Difference between revisions of "Dmitry Khovratovich"

From CryptoLUX
Jump to: navigation, search
(Main publications)
Line 1: Line 1:
Dmitry Khovratovich is a post-doctoral researcher since January 2012. He specializes in the design and cryptanalysis of symmetric primitives, e.g. hash functions and block ciphers. Dmitry is also interested in the practical aspects of cryptography: electronic currencies, tamper-proof designs, etc.. Dmitry is an author of the first attacks on the AES block cipher in various models, the best attacks on Skein, SHA-1 and SHA-2 hash functions, the attacks on the full versions of ALE, Grindahl-512, Luffa, and many others.
+
Dmitry Khovratovich is a post-doctoral researcher since January 2013. He specializes in the design and cryptanalysis of symmetric primitives, e.g. hash functions and block ciphers. Dmitry is also interested in the practical aspects of cryptography: electronic currencies, tamper-proof designs, etc.. Dmitry is an author of the first attacks on the AES block cipher in various models, the best attacks on Skein, SHA-1 and SHA-2 hash functions, the attacks on the full versions of ALE, Grindahl-512, Luffa, and many others.
  
 
===Main publications===
 
===Main publications===
Line 10: Line 10:
 
* ''Biclique Cryptanalysis of the Full AES'', Asiacrypt'11, 2011. With Andrey Bogdanov and Christian Rechberger.
 
* ''Biclique Cryptanalysis of the Full AES'', Asiacrypt'11, 2011. With Andrey Bogdanov and Christian Rechberger.
 
* ''Rotational Rebound Attacks on Reduced Skein'', Asiacrypt'10, 2010. With Ivica Nikolic and Christian Rechberger. BEST PAPER AWARD.
 
* ''Rotational Rebound Attacks on Reduced Skein'', Asiacrypt'10, 2010. With Ivica Nikolic and Christian Rechberger. BEST PAPER AWARD.
 +
* ''Rotational Cryptanalysis of ARX'', FSE'10, 2010. With Ivica Nikolic.
 +
* ''Cryptanalysis of Luffa v2 Components'', SAC'10, 2010. With María Naya-Plasencia, Andrea Röck, and Martin Schläffer.
 
* [[Media:AES Practical V12.pdf| '''Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds''']]. With [[Alex Biryukov|Alex Biryukov]], Orr Dunkelman, Nathan Keller, and Adi Shamir.  
 
* [[Media:AES Practical V12.pdf| '''Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds''']]. With [[Alex Biryukov|Alex Biryukov]], Orr Dunkelman, Nathan Keller, and Adi Shamir.  
 
* [[Media:aes-boom-revised.pdf| '''Related-Key Attack on the Full AES-192 and AES-256'''.]] With [[Alex Biryukov]].
 
* [[Media:aes-boom-revised.pdf| '''Related-Key Attack on the Full AES-192 and AES-256'''.]] With [[Alex Biryukov]].
 
* [[Media:aes-256-ext.pdf| '''Distinguisher and Related-Key Attack on the Full AES-256'''.]] CRYPTO'2009. With [[Alex Biryukov]] and [[Ivica Nikolić]].
 
* [[Media:aes-256-ext.pdf| '''Distinguisher and Related-Key Attack on the Full AES-256'''.]] CRYPTO'2009. With [[Alex Biryukov]] and [[Ivica Nikolić]].
* [[Media:Struct2.pdf| '''Cryptanalysis of hash functions with structures'''.]] SAC'2009.
+
* [[Media:Struct2.pdf| '''Cryptanalysis of hash functions with structures'''.]] SAC'2009.  With [[Alex Biryukov]] and [[Ivica Nikolić]]
 +
* ''Speeding up Collision Search for Byte-Oriented Hash Functions'', CT-RSA'09.  
 
* '''Meet-in-the-Middle Attacks on SHA-3 Candidates'''. FSE'2009. With [[Ralf-Philipp Weinmann]] and [[Ivica Nikolić]].
 
* '''Meet-in-the-Middle Attacks on SHA-3 Candidates'''. FSE'2009. With [[Ralf-Philipp Weinmann]] and [[Ivica Nikolić]].
  

Revision as of 10:52, 5 July 2013

Dmitry Khovratovich is a post-doctoral researcher since January 2013. He specializes in the design and cryptanalysis of symmetric primitives, e.g. hash functions and block ciphers. Dmitry is also interested in the practical aspects of cryptography: electronic currencies, tamper-proof designs, etc.. Dmitry is an author of the first attacks on the AES block cipher in various models, the best attacks on Skein, SHA-1 and SHA-2 hash functions, the attacks on the full versions of ALE, Grindahl-512, Luffa, and many others.

Main publications

Presentations

See also

  • Nonrandomness of 33 rounds of MD6