Search

Your search keyword '"Biryukov, Alex"' showing total 712 results

Search Constraints

Start Over You searched for: Author "Biryukov, Alex" Remove constraint Author: "Biryukov, Alex"
712 results on '"Biryukov, Alex"'

Search Results

1. Cryptanalysis of Algebraic Verifiable Delay Functions

3. PURED: A Unified Framework for Resource-Hard Functions

5. Security and Privacy of Lightning Network Payments with Uncertain Channel Balances

6. Meet-in-the-Filter and Dynamic Counting with Applications to Speck

7. Probing Channel Balances in the Lightning Network

9. Analysis and Probing of Parallel Channels in the Lightning Network

10. Automated Truncation of Differential Trails and Trail Clustering in ARX

11. Dynamic Universal Accumulator with Batch Update over Bilinear Groups

13. Dummy Shuffling Against Algebraic Attacks in White-Box Implementations

14. Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups

15. Alzette: A 64-Bit ARX-box : (Feat. CRAX and TRAX)

16. FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms

17. Egalitarian computing

22. Bitcoin over Tor isn't a good idea

23. Deanonymisation of clients in Bitcoin P2P network

25. Content and popularity analysis of Tor hidden services

26. Optimal First-Order Boolean Masking for Embedded IoT Devices

27. Attacks and Countermeasures for White-box Designs

31. Alzette: A 64-Bit ARX-box

32. Symmetrically and Asymmetrically Hard Cryptography

33. Findel: Secure Derivative Contracts for Ethereum

34. Side-Channel Attacks Meet Secure Network Protocols

37. Design Strategies for ARX with Provable Bounds: Sparx and LAX

38. Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem

39. Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

40. Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1

41. Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice

42. Cryptanalysis of Feistel Networks with Secret Round Functions

43. Tradeoff Cryptanalysis of Memory-Hard Functions

44. Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE

45. On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure

46. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay

47. Differential Analysis of Block Ciphers SIMON and SPECK

48. Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)

49. Complementing Feistel Ciphers

50. PAEQ: Parallelizable Permutation-Based Authenticated Encryption

Catalog

Books, media, physical & digital resources