Alex Biryukov

ORCID: 0000-0003-1404-6686
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Network Security and Intrusion Detection
  • Security and Verification in Computing
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • graph theory and CDMA systems
  • Cellular Automata and Applications
  • Intelligence, Security, War Strategy
  • Advanced Steganography and Watermarking Techniques
  • Economic and Technological Developments in Russia
  • Peer-to-Peer Network Technologies
  • Smart Grid Security and Resilience
  • Privacy-Preserving Technologies in Data
  • Parallel Computing and Optimization Techniques
  • Natural Language Processing Techniques
  • Fractal and DNA sequence analysis
  • Microtubule and mitosis dynamics
  • DNA and Biological Computing
  • Distributed systems and fault tolerance
  • Economic, Social, and Public Health Issues in Russia and Globally

University of Luxembourg
2016-2025

State Duma
2019-2021

Plekhanov Russian University of Economics
2019

Linköping University
2018

Sectra (Sweden)
2018

University of Malta
2018

UCLA Health
2018

Vanderbilt University
2018

Luxembourg School of Business
2015

Recherches Scientifiques Luxembourg
2007-2010

Bitcoin is a digital currency which relies on distributed set of miners to mint coins and peer-to-peer network broadcast transactions. The identities users are hidden behind pseudonyms (public keys) recommended be changed frequently in order increase transaction unlinkability.

10.1145/2660267.2660379 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

Tor is the most popular volunteer-based anonymity network consisting of over 3000 volunteer-operated relays. Apart from making connections to servers hard trace their origin it can also provide receiver privacy for Internet services through a feature called "hidden services". In this paper we expose flaws both in design and implementation Tor's hidden that allow an attacker measure popularity arbitrary services, take down deanonymize services. We give practical evaluation our techniques by...

10.1109/sp.2013.15 article EN IEEE Symposium on Security and Privacy 2013-05-01

Bit coin is a decentralized P2P digital currency in which coins are generated by distributed set of miners and transactions broadcasted via peer-to-peer network. While provides some level anonymity (or rather pseudonymity) encouraging the users to have any number random-looking addresses, recent research shows that this low. This encourages connect network through anonymizers like Tor motivates development default functionality for popular mobile SPV clients. In paper we show combining...

10.1109/sp.2015.15 article EN IEEE Symposium on Security and Privacy 2015-05-01

We present a new hash function Argon2, which is oriented at protection of low-entropy secrets without secret keys. It requires certain (but tunable) amount memory, imposes prohibitive time-memory and computation-memory tradeoffs on memory-saving users, exceptionally fast regular PC. Overall, it can provide ASIC-and botnet-resistance by filling the memory in 0.6 cycles per byte non-compressible way.

10.1109/eurosp.2016.31 article EN 2016-03-01

Tor hidden services allow running Internet while protecting the location of servers. Their main purpose is to enable freedom speech even in situations which powerful adversaries try suppress it. However, providing privacy and client anonymity also makes an attractive platform for every kind imaginable shady service. The ease with can be set up has spurred a huge growth anonymously provided both types. In this paper we analyse landscape services. We have studied 39824 service descriptors...

10.1109/icdcsw.2014.20 article EN 2014-06-01

Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice protection tools, but the requirement for fast verification so far has made it an easy prey GPU-, ASIC-, botnet-equipped users. The attempts to rely on memory-intensive computations order remedy disparity between architectures have resulted slow or broken schemes. In this paper we solve open problem show how construct asymmetric proof-of-work (PoW) based computationally-hard problem, which requires great deal...

10.5195/ledger.2017.48 article EN cc-by Ledger 2017-04-28

Bitcoin, introduced in 2008 and launched 2009, is the first digital currency to solve double spending problem without relying on a trusted third party. Bitcoin provides way transact any intermediary, but its privacy guarantees are questionable. Despite fact that addresses not linked identity, multiple deanonymization attacks have been proposed. Alternative cryptocurrencies such as Dash, Monero, Zcash aim provide stronger by using sophisticated cryptographic techniques obfuscate transaction...

10.1109/eurosp.2019.00022 article EN 2019-06-01
Coming Soon ...