Dmitry Khovratovich

From Wikipedia, the free encyclopedia
Dmitry Khovratovich
NationalityRussian
Alma materMoscow State University
Occupationcryptographer
Known forEquihash, Argon2

Dmitry Khovratovich is a cryptographer, currently a Lead Cryptographer for the , researcher for the Ethereum Foundation, and member of the International Association for Cryptologic Research.[1] He developed, together with Alex Biryukov, the Equihash Proof-of-work algorithm which is currently being used as consensus mechanism for the Zcash cryptocurrency, and the Argon2 key derivation function, which won the Password Hashing Competition in July 2015.[2]

He is the publisher of several Cryptanalysis papers for a number of mainstream cyphers, such as the first cryptanalytic attack on full-round AES-192 and AES-256 which is faster than a brute-force attack,[3] an attack on the RadioGatún cryptographic primitive,[4] and also the current best cryptanalysis on Skein,[5] a candidate for the SHA-3 competition.

In 2014, he published a research about the deanonymisation of clients in the Bitcoin P2P network[6]

Selected publications[]

  • Egalitarian computing, USENIX 2016, with Alex Biryukov[7]
  • Argon2: new generation of memory-hard functions for password hashing and other applications, Euro S&P 2016, with Alex Biryukov and Daniel Dinu[8]
  • Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem, NDSS 2016, with Alex Biryukov[9]
  • Tradeoff Cryptanalysis of Memory-Hard Functions, Asiacrypt 2015, with Alex Biryukov[10]
  • Rotational Cryptanalysis of ARX Revisited, FSE 2015, with Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld[11]
  • Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key, Asiacrypt 2014, with Alex Biryukov and Charles Bouillaguet[12]
  • Deanonymisation of Clients in Bitcoin P2P Network, ACM CCS 2014 with Alex Biryukov and Ivan Pustogarov[6]
  • Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64, FSE 2014, with Leo Perrin[13]
  • PAEQ: Parallelizable Permutation-Based Authenticated Encryption, ISC 2014, with Alex Biryukov[14]
  • Key Wrapping with a Fixed Permutation, CT-RSA 2014.[15]
  • Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings, Asiacrypt'12, 2012[16]
  • New Preimage Attacks against Reduced SHA-1, Crypto'12, 2012. With Simon Knellwolf[17]
  • Narrow-Bicliques: Cryptanalysis of the Full IDEA, Eurocrypt'12, 2012. With Gaetan Leurent and Christian Rechberger[18]
  • Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family, FSE'12, 2012. With Christian Rechberger and Alexandra Savelieva[5]
  • Biclique Cryptanalysis of the Full AES, Asiacrypt'11, 2011. With Andrey Bogdanov and Christian Rechberger[19]
  • Rotational Rebound Attacks on Reduced Skein, Asiacrypt'10, 2010. With Ivica Nikolic and Christian Rechberger[20]
  • Rotational Cryptanalysis of ARX, FSE'10, 2010. With Ivica Nikolic[21]
  • Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds. With Alex Biryukov, , Nathan Keller, and Adi Shamir[22]
  • Related-Key Attack on the Full AES-192 and AES-256. With Alex Biryukov[3]
  • Meet-in-the-Middle Attacks on SHA-3 Candidates. FSE'2009. With Ralf-Philipp Weinmann and Ivica Nikolić[23]

Awards[]

  • Winner of LuxBlockHackathon 2017[24]
  • Winner of Password Hashing Competition (2014–2015)[25]
  • Best Paper Award Asiacrypt 2010[26]
  • Best PhD Thesis, University of Luxembourg (2012)[27]

External links[]

References[]

