Dmitry Khovratovich
Dmitry Khovratovich
Ethereum Foundation and Dusk Network
Verified email at abdkconsulting.com
Title
Cited by
Cited by
Year
Biclique cryptanalysis of the full AES
A Bogdanov, D Khovratovich, C Rechberger
International conference on the theory and application of cryptology and …, 2011
6122011
Related-key cryptanalysis of the full AES-192 and AES-256
A Biryukov, D Khovratovich
International Conference on the Theory and Application of Cryptology and …, 2009
5272009
Deanonymisation of clients in Bitcoin P2P network
A Biryukov, D Khovratovich, I Pustogarov
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3812014
Distinguisher and related-key attack on the full AES-256
A Biryukov, D Khovratovich, I Nikolić
Annual International Cryptology Conference, 231-249, 2009
3792009
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Annual International Conference on the Theory and Applications of …, 2010
2242010
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
D Khovratovich, C Rechberger, A Savelieva
International Workshop on Fast Software Encryption, 244-263, 2012
1652012
Rotational cryptanalysis of ARX
D Khovratovich, I Nikolić
International Workshop on Fast Software Encryption, 333-346, 2010
1532010
Triathlon of lightweight block ciphers for the internet of things
D Dinu, Y Le Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering 9 (3), 283-302, 2019
1212019
Argon2: new generation of memory-hard functions for password hashing and other applications
A Biryukov, D Dinu, D Khovratovich
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 292-302, 2016
1132016
New state recovery attack on RC4
A Maximov, D Khovratovich
Annual International Cryptology Conference, 297-316, 2008
992008
Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key
A Biryukov, C Bouillaguet, D Khovratovich
International Conference on the Theory and Application of Cryptology and …, 2014
982014
Equihash: Asymmetric proof-of-work based on the generalized birthday problem
A Biryukov, D Khovratovich
Ledger 2, 1-30, 2017
952017
Narrow-bicliques: cryptanalysis of full IDEA
D Khovratovich, G Leurent, C Rechberger
Annual International Conference on the Theory and Applications of …, 2012
792012
Rotational rebound attacks on reduced Skein
D Khovratovich, I Nikolić, C Rechberger
International Conference on the Theory and Application of Cryptology and …, 2010
732010
Felics–fair evaluation of lightweight cryptographic systems
D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin
NIST Workshop on Lightweight Cryptography 128, 2015
482015
Cryptographic hash function Edon-R′
D Gligoroski, RS Ødegård, M Mihova, SJ Knapskog, A Drápal, V Klima, ...
2009 Proceedings of the 1st International Workshop on Security and …, 2009
412009
Findel: Secure derivative contracts for Ethereum
A Biryukov, D Khovratovich, S Tikhomirov
International Conference on Financial Cryptography and Data Security, 453-467, 2017
382017
Two new techniques of side-channel cryptanalysis
A Biryukov, D Khovratovich
International Workshop on Cryptographic Hardware and Embedded Systems, 195-208, 2007
372007
Multiset-algebraic cryptanalysis of reduced Kuznyechik, Khazad, and secret SPNs
A Biryukov, D Khovratovich, LP Perrin
IACR Transactions on Symmetric Cryptology 2016 (2), 226-247, 2016
35*2016
Tradeoff cryptanalysis of memory-hard functions
A Biryukov, D Khovratovich
International Conference on the Theory and Application of Cryptology and …, 2015
342015
The system can't perform the operation now. Try again later.
Articles 1–20