DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Dmitry Khovratovich
Dmitry Khovratovich
Argon and Argon2
Deanonymisation of Clients in Bitcoin P2P Network
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
Harden Zero Knowledge Password Proofs Against Offline Dictionary
Biclique Cryptanalysis of Full Round AES with Reduced Data Complexity
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Speeding up Collision Search for Byte-Oriented Hash Functions
Argon2: the Memory-Hard Function for Password Hashing and Other Applications
Biclique Cryptanalysis of the Full AES
Tools in Cryptanalysis of Hash Functions Application to SHA-256
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key
SOK: Cryptocurrency Networking Context, State-Of-The-Art, Challenges
Argon2 for Password Hashing and Cryptocurrencies
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
Biclique Cryptanalysis of the Full AES⋆
Rotational Cryptanalysis in the Presence of Constants
Equihash: Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem: Open Review
Sieve-In-The-Middle: Improved MITM Attacks Anne Canteaut, María Naya-Plasencia, Bastien Vayssière
Top View
The Shavite-3 Hash Function Tweaked Version
Egalitarian Computing
Equihash: Asymmetric Proof-Of-Work Based on the Generalized Birthday Problem (Full Version)
Meet-In-The-Middle Attacks on SHA-3 Candidates
Tradeoff Cryptanalysis of Memory-Hard Functions
Rotational Cryptanalysis in the Presence of Constants
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
Constant Time Encryption As a Countermeasure Against Remote Cache Timing Attacks
Dissertation Docteur De L'université Du Luxembourg
Enhanced Advanced Encryption Standard (E-AES): Using ESET
SHA-3 Submission: Skein Hash Function Family Jarrick Goldhamer
Hash Functions in Blockchains
Rotational Cryptanalysis of ARX
SHA-2 Will Soon Retire
Inner For-Loop for Speeding up Blockchain Mining Previous Attempts That Have Failed [2]
Rotational Cryptanalysis of ARX Revisited
Methods of Symmetric Cryptanalysis
Argon2: the Better Password Hashing Function Than Bcrypt
Blockchain Engineering: Challenges and Opportunities for Computer Science Research
Classification of the SHA-3 Candidates
Egalitarian Computing
Tradeoff Cryptanalysis of Memory-Hard Functions
FELICS – Fair Evaluation of Lightweight Cryptographic Systems
Adaptive Restart and CEGAR-Based Solver for Inverting Cryptographic Hash Functions
Advanced Encryption Standard (AES)
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes
Argon2 and Egalitarian Computing
Inflation Propensity of Collatz Orbits: a New Proof-Of-Work for Blockchain Applications
Advanced Encryption Standard - Wikipedia
Cryptrec Ex-2203-2012
Lecture 8: AES: the Advanced Encryption Standard