  1. ^ "Dmitry Khovratovich". www.iacr.org. Retrieved 2018-10-15.
  2. ^ "Password Hashing Competition". password-hashing.net. Retrieved 2018-10-15.
  3. ^ a b Biryukov, Alex; Khovratovich, Dmitry (2009-12-02). Related-Key Cryptanalysis of the Full AES-192 and AES-256. Springer-Verlag. pp. 1–18. doi:10.1007/978-3-642-10366-7_1. ISBN 9783642103650.
  4. ^ Khovratovich, Dmitry (2008-12-14). "Two Attacks on RadioGatún". Progress in Cryptology – INDOCRYPT 2008. Lecture Notes in Computer Science. 5365. pp. 53–66. doi:10.1007/978-3-540-89754-5_5. ISBN 978-3-540-89753-8.
  5. ^ a b Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra (2011). "Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family". Fast Software Encryption. Lecture Notes in Computer Science. 7549. pp. 244–263. doi:10.1007/978-3-642-34047-5_15. ISBN 978-3-642-34046-8. S2CID 32262663.
  6. ^ a b Biryukov, Alex; Khovratovich, Dmitry; Pustogarov, Ivan (2014-11-03). Deanonymisation of Clients in Bitcoin P2P Network. ACM. pp. 15–29. arXiv:1405.7418. doi:10.1145/2660267.2660379. ISBN 9781450329576. S2CID 207217947.
  7. ^ Biryukov, Alex; Khovratovich, Dmitry (2016-08-10). Egalitarian computing. USENIX Association. pp. 315–326. ISBN 9781931971324.
  8. ^ "Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications – IEEE Conference Publication". doi:10.1109/EuroSP.2016.31. S2CID 15014453. Cite journal requires |journal= (help)
  9. ^ Biryukov, Alex; Khovratovich, Dmitry (2017-04-28). "Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem". Ledger. 2: 1–30. doi:10.5195/LEDGER.2017.48. ISSN 2379-5980.
  10. ^ Alex, Biryukov; Dmitry, Khovratovich (December 2015). Tradeoff Cryptanalysis of Memory-Hard Functions. Springer. ISBN 9783662487990.
  11. ^ "Rotational Cryptanalysis of ARX Revisited". www.iacr.org. Retrieved 2018-10-15.
  12. ^ Biryukov, Alex; Bouillaguet, Charles; Khovratovich, Dmitry (2014), "Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)", Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 63–84, doi:10.1007/978-3-662-45611-8_4, ISBN 9783662456101
  13. ^ Perrin, Léo; Khovratovich, Dmitry (2015), "Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64", Fast Software Encryption, Springer Berlin Heidelberg, pp. 82–103, CiteSeerX 10.1.1.646.5918, doi:10.1007/978-3-662-46706-0_5, ISBN 9783662467053
  14. ^ Biryukov, Alex; Khovratovich, Dmitry (2014-10-12). Information Security. Lecture Notes in Computer Science. 8783. pp. 72–89. doi:10.1007/978-3-319-13257-0_5. ISBN 978-3-319-13256-3.
  15. ^ Khovratovich, Dmitry (2014-02-25). "Key Wrapping with a Fixed Permutation". Topics in Cryptology – CT-RSA 2014. Lecture Notes in Computer Science. 8366. pp. 481–499. CiteSeerX 10.1.1.301.8763. doi:10.1007/978-3-319-04852-9_25. ISBN 978-3-319-04851-2.
  16. ^ Khovratovich, Dmitry (2012-12-02). "Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings". Advances in Cryptology – ASIACRYPT 2012. Asiacrypt'12. 7658. Springer-Verlag. pp. 544–561. doi:10.1007/978-3-642-34961-4_33. ISBN 9783642349607.
  17. ^ Knellwolf, Simon; Khovratovich, Dmitry (2012), "New Preimage Attacks against Reduced SHA-1", Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 367–383, doi:10.1007/978-3-642-32009-5_22, ISBN 9783642320088
  18. ^ "Narrow-Bicliques: cryptanalysis of full IDEA". ResearchGate. Retrieved 2018-10-15.
  19. ^ Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian (2011-12-04). Biclique cryptanalysis of the full AES. Springer-Verlag. pp. 344–371. doi:10.1007/978-3-642-25385-0_19. ISBN 9783642253843.
  20. ^ Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian (2010-02-12). Rotational Rebound Attacks on Reduced Skein. Journal of Cryptology. Lecture Notes in Computer Science. 27. pp. 1–19. doi:10.1007/978-3-642-17373-8_1. ISBN 978-3-642-17372-1.
  21. ^ Khovratovich, Dmitry; Nikolić, Ivica (2010-06-27). Fast Software Encryption. Lecture Notes in Computer Science. 6147. pp. 333–346. doi:10.1007/978-3-642-13858-4_19. ISBN 978-3-642-13857-7.
  22. ^ Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi (2010-05-30). Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Springer-Verlag. pp. 299–319. doi:10.1007/978-3-642-13190-5_15. ISBN 978-3642131899.
  23. ^ Khovratovich, Dmitry; Nikolic, Ivica; Weinmann, Ralf-Philipp (2009-02-22). Fast Software Encryption. Lecture Notes in Computer Science. 5665. pp. 228–245. doi:10.1007/978-3-642-03317-9_14. ISBN 978-3-642-03316-2.
  24. ^ "Université du Luxembourg – SnT Team Wins Big at Hackathon". wwwen.uni.lu. Retrieved 2018-10-15.
  25. ^ [circular reference]
  26. ^ "dblp: ASIACRYPT 2010". dblp.org. Retrieved 2018-10-15.
  27. ^ Luxembourg, Université du. "Prix de la meilleure thèse pour un cryptographe russe". Université du Luxembourg. Retrieved 2018-10-15.
Retrieved from ""