Paul

Scientific Conference (2015, July)

See detailTriathlon of Lightweight Block Ciphers for the Internet of Things
Dinu, Dumitru-Daniel; Le Corre, Yann; Khovratovich, Dmitry; Perrin, Léo Paul; Groszschädl, Johann; Biryukov, Alex

Scientific Conference (2015, July)

Full Text
See detailRotational Cryptanalysis of ARX Revisited
Khovratovich, Dmitry; Nikolic, Ivica; Pieprzyk, Josef; Sokolowski, Przemyslaw; Steinfeld, Ron

in Fast Software Encryption - 22nd International Workshop, FSE 2015 Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (2015)

Full Text
See detailEfficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks
Liu, Zhe; Seo, Hwajeong; Hu, Zhi; Huang, Xinyi; Groszschädl, Johann

in Bao, Feng; Miller, Steven; Zhou, Jianying; Ahn, Gail-Joon (Eds.) ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore (2015, April)

Full Text
See detailEfficient Ring-LWE Encryption on 8-bit AVR Processors
Liu, Zhe; Seo, Hwajeong; Roy, Sujoy Sinha; Groszschädl, Johann; Kim, Howon; Verbauwhede, Ingrid

in Güneysu, Tim; Handschuh, Helena (Eds.) Cryptographic Hardware and Embedded Systems - CHES 2015, 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (2015, September)

Full Text
See detailFaster Mask Conversion with Lookup Tables
Vadnala, Praveen Kumar; Groszschädl, Johann

in Mangard, Stefan; Poschmann, Axel Y. (Eds.) Constructive Side-Channel Analysis and Secure Design, 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers (2015, April)

Full Text
See detailHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON
Wang, Junwei; Vadnala, Praveen Kumar; Groszschädl, Johann; Xu, Qiuliang

in Nyberg, Kaisa (Ed.) Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (2015, April)

Top of Page

2014

Full Text
See detailCryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Biryukov, Alex; Bouillaguet, Charles; Khovratovich, Dmitry

in 20th International Conference on the Theory and Application of Cryptology and Information Security (2014, December)

Full Text
See detailPAEQ: Parallelizable Permutation-Based Authenticated Encryption
Biryukov, Alex; Khovratovich, Dmitry

in 17th Information Security Conference (2014, November)

Full Text
See detailDeanonymisation of clients in Bitcoin P2P network
Biryukov, Alex; Khovratovich, Dmitry; Pustogarov, Ivan

in ACM Conference on Computer and Communications Security (CCS) (2014, November)

Full Text
See detailDifferential entropy analysis of the IDEA block cipher
Biryukov, Alex; Nakahara, Jorge; Murat Yildirim, Hamdi

in Journal of Computational & Applied Mathematics (2014), 259(Part B), 561570

Full Text
See detailColliding Keys for SC2000-256
Biryukov, Alex; Nikolic, Ivica

in Selected Areas in Cryptography, Lecture Notes in Computer Science (2014)

Full Text
See detailBitcoin over Tor isn't a good idea
Biryukov, Alex; Pustogarov, Ivan

in 2015 IEEE Symposium on Security and Privacy (2014, November)

Full Text
See detailContent and popularity analysis of Tor hidden services
Biryukov, Alex; Pustogarov, Ivan; Thill, Fabrice; Weinmann, Ralf-Philipp

in proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (2014, June)

Full Text
See detailDifferential Analysis of Block Ciphers SIMON and SPECK
Biryukov, Alex; Roy, Arnab; Velichkov, Vesselin

in Fast Software Encryption - 21st International Workshop (2014)

Full Text
See detailAutomatic Search for Differential Trails in ARX Ciphers
Biryukov, Alex; Velichkov, Vesselin

in Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (2014)

Full Text
See detailSecure Conversion between Boolean and Arithmetic Masking of Any Order
Coron, Jean-Sébastien; Groszschädl, Johann; Vadnala, Praveen Kumar

in Batina, Lejla; Robshaw, Matthew (Eds.) Cryptographic Hardware and Embedded Systems - CHES 2014, 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings (2014, September)

