Dmitry Khovratovich
#62,513
Most Influential Person Now
Cryptographer
Dmitry Khovratovich's AcademicInfluence.com Rankings
Dmitry Khovratovichcomputer-science Degrees
Computer Science
#2875
World Rank
#3009
Historical Rank
Database
#8975
World Rank
#9437
Historical Rank
Download Badge
Computer Science
Dmitry Khovratovich's Degrees
- Masters Computer Science Moscow State University
- Bachelors Computer Science Moscow State University
Similar Degrees You Can Earn
Why Is Dmitry Khovratovich Influential?
(Suggest an Edit or Addition)According to Wikipedia, Dmitry Khovratovich is a cryptographer, currently a Lead Cryptographer for the Dusk Network, researcher for the Ethereum Foundation, and member of the International Association for Cryptologic Research. He developed, together with Alex Biryukov, the Equihash proof-of-work algorithm which is currently being used as consensus mechanism for the Zcash cryptocurrency, and the Argon2 key derivation function, which won the Password Hashing Competition in July 2015.
Dmitry Khovratovich's Published Works
Published Works
- Biclique Cryptanalysis of the Full AES (2011) (555)
- Related-Key Cryptanalysis of the Full AES-192 and AES-256 (2009) (477)
- Deanonymisation of Clients in Bitcoin P2P Network (2014) (453)
- Distinguisher and Related-Key Attack on the Full AES-256 (2009) (354)
- Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds (2010) (210)
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family (2012) (164)
- Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications (2016) (159)
- Triathlon of lightweight block ciphers for the Internet of things (2018) (154)
- Rotational Cryptanalysis of ARX (2010) (139)
- Poseidon: A New Hash Function for Zero-Knowledge Proof Systems (2021) (103)
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) (2014) (100)
- Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem (2016) (97)
- New State Recovery Attack on RC4 (2008) (87)
- Narrow-Bicliques: Cryptanalysis of Full IDEA (2012) (81)
- FELICS - Fair Evaluation of Lightweight Cryptographic Systems (2015) (76)
- Rotational Rebound Attacks on Reduced Skein (2010) (67)
- Findel: Secure Derivative Contracts for Ethereum (2017) (62)
- Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems (2019) (53)
- Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC (2019) (52)
- Aggregatable Subvector Commitments for Stateless Cryptocurrencies (2020) (47)
- Asymmetric proof-of-work based on the Generalized Birthday problem (2017) (42)
- Two New Techniques of Side-Channel Cryptanalysis (2007) (36)
- Tradeoff Cryptanalysis of Memory-Hard Functions (2015) (34)
- Speeding up Collision Search for Byte-Oriented Hash Functions (2009) (33)
- Rotational Cryptanalysis of ARX Revisited (2015) (32)
- Cryptanalysis of Luffa v2 Components (2010) (30)
- New Preimage Attacks against Reduced SHA-1 (2012) (28)
- Collision Attacks on AES-Based MAC: Alpha-MAC (2007) (26)
- Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing (2015) (25)
- The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE (2013) (24)
- PAEQ: Parallelizable Permutation-Based Authenticated Encryption (2014) (24)
- Egalitarian Computing (2016) (24)
- Meet-in-the-Middle Attacks on SHA-3 Candidates (2009) (22)
- Cryptanalysis of Hash Functions with Structures (2009) (22)
- Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs (2017) (20)
- Sovrin : digital identities in the blockchain era (2016) (20)
- Decomposition attack on SASASASAS (2015) (19)
- Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings (2012) (16)
- Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 (2014) (14)
- The memory-hard Argon2 password hash and proof-of-work function (2020) (13)
- Guru: Universal Reputation Module for Distributed Consensus Protocols (2017) (13)
- Key recovery attacks on the Legendre PRFs within the birthday bound (2019) (13)
- BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace (2017) (13)
- First Analysis of Keccak (2009) (13)
- Feasible Attack on the 13-round AES-256 (2010) (12)
- Privacy-preserving KYC on Ethereum (2018) (10)
- Argon 2 : the memory-hard function for password hashing and other applications (2015) (10)
- Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation (2021) (10)
- Two Attacks on RadioGatún (2008) (8)
- Hash family LUX-Algorithm Specifications and Supporting Documentation (2008) (7)
- Caulk: Lookup Arguments in Sublinear Time (2022) (7)
- Reinforced Concrete: A Fast Hash Function for Verifiable Computation (2022) (6)
- The Dusk Network Whitepaper (2021) (6)
- Cryptanalysis of the LAKE Hash Family (2009) (6)
- TLS Client Puzzles Extension (2016) (6)
- A Splice-and-Cut Cryptanalysis of the AES (2011) (5)
- Examples of differential multicollisions for 13 and 14 rounds of AES-256 (2009) (5)
- T5: Hashing Five Inputs with Three Compression Calls (2021) (4)
- The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n (2022) (4)
- Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications (2021) (4)
- flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size (2022) (4)
- The Hash Function Cheetah : Specification and Supporting Documentation (2008) (4)
- The memory-hard Argon2 password hash function (2015) (4)
- The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fp Preimage Attack on Full Grendel (2021) (4)
- Argon and Argon2 (2015) (3)
- New approaches to the cryptanalysis of symmetric primitives (2010) (3)
- Key Wrapping with a Fixed Permutation (2014) (3)
- Cryptanalysis of EnRUPT (2008) (3)
- Anonymous credentials 2.0 (2019) (1)
- Methods of Symmetric Cryptanalysis (2011) (1)
- Rotational Rebound Attacks on Reduced Skein (2013) (1)
- Cryptanalysis of Luffa v 2 Components ? (2010) (1)
- Baloo: Nearly Optimal Lookup Arguments (2022) (1)
- MinRoot: Candidate Sequential Function for Ethereum VDF (2022) (1)
- Tornado Privacy Solution Cryptographic Review Version 1.1 (2019) (0)
- Design Considerations for Decentralized Reputation Systems (2017) (0)
- Related-key cryptanalysis of AES, Hierocrypt-3, and CipherUnicorn-A (2012) (0)
- On cardinality of some subclasses of monotone functions (2005) (0)
- Cryptography Cryptography: General (2017) (0)
- Egalitarian Computing Egalitarian Computing (2016) (0)
- Poseidon2: A Faster Version of the Poseidon Hash Function (2023) (0)
- Triathlon of lightweight block ciphers for the Internet of things (2018) (0)
- Caulk (2022) (0)
- Divisibility of the Hamming Weight by 2k and Monomial Criteria for Boolean Functions (2006) (0)
- Fast amortized KZG proofs (2023) (0)
- PAEQ : Parallelizable Permutation-based Authenticated Encryption ( Full Version ) (2014) (0)
- Observations on BLAKE (2011) (0)
- Cryptography: General (2016) (0)
This paper list is powered by the following services:
Other Resources About Dmitry Khovratovich
What Schools Are Affiliated With Dmitry Khovratovich?
Dmitry Khovratovich is affiliated with the following schools: