Cryptographers' World
 

Alex Biryukov


Author's Web Page Link

34 papers in database with 1771 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 22

Conference Proceedings

 
1. Alex Biryukov, editor, Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. Springer, 2007. ISBN 3-540-74617-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Eli Biham,  Alex Biryukov,  Adi Shamir,  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Journal of Cryptology, Volume 18(4), pp. 291 - 311, Springer, 2005.

[Cited 156 times Red StarRed Star]

2. Eli Biham,  Alex Biryukov,  An Improvement of Davies' Attack on DES, Journal of Cryptology, Volume 10(3), pp. 195 - 206, Springer, 1997.

[Cited 39 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Alex Biryukov,  Dmitry Khovratovich,  Related-Key Cryptanalysis of the Full AES-192 and AES-256, pp. 1 - 18, ASIACRYPT 2009.

[Electronic Edition][Cited 38 times ]

2. Alex Biryukov,  Dmitry Khovratovich,  Ivica Nikolic,  Distinguisher and Related-Key Attack on the Full AES-256, pp. 231 - 249, CRYPTO 2009.

[Electronic Edition][Cited 30 times ]

3. Alex Biryukov,  Praveen Gauravaram,  Jian Guo,  Dmitry Khovratovich,  San Ling,  Krystian Matusiewicz,  Ivica Nikolic,  Josef Pieprzyk,  Huaxiong Wang,  Cryptanalysis of the LAKE Hash Family, pp. 156 - 179, FSE 2009.

[Electronic Edition][Cited 1 times ]

4. Deike Priemuth-Schmid,  Alex Biryukov,  Slid Pairs in Salsa20 and Trivium, pp. 1 - 14, INDOCRYPT 2008.

[Electronic Edition][Cited 7 times ]

5. Ivica Nikolic,  Alex Biryukov,  Collisions for Step-Reduced SHA-256, pp. 1 - 15, FSE 2008.

[Electronic Edition][Cited 16 times ]

6. Alexander Maximov,  Alex Biryukov,  Two Trivial Attacks on Trivium, pp. 36 - 55, SAC 2007.

[Electronic Edition][Cited 22 times ]

7. Alex Biryukov,  Dmitry Khovratovich,  Two New Techniques of Side-Channel Cryptanalysis, pp. 195 - 208, CHES 2007.

[Electronic Edition][Cited 13 times ]

8. Alex Biryukov,  Andrey Bogdanov,  Dmitry Khovratovich,  Timo Kasper,  Collision Attacks on AES-Based MAC: Alpha-MAC, pp. 166 - 180, CHES 2007.

[Electronic Edition][Cited 8 times ]

9. Alex Biryukov,  The Design of a Stream Cipher LEX, pp. 67 - 75, SAC 2006.

[Electronic Edition][Cited 24 times ]

10. Alex Biryukov,  Sourav Mukhopadhyay,  Palash Sarkar,  Improved Time-Memory Trade-Offs with Multiple Data, pp. 110 - 127, SAC 2005.

[Electronic Edition][Cited 39 times ]

11. Hirotaka Yoshida,  Alex Biryukov,  Analysis of a SHA-256 Variant, pp. 245 - 260, SAC 2005.

[Electronic Edition][Cited 24 times ]

12. Alex Biryukov,  Adi Shamir,  Analysis of the Non-linear Part of Mugi, pp. 320 - 329, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

13. Alex Biryukov,  Christophe De Cannière,  Michaël Quisquater,  On Multiple Linear Approximations, pp. 1 - 22, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

14. Bart Van Rompay,  Alex Biryukov,  Bart Preneel,  Joos Vandewalle,  Cryptanalysis of 3-Pass HAVAL, pp. 228 - 245, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

15. Alex Biryukov,  Christophe De Cannière,  Gustaf Dellkrantz,  Cryptanalysis of SAFER++, pp. 195 - 211, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

16. Dai Watanabe,  Alex Biryukov,  Christophe De Cannière,  A Distinguishing Attack of SNOW 2.0 with Linear Masking Method, pp. 222 - 233, SAC 2003.

[Electronic Edition][Cited 30 times ]

17. Alex Biryukov,  Joseph Lano,  Bart Preneel,  Cryptanalysis of the Alleged SecurID Hash Function, pp. 130 - 144, SAC 2003.

[Electronic Edition][Cited 21 times ]

18. Alex Biryukov,  Christophe De Cannière,  An Braeken,  Bart Preneel,  A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms, pp. 33 - 50, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 40 times ]

19. Alex Biryukov,  Analysis of Involutional Ciphers: Khazad and Anubis, pp. 45 - 53, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

20. Alex Biryukov,  Christophe De Cannière,  Block Ciphers and Systems of Quadratic Equations, pp. 274 - 289, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 40 times ]

21. Alex Biryukov,  Adi Shamir,  Structural Cryptanalysis of SASAS, pp. 394 - 405, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

22. Alex Biryukov,  Adi Shamir,  Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, pp. 1 - 13, ASIACRYPT 2000.

[Electronic Edition][Cited 176 times Red StarRed Star]

23. Alex Biryukov,  David Wagner,  Advanced Slide Attacks, pp. 589 - 606, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 117 times Red StarRed Star]

24. Alex Biryukov,  Adi Shamir,  David Wagner,  Real Time Cryptanalysis of A5/1 on a PC, pp. 1 - 18, FSE 2000.

[Electronic Edition][Cited 254 times Red StarRed StarRed Star]

25. Alex Biryukov,  David Wagner,  Slide Attacks, pp. 245 - 259, FSE 1999.

[Electronic Edition][Cited 177 times Red StarRed Star]

26. Eli Biham,  Alex Biryukov,  Adi Shamir,  Miss in the Middle Attacks on IDEA and Khufu, pp. 124 - 138, FSE 1999.

[Electronic Edition][Cited 99 times Red Star]

27. Eli Biham,  Alex Biryukov,  Adi Shamir,  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, pp. 12 - 23, EUROCRYPT 1999.

[Electronic Edition][Cited 218 times Red StarRed Star]

28. Alex Biryukov,  Eyal Kushilevitz,  From Differential Cryptanalysis to Ciphertext-Only Attacks, pp. 72 - 88, CRYPTO 1998.

[Electronic Edition][Cited 17 times ]

29. Eli Biham,  Alex Biryukov,  Orr Dunkelman,  Eran Richardson,  Adi Shamir,  Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR, pp. 362 - 376, SAC 1998.

[Electronic Edition][Cited 25 times ]

30. Alex Biryukov,  Eyal Kushilevitz,  Improved Cryptanalysis of RC5, pp. 85 - 99, EUROCRYPT 1998.

[Electronic Edition][Cited 66 times Red Star]

31. Eli Biham,  Alex Biryukov,  How to Strengthen DES Using Existing Hardware, pp. 398 - 412, ASIACRYPT 1994.

[Electronic Edition][Cited 41 times ]

32. Eli Biham,  Alex Biryukov,  An Improvement of Davies' Attack on DES, pp. 461 - 467, EUROCRYPT 1994.

[Electronic Edition][Cited 46 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...