Difference between revisions of "Dmitry Khovratovich"

From CryptoLUX
Jump to: navigation, search
(Main publications)
(Main publications)
Line 8: Line 8:
 
* [[Media:Rotarx.pdf| '''Rotational Cryptanalysis of ARX Revisited''']], FSE 2015, with  Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
 
* [[Media:Rotarx.pdf| '''Rotational Cryptanalysis of ARX Revisited''']], FSE 2015, with  Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
 
* [[Media:White-proc.pdf| '''Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key''']], Asiacrypt 2014, with Alex Biryukov and Charles Bouillaguet
 
* [[Media:White-proc.pdf| '''Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key''']], Asiacrypt 2014, with Alex Biryukov and Charles Bouillaguet
* [[Media:Bitcoin.pdf| '''Deanonymisation of Clients in Bitcoin P2P Network'''], ACM CCS 2014 with Alex Biryukov and Ivan Pustogarov
+
* [[Media:Bitcoin.pdf| '''Deanonymisation of Clients in Bitcoin P2P Network''']], ACM CCS 2014 with Alex Biryukov and Ivan Pustogarov
 
* ''Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64'', FSE 2014, with Leo Perrin
 
* ''Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64'', FSE 2014, with Leo Perrin
 
* [[Media:Paeq-full.pdf| '''PAEQ: Parallelizable Permutation-Based Authenticated Encryption''']], ISC 2014, with Alex Biryukov
 
* [[Media:Paeq-full.pdf| '''PAEQ: Parallelizable Permutation-Based Authenticated Encryption''']], ISC 2014, with Alex Biryukov

Revision as of 09:28, 22 May 2016

Dmitry Khovratovich is a post-doctoral researcher since January 2013. He specializes in the design and cryptanalysis of symmetric primitives, e.g. hash functions and block ciphers. Dmitry is also interested in the practical aspects of cryptography: electronic currencies, tamper-proof designs, etc.. Dmitry is an author of the first attacks on the AES block cipher in various models, the best attacks on Skein, SHA-1 and SHA-2 hash functions, the attacks on the full versions of ALE, Grindahl-512, Luffa, and many others.

Main publications

Presentations

Program Committees

  • FSE 2015, 2014, 2013, 2012
  • EUROCRYPT 2013
  • Indocrypt 2014
  • CT-RSA 2015

See also

  • Nonrandomness of 33 rounds of MD6