J u m p t o c o n t e n t
M a i n m e n u
M a i n m e n u
N a v i g a t i o n
● M a i n p a g e
● C o n t e n t s
● C u r r e n t e v e n t s
● R a n d o m a r t i c l e
● A b o u t W i k i p e d i a
● C o n t a c t u s
● D o n a t e
C o n t r i b u t e
● H e l p
● L e a r n t o e d i t
● C o m m u n i t y p o r t a l
● R e c e n t c h a n g e s
● U p l o a d f i l e
S e a r c h
Search
A p p e a r a n c e
● C r e a t e a c c o u n t
● L o g i n
P e r s o n a l t o o l s
● C r e a t e a c c o u n t
● L o g i n
P a g e s f o r l o g g e d o u t e d i t o r s l e a r n m o r e
● C o n t r i b u t i o n s
● T a l k
( T o p )
1
B i o g r a p h y
2
S e l e c t e d p u b l i c a t i o n s
3
A w a r d s
4
R e f e r e n c e s
5
E x t e r n a l l i n k s
T o g g l e t h e t a b l e o f c o n t e n t s
D m i t r y K h o v r a t o v i c h
A d d l a n g u a g e s
A d d l i n k s
● A r t i c l e
● T a l k
E n g l i s h
● R e a d
● E d i t
● V i e w h i s t o r y
T o o l s
T o o l s
A c t i o n s
● R e a d
● E d i t
● V i e w h i s t o r y
G e n e r a l
● W h a t l i n k s h e r e
● R e l a t e d c h a n g e s
● U p l o a d f i l e
● S p e c i a l p a g e s
● P e r m a n e n t l i n k
● P a g e i n f o r m a t i o n
● C i t e t h i s p a g e
● G e t s h o r t e n e d U R L
● D o w n l o a d Q R c o d e
● W i k i d a t a i t e m
P r i n t / e x p o r t
● D o w n l o a d a s P D F
● P r i n t a b l e v e r s i o n
A p p e a r a n c e
F r o m W i k i p e d i a , t h e f r e e e n c y c l o p e d i a
Dmitry Khovratovich is a Russian cryptographer , currently a Lead Cryptographer for the Dusk Network , researcher for the Ethereum Foundation , and member of the International Association for Cryptologic Research .[1]
Biography
[ edit ]
He developed, together with Alex Biryukov , the Equihash proof-of-work algorithm which is currently being used as consensus mechanism for the Zcash cryptocurrency , and the Argon2 key derivation function, which won the Password Hashing Competition in July 2015.[2]
He is the publisher of several cryptanalysis papers for a number of mainstream cyphers, such as the first cryptanalytic attack on full-round AES-192 and AES-256 which is faster than a brute-force attack ,[3] an attack on the RadioGatún cryptographic primitive,[4] and also the current best cryptanalysis on Skein,[5] a candidate for the SHA-3 competition .
In 2014, he published a research about the deanonymisation of clients in the Bitcoin P2P network [6]
Selected publications
[ edit ]
Egalitarian computing, USENIX 2016, with Alex Biryukov [7]
Argon2 : new generation of memory-hard functions for password hashing and other applications, Euro S&P 2016, with Alex Biryukov and Daniel Dinu[8]
Equihash : Asymmetric Proof-of-Work Based on the Generalized Birthday Problem, NDSS 2016, with Alex Biryukov [9]
Tradeoff Cryptanalysis of Memory-Hard Functions, Asiacrypt 2015, with Alex Biryukov [10]
Rotational Cryptanalysis of ARX Revisited, FSE 2015, with Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld[11]
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key, Asiacrypt 2014, with Alex Biryukov and Charles Bouillaguet[12]
Deanonymisation of Clients in Bitcoin P2P Network , ACM CCS 2014 with Alex Biryukov and Ivan Pustogarov[6]
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 , FSE 2014, with Leo Perrin[13]
PAEQ: Parallelizable Permutation-Based Authenticated Encryption, ISC 2014, with Alex Biryukov [14]
Key Wrapping with a Fixed Permutation, CT-RSA 2014.[15]
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings, Asiacrypt '12, 2012[16]
New Preimage Attacks against Reduced SHA-1 , Crypto'12, 2012. With Simon Knellwolf[17]
Narrow-Bicliques: Cryptanalysis of the Full IDEA, Eurocrypt '12, 2012. With Gaetan Leurent and Christian Rechberger[18]
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family, FSE'12, 2012. With Christian Rechberger and Alexandra Savelieva[5]
Biclique Cryptanalysis of the Full AES , Asiacrypt '11, 2011. With Andrey Bogdanov and Christian Rechberger[19]
Rotational Rebound Attacks on Reduced Skein , Asiacrypt '10, 2010. With Ivica Nikolic and Christian Rechberger[20]
Rotational Cryptanalysis of ARX, FSE'10, 2010. With Ivica Nikolic[21]
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds. With Alex Biryukov , Orr Dunkelman , Nathan Keller, and Adi Shamir [22]
Related-Key Attack on the Full AES-192 and AES-256 . With Alex Biryukov [3]
Meet-in-the-Middle Attacks on SHA-3 Candidates. FSE'2009. With Ralf-Philipp Weinmann and Ivica Nikolić[23]
Awards
[ edit ]
Winner of LuxBlockHackathon 2017[24]
Winner of Password Hashing Competition (2014–2015)[citation needed ]
Best Paper Award Asiacrypt 2010[25]
Best PhD Thesis, University of Luxembourg (2012)[26]
References
[ edit ]
^ a b Biryukov, Alex; Khovratovich, Dmitry (2009-12-02). "Related-Key Cryptanalysis of the Full AES-192 and AES-256". Advances in Cryptology – ASIACRYPT 2009 . Lecture Notes in Computer Science. Vol. 5912. Springer-Verlag. pp. 1–18. doi :10.1007/978-3-642-10366-7_1 . ISBN 9783642103650 . S2CID 2938420 .
