Dmitry Khovratovich
Dmitry Khovratovich
Ethereum Foundation
Verified email at - Homepage
Cited by
Cited by
Biclique cryptanalysis of the full AES
A Bogdanov, D Khovratovich, C Rechberger
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
Deanonymisation of clients in Bitcoin P2P network
A Biryukov, D Khovratovich, I Pustogarov
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Related-key cryptanalysis of the full AES-192 and AES-256
A Biryukov, D Khovratovich
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
Distinguisher and related-key attack on the full AES-256
A Biryukov, D Khovratovich, I Nikolić
Annual International Cryptology Conference, 231-249, 2009
Poseidon: A new hash function for {Zero-Knowledge} proof systems
L Grassi, D Khovratovich, C Rechberger, A Roy, M Schofnegger
30th USENIX Security Symposium (USENIX Security 21), 519-535, 2021
Argon2: new generation of memory-hard functions for password hashing and other applications
A Biryukov, D Dinu, D Khovratovich
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 292-302, 2016
Triathlon of lightweight block ciphers for the internet of things
D Dinu, YL Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering 9, 283-302, 2019
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
D Khovratovich, C Rechberger, A Savelieva
International Workshop on Fast Software Encryption, 244-263, 2012
Rotational cryptanalysis of ARX
D Khovratovich, I Nikolić
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
Equihash: Asymmetric proof-of-work based on the generalized birthday problem
A Biryukov, D Khovratovich
Ledger 2, 1-30, 2017
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key
A Biryukov, C Bouillaguet, D Khovratovich
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
FELICS-fair evaluation of lightweight cryptographic systems
D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin
NIST Workshop on Lightweight Cryptography 128, 2015
New state recovery attack on RC4
A Maximov, D Khovratovich
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
Aggregatable subvector commitments for stateless cryptocurrencies
A Tomescu, I Abraham, V Buterin, J Drake, D Feist, D Khovratovich
International Conference on Security and Cryptography for Networks, 45-64, 2020
Rotational rebound attacks on reduced Skein
D Khovratovich, I Nikolić, C Rechberger
Journal of cryptology 27, 452-479, 2014
Narrow-bicliques: cryptanalysis of full IDEA
D Khovratovich, G Leurent, C Rechberger
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MR Albrecht, C Cid, L Grassi, D Khovratovich, R Lüftenegger, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
Findel: Secure derivative contracts for ethereum
A Biryukov, D Khovratovich, S Tikhomirov
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
Key recovery attacks of practical complexity on AES variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Cryptology ePrint Archive, 2009
The system can't perform the operation now. Try again later.
Articles 1–20