Profil

KHOVRATOVICH Dmitry

Main Referenced Co-authors
BIRYUKOV, Alex  (22)
DINU, Dumitru-Daniel  (6)
PERRIN, Léo Paul  (5)
GROSZSCHÄDL, Johann  (3)
LE CORRE, Yann  (3)
Main Referenced Keywords
AES (4); memory-hard (4); Block Ciphers (3); Lightweight Cryptography (3); blockchain (2);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX (2)
Main Referenced Disciplines
Computer science (27)
Finance (1)

Publications (total 27)

The most downloaded
14078 downloads
Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. https://hdl.handle.net/10993/18679

The most cited

349 citations (Scopus®)

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. https://hdl.handle.net/10993/18679

Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (September 2019). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering, 9 (3), 283-302. doi:10.1007/s13389-018-0193-x
Peer reviewed

Biryukov, A., Feher, D., & Khovratovich, D. (2017). Guru: Universal Reputation Module for Distributed Consensus Protocols. Luxembourg, Luxembourg: University of Luxembourg.

Biryukov, A., Khovratovich, D., & Tikhomirov, S. (07 April 2017). Findel: Secure Derivative Contracts for Ethereum [Paper presentation]. 1st Workshop on Trusted Smart Contracts (In Association with Financial Cryptography and Data Security 2017), Sliema, Malta.

Biryukov, A., & Khovratovich, D. (2016). Equihash: asymmetric proof-of-work based on the Generalized Birthday problem. In Proceedings of NDSS 2016 (pp. 13).
Peer reviewed

Biryukov, A., Khovratovich, D., & Perrin, L. P. (2016). Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Transactions on Symmetric Cryptology, 2016 (2), 226-247. doi:10.13154/tosc.v2016.i2.226-247
Peer Reviewed verified by ORBi

Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2016). Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. In IEEE European Symposium on Security and Privacy (pp. 292-302). doi:10.1109/EuroSP.2016.31
Peer reviewed

Biryukov, A., & Khovratovich, D. (2016). Egalitarian computing. USENIX Security 2016.
Peer reviewed

Biryukov, A., & Khovratovich, D. (2015). Tradeoff Cryptanalysis of Memory-Hard Functions. In 21st International Conference on the Theory and Application of Cryptology and Information Security. Springer. doi:10.1007/978-3-662-48800-3_26
Peer reviewed

Biryukov, A., Khovratovich, D., Dinu, D.-D., & Josefsson, S. (2015). The memory-hard Argon2 password hash function. (Network Working Group / Internet-Draft). IETF.

Dinu, D.-D., Biryukov, A., Groszschädl, J., Khovratovich, D., Le Corre, Y., & Perrin, L. P. (July 2015). FELICS - Fair Evaluation of Lightweight Cryptographic Systems [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland.

Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (July 2015). Triathlon of Lightweight Block Ciphers for the Internet of Things [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland.

Khovratovich, D., Nikolic, I., Pieprzyk, J., Sokolowski, P., & Steinfeld, R. (2015). Rotational Cryptanalysis of ARX Revisited. In Fast Software Encryption - 22nd International Workshop, FSE 2015 Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Springer. doi:10.1007/978-3-662-48116-5_25
Peer reviewed

Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2015). Argon and Argon2. Password Hashing Competition (PHC).

Biryukov, A., Bouillaguet, C., & Khovratovich, D. (2014). Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. In 20th International Conference on the Theory and Application of Cryptology and Information Security. Springer International Publishing.
Peer reviewed

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM.
Peer reviewed

Biryukov, A., & Khovratovich, D. (2014). PAEQ: Parallelizable Permutation-Based Authenticated Encryption. In 17th Information Security Conference. Springer International Publishing.
Peer reviewed

Perrin, L. P., & Khovratovich, D. (2014). Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. In Fast Software Encryption - 21th International Workshop, FSE 2014, London, March 3-5, 2014 (pp. 82-103). Springer. doi:10.1007/978-3-662-46706-0_5
Peer reviewed

Khovratovich, D. (2014). Key Wrapping with a Fixed Permutation. In Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings (pp. 481-499).
Peer reviewed

Khovratovich, D. (2010). New approaches to the cryptanalysis of symmetric primitives [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/15443

Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., & Shamir, A. (2010). Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. In EUROCRYPT 2010 (pp. 299-319). Springer.
Peer reviewed

Khovratovich, D., & Nikolic, I. (2010). Rotational Cryptanalysis of ARX. In Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea (pp. 333-346).
Peer reviewed

Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., Nikolic, I., Pieprzyk, J., & Wang, H. (2009). Cryptanalysis of the LAKE Hash Family. In Fast Software Encryption (pp. 156-179). Springer. doi:10.1007/978-3-642-03317-9_10
Peer reviewed

Khovratovich, D., Biryukov, A., & Nikolic, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11
Peer reviewed

Biryukov, A., & Khovratovich, D. (2009). Related-Key Cryptanalysis of the Full AES-192 and AES-256. In ASIACRYPT 2009 (pp. 1-18). Springer.
Peer reviewed

Biryukov, A., Khovratovich, D., & Nikolic, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14
Peer reviewed

Biryukov, A., Bogdanov, A., Khovratovich, D., & Kasper, T. (2007). Collision Attacks on AES-Based MAC: Alpha-MAC. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 166-180). Springer.
Peer reviewed

Biryukov, A., & Khovratovich, D. (2007). Two New Techniques of Side-Channel Cryptanalysis. In Cryptographic Hardware and Embedded Systems - CHES 2007 (pp. 195-208). doi:10.1007/978-3-540-74735-2_14
Peer reviewed

Contact ORBilu