Full Text
See detailHigh-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit
Cui, Shujie; Liu, Zhe; Groszschädl, Johann; Xu, Qiuliang

in Huang, Xinyi; Zhou, Jianying (Eds.) Information Security Practice and Experience, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings (2014, May)

Full Text
See detailKey Wrapping with a Fixed Permutation
Khovratovich, Dmitry

in Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings (2014)

Full Text
See detailNew Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers
Liu, Zhe; Groszschädl, Johann

in Pointcheval, David; Vergnaud, Damien (Eds.) Progress in Cryptology - AFRICACRYPT 2014, 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (2014, May)

Full Text
See detailReverse Product-Scanning Multiplication and Squaring on 8-bit AVR Processors
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in Hui, Lucas C. K.; Qing, Sihan; Shi, Elaine; Yiu, Siu-Ming (Eds.) Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014. Proceedings (2014, December)

Full Text
See detailMoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
Liu, Zhe; Wenger, Erich; Groszschädl, Johann

in Boureanu, Ioana; Owezarski, Philippe; Vaudenay, Serge (Eds.) Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (2014, June)

Full Text
See detailCollision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
Perrin, Léo Paul; Khovratovich, Dmitry

in Fast Software Encryption - 21th International Workshop, FSE 2014, London, March 3-5, 2014 (2014, March)

Full Text
See detailMontgomery Modular Multiplication on ARM-NEON Revisited
Seo, Hwajeong; Liu, Zhe; Groszschädl, Johann; Choi, Jongseok; Kim, Howon

in Kim, Jongsung; Lee, Jooyoung (Eds.) Information Security and Cryptology - ICISC 2014, 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers (2014, December)

Top of Page

2013

Full Text
See detailComplementing Feistel Ciphers
Biryukov, Alex; Nikolic, Ivica

in Fast Software Encryption, 20th International Workshop, Lecture Notes in Computer Science (2013)

Full Text
See detailSecurity Analysis of the Block Cipher SC2000
Biryukov, Alex; Nikolic, Ivica

Report (2013)

Full Text
See detailTrawling for tor hidden services: Detection, measurement, deanonymization
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in 2013 IEEE Symposium on Security and Privacy (SP) (2013, May 19)

Full Text
See detailTwisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Chu, Dalin; Groszschädl, Johann; Liu, Zhe; Müller, Volker; Zhang, Yang

in Chen, Kefei; Xie, Qi; Qiu, Weidong; Xu, Shouhuai; Zhao, Yunlei (Eds.) Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (2013, May)

Full Text
See detailLow-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors
Liu, Zhe; Groszschädl, Johann; Wong, Duncan S.

in Lin, Dongdai; Xu, Shouhuai; Yung, Moti (Eds.) Information Security and Cryptology - 9th International Conference, INSCRYPT 2013, Guangzhou, China, November 27-30, 2013 (2013, November)

Full Text
See detailEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes
Liu, Zhe; Seo, Hwajeong; Groszschädl, Johann; Kim, Howon

in Qing, Sihan; Zhou, Jianying; Liu, Dongmei (Eds.) Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (2013, November)

Full Text
See detailAlgorithms for Switching between Boolean and Arithmetic Masking of Second Order
Vadnala, Praveen Kumar; Groszschädl, Johann

in Gierlichs, Benedikt; Guilley, Sylvain; Mukhopadhyay, Debdeep (Eds.) Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings (2013, October)

Top of Page

2012

Full Text
See detailCryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Biryukov, Alex; Groszschädl, Johann

in Fundamenta Informaticae (2012), 114(3-4), 221-237

Full Text
See detailCryptanalysis of the Loiss Stream Cipher
Biryukov, Alex; Kircanski, Aleksandar; Youssef, Amr M.

in Selected Areas in Cryptography (2012)

Full Text
See detailCryptanalysis of the "Kindle" Cipher
Biryukov, Alex; Leurent, Gaëtan; Roy, Arnab

in Selected Areas in Cryptography (2012)

