Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials E Biham, A Biryukov, A Shamir Journal of Cryptology 18 (4), 291-311, 2005 | 906* | 2005 |
Real Time Cryptanalysis of A5/1 on a PC A Biryukov, A Shamir, D Wagner Fast Software Encryption, 37-44, 2001 | 820 | 2001 |
Deanonymisation of clients in Bitcoin P2P network A Biryukov, D Khovratovich, I Pustogarov Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 800 | 2014 |
Related-key Cryptanalysis of the Full AES-192 and AES-256 A Biryukov, D Khovratovich Advances in Cryptology–ASIACRYPT 2009, 1-18, 2009 | 708 | 2009 |
Slide attacks A Biryukov, D Wagner Fast Software Encryption, 245-259, 1999 | 546 | 1999 |
Cryptanalytic time/memory/data tradeoffs for stream ciphers A Biryukov, A Shamir Advances in Cryptology—ASIACRYPT 2000, 1-13, 2000 | 531 | 2000 |
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) A Biryukov, D Khovratovich, I Nikolić Advances in Cryptology-CRYPTO 2009, 231-249, 2009 | 453* | 2009 |
Advanced slide attacks A Biryukov, D Wagner Advances in Cryptology—EUROCRYPT 2000, 589-606, 2000 | 345 | 2000 |
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization A Biryukov, I Pustogarov, RP Weinmann IEEE Symposium on Security and Privacy (S&P), 80 - 94, 2013 | 316 | 2013 |
Argon2: new generation of memory-hard functions for password hashing and other applications A Biryukov, D Dinu, D Khovratovich 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 292-302, 2016 | 305* | 2016 |
Bitcoin over Tor isn't a good idea A Biryukov, I Pustogarov 36th IEEE Symposium on Security and Privacy, 122 - 134, 2015 | 296 | 2015 |
Miss in the Middle Attacks on IDEA and Khufu E Biham, A Biryukov, A Shamir Fast Software Encryption, 124-138, 1999 | 262 | 1999 |
On multiple linear approximations A Biryukov, C De Canniere, M Quisquater Advances in Cryptology–CRYPTO 2004, 1-22, 2004 | 251 | 2004 |
Structural cryptanalysis of SASAS A Biryukov, A Shamir Advances in Cryptology—EUROCRYPT 2001, 395-405, 2001 | 236 | 2001 |
A toolbox for cryptanalysis: Linear and affine equivalence algorithms A Biryukov, C De Canniere, A Braeken, B Preneel Advances in Cryptology—EUROCRYPT 2003, 33-50, 2003 | 228 | 2003 |
Triathlon of Lightweight Block Ciphers for the Internet of Things D Dinu, Y Le Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov Journal of Cryptographic Engineering, 1-20, 2018 | 227 | 2018 |
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir Advances in Cryptology–EUROCRYPT 2010, 299-319, 2010 | 214 | 2010 |
Differential analysis of block ciphers SIMON and SPECK A Biryukov, A Roy, V Velichkov Fast Software Encryption, 546-570, 2014 | 206 | 2014 |
State of the Art in Lightweight Symmetric Cryptography A Biryukov, LP Perrin FSTC/SnT, University of Luxembourg, 2017 | 198 | 2017 |
Content and popularity analysis of Tor hidden services A Biryukov, I Pustogarov, F Thill, RP Weinmann Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th …, 2014 | 197 | 2014 |