Dmitry Khovratovich
Dmitry Khovratovich
ABDK Consulting and Evernym, Inc. and Dusk Network
Verified email at abdkconsulting.com
TitleCited byYear
Biclique cryptanalysis of the full AES
A Bogdanov, D Khovratovich, C Rechberger
International Conference on the Theory and Application of Cryptology and …, 2011
5402011
Related-key cryptanalysis of the full AES-192 and AES-256
A Biryukov, D Khovratovich
International Conference on the Theory and Application of Cryptology and …, 2009
4512009
Distinguisher and related-key attack on the full AES-256
A Biryukov, D Khovratovich, I Nikolić
Annual International Cryptology Conference, 231-249, 2009
3422009
Deanonymisation of clients in Bitcoin P2P network
A Biryukov, D Khovratovich, I Pustogarov
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2622014
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Annual International Conference on the Theory and Applications of …, 2010
2042010
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
D Khovratovich, C Rechberger, A Savelieva
International Workshop on Fast Software Encryption, 244-263, 2012
1502012
Rotational cryptanalysis of ARX
D Khovratovich, I Nikolić
International Workshop on Fast Software Encryption, 333-346, 2010
1342010
New state recovery attack on RC4
A Maximov, D Khovratovich
Annual International Cryptology Conference, 297-316, 2008
992008
Triathlon of lightweight block ciphers for the internet of things
D Dinu, Y Le Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering 9 (3), 283-302, 2019
882019
Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key
A Biryukov, C Bouillaguet, D Khovratovich
International Conference on the Theory and Application of Cryptology and …, 2014
802014
Equihash: Asymmetric proof-of-work based on the generalized birthday problem
A Biryukov, D Khovratovich
Ledger 2, 1-30, 2017
752017
Argon2: new generation of memory-hard functions for password hashing and other applications
A Biryukov, D Dinu, D Khovratovich
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 292-302, 2016
712016
Narrow-Bicliques: cryptanalysis of full IDEA
D Khovratovich, G Leurent, C Rechberger
Annual International Conference on the Theory and Applications of …, 2012
692012
Rotational rebound attacks on reduced Skein
D Khovratovich, I Nikolić, C Rechberger
International Conference on the Theory and Application of Cryptology and …, 2010
662010
Cryptographic hash function Edon-R′
D Gligoroski, RS Ødegård, M Mihova, SJ Knapskog, A Drápal, V Klima, ...
2009 Proceedings of the 1st International Workshop on Security and …, 2009
352009
Two new techniques of side-channel cryptanalysis
A Biryukov, D Khovratovich
International Workshop on Cryptographic Hardware and Embedded Systems, 195-208, 2007
352007
Tradeoff cryptanalysis of memory-hard functions
A Biryukov, D Khovratovich
International Conference on the Theory and Application of Cryptology and …, 2015
312015
Felics–fair evaluation of lightweight cryptographic systems
D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin
NIST Workshop on Lightweight Cryptography 128, 2015
302015
Speeding up collision search for byte-oriented hash functions
D Khovratovich, A Biryukov, I Nikolic
Cryptographers’ Track at the RSA Conference, 164-181, 2009
292009
Cryptanalysis of Luffa v2 components
D Khovratovich, M Naya-Plasencia, A Röck, M Schläffer
International Workshop on Selected Areas in Cryptography, 388-409, 2010
282010
The system can't perform the operation now. Try again later.
Articles 1–20