^ Khovratovich, Dmitry (2008-12-14). "Two Attacks on RadioGatún" . Progress in Cryptology - INDOCRYPT 2008 . Lecture Notes in Computer Science. Vol. 5365. pp. 53–66. doi :10.1007/978-3-540-89754-5_5 . ISBN 978-3-540-89753-8 .
^ a b Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra (2011). "Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family". Fast Software Encryption . Lecture Notes in Computer Science. Vol. 7549. pp. 244–263. doi :10.1007/978-3-642-34047-5_15 . ISBN 978-3-642-34046-8 . S2CID 32262663 .
^ a b Biryukov, Alex; Khovratovich, Dmitry; Pustogarov, Ivan (2014-11-03). "Deanonymisation of Clients in Bitcoin P2P Network". Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security . ACM. pp. 15–29. arXiv :1405.7418 . doi :10.1145/2660267.2660379 . ISBN 9781450329576 . S2CID 207217947 .
^ Biryukov, Alex; Khovratovich, Dmitry (2016-08-10). Egalitarian computing . USENIX Association. pp. 315–326. ISBN 9781931971324 .
^ "Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications – IEEE Conference Publication" . doi :10.1109/EuroSP.2016.31 . S2CID 15014453 .
^ Biryukov, Alex; Khovratovich, Dmitry (2017-04-28). "Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem" . Ledger . 2 : 1–30. doi :10.5195/LEDGER.2017.48 . ISSN 2379-5980 .
^ Alex, Biryukov; Dmitry, Khovratovich (December 2015). Tradeoff Cryptanalysis of Memory-Hard Functions . Springer. ISBN 9783662487990 .
^ "Rotational Cryptanalysis of ARX Revisited" . www.iacr.org . Retrieved 2018-10-15 .
^ Biryukov, Alex; Bouillaguet, Charles; Khovratovich, Dmitry (2014), "Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)", Advances in Cryptology – ASIACRYPT 2014 , Lecture Notes in Computer Science, vol. 8874, Springer Berlin Heidelberg, pp. 63–84, doi :10.1007/978-3-662-45611-8_4 , ISBN 9783662456101
^ Perrin, Léo; Khovratovich, Dmitry (2015), "Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64", Fast Software Encryption , Lecture Notes in Computer Science, vol. 8540, Springer Berlin Heidelberg, pp. 82–103, CiteSeerX 10.1.1.646.5918 , doi :10.1007/978-3-662-46706-0_5 , ISBN 9783662467053
^ Biryukov, Alex; Khovratovich, Dmitry (2014-10-12). "PAEQ: Parallelizable Permutation-Based Authenticated Encryption". Information Security . Lecture Notes in Computer Science. Vol. 8783. pp. 72–89. doi :10.1007/978-3-319-13257-0_5 . ISBN 978-3-319-13256-3 .
^ Khovratovich, Dmitry (2014-02-25). "Key Wrapping with a Fixed Permutation" . Topics in Cryptology – CT-RSA 2014 . Lecture Notes in Computer Science. Vol. 8366. pp. 481–499. CiteSeerX 10.1.1.301.8763 . doi :10.1007/978-3-319-04852-9_25 . ISBN 978-3-319-04851-2 .
^ Khovratovich, Dmitry (2012-12-02). "Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings" . Advances in Cryptology – ASIACRYPT 2012 . Asiacrypt'12. Vol. 7658. Springer-Verlag. pp. 544–561. doi :10.1007/978-3-642-34961-4_33 . ISBN 9783642349607 .
^ Knellwolf, Simon; Khovratovich, Dmitry (2012), "New Preimage Attacks against Reduced SHA-1", Advances in Cryptology – CRYPTO 2012 , Lecture Notes in Computer Science, vol. 7417, Springer Berlin Heidelberg, pp. 367–383, doi :10.1007/978-3-642-32009-5_22 , ISBN 9783642320088
^ "Narrow-Bicliques: cryptanalysis of full IDEA" . ResearchGate . Retrieved 2018-10-15 .
^ Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian (2011-12-04). "Biclique Cryptanalysis of the Full AES". Advances in Cryptology – ASIACRYPT 2011 . Lecture Notes in Computer Science. Vol. 7073. Springer-Verlag. pp. 344–371. doi :10.1007/978-3-642-25385-0_19 . ISBN 9783642253843 .
^ Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian (2010-02-12). "Rotational Rebound Attacks on Reduced Skein". Advances in Cryptology - ASIACRYPT 2010 . Lecture Notes in Computer Science. Vol. 27. pp. 1–19. doi :10.1007/978-3-642-17373-8_1 . ISBN 978-3-642-17372-1 .
^ Khovratovich, Dmitry; Nikolić, Ivica (2010-06-27). "Rotational Cryptanalysis of ARX". Fast Software Encryption . Lecture Notes in Computer Science. Vol. 6147. pp. 333–346. doi :10.1007/978-3-642-13858-4_19 . ISBN 978-3-642-13857-7 .
^ Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi (2010-05-30). "Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds". Advances in Cryptology – EUROCRYPT 2010 . Lecture Notes in Computer Science. Vol. 6110. Springer-Verlag. pp. 299–319. doi :10.1007/978-3-642-13190-5_15 . ISBN 978-3642131899 .
^ Khovratovich, Dmitry; Nikolic, Ivica; Weinmann, Ralf-Philipp (2009-02-22). "Meet-in-the-Middle Attacks on SHA-3 Candidates". Fast Software Encryption . Lecture Notes in Computer Science. Vol. 5665. pp. 228–245. doi :10.1007/978-3-642-03317-9_14 . ISBN 978-3-642-03316-2 .
^ "Université du Luxembourg – SnT Team Wins Big at Hackathon" . wwwen.uni.lu . Retrieved 2018-10-15 .
^ "dblp: ASIACRYPT 2010" . dblp.org . Retrieved 2018-10-15 .
^ Luxembourg, Université du. "Prix de la meilleure thèse pour un cryptographe russe" . Université du Luxembourg . Retrieved 2018-10-15 .
External links
[ edit ]
R e t r i e v e d f r o m " https://en.wikipedia.org/w/index.php?title=Dmitry_Khovratovich&oldid=1222592792 "
C a t e g o r i e s :
● L i v i n g p e o p l e
● M o s c o w S t a t e U n i v e r s i t y a l u m n i
● R u s s i a n c r y p t o g r a p h e r s
H i d d e n c a t e g o r i e s :
● C S 1 e r r o r s : m i s s i n g p e r i o d i c a l
● C S 1 e r r o r s : p e r i o d i c a l i g n o r e d
● A r t i c l e s w i t h s h o r t d e s c r i p t i o n
● S h o r t d e s c r i p t i o n m a t c h e s W i k i d a t a
● A r t i c l e s w i t h h C a r d s
● A l l a r t i c l e s w i t h u n s o u r c e d s t a t e m e n t s
● A r t i c l e s w i t h u n s o u r c e d s t a t e m e n t s f r o m N o v e m b e r 2 0 2 3
● A r t i c l e s w i t h A C M - D L i d e n t i f i e r s
● A r t i c l e s w i t h D B L P i d e n t i f i e r s
● A r t i c l e s w i t h G o o g l e S c h o l a r i d e n t i f i e r s
● A r t i c l e s w i t h M A T H S N i d e n t i f i e r s
● A r t i c l e s w i t h M G P i d e n t i f i e r s
● A r t i c l e s w i t h S c o p u s i d e n t i f i e r s
● A r t i c l e s w i t h Z B M A T H i d e n t i f i e r s
● Y e a r o f b i r t h m i s s i n g ( l i v i n g p e o p l e )
● T h i s p a g e w a s l a s t e d i t e d o n 6 M a y 2 0 2 4 , a t 2 0 : 2 9 ( U T C ) .
● T e x t i s a v a i l a b l e u n d e r t h e C r e a t i v e C o m m o n s A t t r i b u t i o n - S h a r e A l i k e L i c e n s e 4 . 0 ;
a d d i t i o n a l t e r m s m a y a p p l y . B y u s i n g t h i s s i t e , y o u a g r e e t o t h e T e r m s o f U s e a n d P r i v a c y P o l i c y . W i k i p e d i a ® i s a r e g i s t e r e d t r a d e m a r k o f t h e W i k i m e d i a F o u n d a t i o n , I n c . , a n o n - p r o f i t o r g a n i z a t i o n .
● P r i v a c y p o l i c y
● A b o u t W i k i p e d i a
● D i s c l a i m e r s
● C o n t a c t W i k i p e d i a
● C o d e o f C o n d u c t
● D e v e l o p e r s
● S t a t i s t i c s
● C o o k i e s t a t e m e n t
● M o b i l e v i e w