Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Alex Biryukov
Structural Cryptanalysis of SASAS
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Second-Order Differential Collisions for Reduced SHA-256
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Symmetrically and Asymmetrically Hard Cryptography
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Fundamenta Informaticae
Information Systems
Algebra
Number Theory
Mathematics
Computational Theory
Theoretical Computer Science
Privacy and Linkability of Mining in Zcash
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Miss in the Middle Attacks on IDEA and Khufu
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Improved Cryptanalysis of RC5
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Collision Attacks on AES-Based MAC: Alpha-Mac
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
1
2
›