Alex Biryukov is a cryptographer, currently a full professor at the University of Luxembourg. His notable work includes the design of the stream cipher LEX, as well as the cryptanalysis of numerous cryptographic primitives. In 1998, he developed impossible differential cryptanalysis together with Eli Biham and Adi Shamir.[1] In 1999, he developed the slide attack together with David Wagner. In 2009 he developed, together with Dmitry Khovratovich, the first cryptanalytic attack on full-round AES-192 and AES-256 that is faster than a brute-force attack.[2] In 2015 he developed the Argon2 key derivation function with Daniel Dinu and Dmitry Khovratovich.[3] Since 1994 Alex Biryukov is a member of the International Association for Cryptologic Research.
References
- ↑ Bruce Schneier (15 September 1998). "Impossible Cryptanalysis and Skipjack". Crypto-Gram Newsletter.
- ↑ Alex Biryukov; Dmitry Khovratovich (28 June 2009). "Related-key Cryptanalysis of the Full AES-192 and AES-256" (PDF). Retrieved 3 July 2009.
- ↑ Alex Biryukov; Daniel Dinu; Dmitry Khovratovich (26 December 2015). "Argon2: the memory-hard function for password hashing and other applications" (PDF).
External links
- Alex Biryukov’s current page at the University of Luxembourg(in English)
- CryptoLUX > Alex Biryukov(in English)
- Alex Biryukov's old home page at K.U. Leuven(in English)
- Alex Biryukov - Google Scholar Citations(in English)