Full Text
See detailTorScan: Deanonymizing Connections Using Topology Leaks
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in ERCIM News (2012), (90), 29-29

Full Text
See detailTorScan: Tracing Long-Lived Connections and Differential Scanning Attacks
Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

in Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (2012)

Top of Page

2011

Full Text
See detailData Encryption Standard (DES)
Biryukov, Alex; De Cannière, Christophe

in Henk C. A. van Tilborg, Sushil Jajodia (Ed.) Encyclopedia of Cryptography and Security (2011)

Full Text
See detailLinear Cryptanalysis for Block Ciphers
Biryukov, Alex; De Cannière, Christophe

in Henk C. A. van Tilborg, Sushil Jajodia (Ed.) Encyclopedia of Cryptography and Security (2011)

Full Text
See detailCryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
Biryukov, Alex; Kizhvatov, Ilya; Zhang, Bin

in Applied Cryptography and Network Security - 9th International Conference (2011)

Full Text
See detailSecond-Order Differential Collisions for Reduced SHA-256.
Biryukov, Alex; Lamberger, Mario; Mendel, Florian; Nikolic, Ivica

in 17th International Conference on the Theory and Application of Cryptology and Information Security (2011)

Full Text
See detailSearch for Related-Key Differential Characteristics in DES-Like Ciphers.
Biryukov, Alex; Nikolic, Ivica

in Fast Software Encryption - 18th International Workshop (2011)

Full Text
See detailBoomerang Attacks on BLAKE-32
Biryukov, Alex; Nikolic, Ivica; Roy, Arnab

in Fast Software Encryption - 18th International Workshop (2011)

Full Text
See detailSelected Areas in Cryptography 7th International Workshop, SAC 2010, Revised Selected Papers
Gong, Guang; Stinson, Douglas; Biryukov, Alex

Book published by Springer (2011)

Top of Page

2010

Full Text
See detailKey Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi

in EUROCRYPT 2010 (2010)

Full Text
See detailAnalysis of SNOW 3G XOR Resynchronization Mechanism
Biryukov, Alex; Priemuth-Schmid, Deike; Zhang, Bin

in SECRYPT 2010 (2010)

Full Text
See detailMultiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+)
Biryukov, Alex; Priemuth-Schmid, Deike; Zhang, Bin

in ACNS 2010 (2010)

Full Text
See detailStructural Cryptanalysis of SASAS
Biryukov, Alex; Shamir, Adi

in Journal of Cryptology (2010), 23(4), 505-518

See detailNew approaches to the cryptanalysis of symmetric primitives
Khovratovich, Dmitry

Doctoral thesis (2010)

Full Text
See detailRotational Cryptanalysis of ARX
Khovratovich, Dmitry; Nikolic, Ivica

in Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea (2010)

Top of Page

2009

Full Text
See detailCryptanalysis of the LAKE Hash Family
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolic, Ivica; Pieprzyk, Josef; Wang, Huaxiong

in Fast Software Encryption (2009)

Full Text
See detailRelated-Key Cryptanalysis of the Full AES-192 and AES-256
Biryukov, Alex; Khovratovich, Dmitry

in ASIACRYPT 2009 (2009)

Full Text
See detailDistinguisher and Related-Key Attack on the Full AES-256
Biryukov, Alex; Khovratovich, Dmitry; Nikolic, Ivica

in Advances in Cryptology - CRYPTO (2009)

Full Text
See detailRealizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision Multiplier Datapath
Großschädl, Johann; Savas, Erkay; Yumbul, Kazim

in Prasanna, Viktor K.; Torres, Lionel; Cumplido, René (Eds.) Proceedings of the 5th International Conference on Reconfigurable Computing and FPGAs (RECONFIG 2009) (2009, December)

Full Text
See detailSpeeding up Collision Search for Byte-Oriented Hash Functions
Khovratovich, Dmitry; Biryukov, Alex; Nikolic, Ivica

in CT-RSA (2009)

Top of Page