712 results on '"Biryukov, Alex"'
Search Results
2. Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
3. PURED: A Unified Framework for Resource-Hard Functions
4. Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
5. Security and Privacy of Lightning Network Payments with Uncertain Channel Balances
6. Meet-in-the-Filter and Dynamic Counting with Applications to Speck
7. Probing Channel Balances in the Lightning Network
8. Meet-in-the-Filter and Dynamic Counting with Applications to Speck
9. Analysis and Probing of Parallel Channels in the Lightning Network
10. Automated Truncation of Differential Trails and Trail Clustering in ARX
11. Dynamic Universal Accumulator with Batch Update over Bilinear Groups
12. Differential cryptanalysis of WARP
13. Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
14. Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups
15. Alzette: A 64-Bit ARX-box : (Feat. CRAX and TRAX)
16. FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms
17. Egalitarian computing
18. Analysis and Probing of Parallel Channels in the Lightning Network
19. Automated Truncation of Differential Trails and Trail Clustering in ARX
20. Dynamic Universal Accumulator with Batch Update over Bilinear Groups
21. ReCon: Sybil-resistant consensus from reputation
22. Bitcoin over Tor isn't a good idea
23. Deanonymisation of clients in Bitcoin P2P network
24. On degree-d zero-sum sets of full rank
25. Content and popularity analysis of Tor hidden services
26. Optimal First-Order Boolean Masking for Embedded IoT Devices
27. Attacks and Countermeasures for White-box Designs
28. Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash
29. Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups
30. FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms
31. Alzette: A 64-Bit ARX-box
32. Symmetrically and Asymmetrically Hard Cryptography
33. Findel: Secure Derivative Contracts for Ethereum
34. Side-Channel Attacks Meet Secure Network Protocols
35. Triathlon of lightweight block ciphers for the Internet of things
36. Cryptanalysis of ARX-based White-box Implementations
37. Design Strategies for ARX with Provable Bounds: Sparx and LAX
38. Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
39. Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
40. Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
41. Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
42. Cryptanalysis of Feistel Networks with Secret Round Functions
43. Tradeoff Cryptanalysis of Memory-Hard Functions
44. Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
45. On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
46. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
47. Differential Analysis of Block Ciphers SIMON and SPECK
48. Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
49. Complementing Feistel Ciphers
50. PAEQ: Parallelizable Permutation-Based Authenticated Encryption
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.