Biclique cryptanalysis of the full AES A Bogdanov, D Khovratovich, C Rechberger Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 825 | 2011 |
Deanonymisation of clients in Bitcoin P2P network A Biryukov, D Khovratovich, I Pustogarov Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 800 | 2014 |
Related-key cryptanalysis of the full AES-192 and AES-256 A Biryukov, D Khovratovich Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 708 | 2009 |
Distinguisher and related-key attack on the full AES-256 A Biryukov, D Khovratovich, I Nikolić Annual International Cryptology Conference, 231-249, 2009 | 453 | 2009 |
Poseidon: A new hash function for {Zero-Knowledge} proof systems L Grassi, D Khovratovich, C Rechberger, A Roy, M Schofnegger 30th USENIX Security Symposium (USENIX Security 21), 519-535, 2021 | 345 | 2021 |
Argon2: new generation of memory-hard functions for password hashing and other applications A Biryukov, D Dinu, D Khovratovich 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 292-302, 2016 | 252 | 2016 |
Triathlon of lightweight block ciphers for the internet of things D Dinu, YL Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov Journal of Cryptographic Engineering 9, 283-302, 2019 | 228 | 2019 |
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 209 | 2010 |
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family D Khovratovich, C Rechberger, A Savelieva International Workshop on Fast Software Encryption, 244-263, 2012 | 206 | 2012 |
Rotational cryptanalysis of ARX D Khovratovich, I Nikolić Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 190 | 2010 |
Equihash: Asymmetric proof-of-work based on the generalized birthday problem A Biryukov, D Khovratovich Ledger 2, 1-30, 2017 | 170 | 2017 |
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key A Biryukov, C Bouillaguet, D Khovratovich Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 160 | 2014 |
FELICS-fair evaluation of lightweight cryptographic systems D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin NIST Workshop on Lightweight Cryptography 128, 2015 | 114 | 2015 |
New state recovery attack on RC4 A Maximov, D Khovratovich Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 109 | 2008 |
Aggregatable subvector commitments for stateless cryptocurrencies A Tomescu, I Abraham, V Buterin, J Drake, D Feist, D Khovratovich International Conference on Security and Cryptography for Networks, 45-64, 2020 | 96 | 2020 |
Rotational rebound attacks on reduced Skein D Khovratovich, I Nikolić, C Rechberger Journal of cryptology 27, 452-479, 2014 | 92 | 2014 |
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC MR Albrecht, C Cid, L Grassi, D Khovratovich, R Lüftenegger, ... Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 89 | 2019 |
Narrow-bicliques: cryptanalysis of full IDEA D Khovratovich, G Leurent, C Rechberger Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 89 | 2012 |
Findel: Secure derivative contracts for ethereum A Biryukov, D Khovratovich, S Tikhomirov Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 82 | 2017 |
Key recovery attacks of practical complexity on AES variants with up to 10 rounds A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir Cryptology ePrint Archive, 2009 | 64 | 2009 |