default search action
Alexander Maximov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i23]Dachao Wang, Alexander Maximov, Patrik Ekdahl, Thomas Johansson:
A new stand-alone MAC construct called SMAC. IACR Cryptol. ePrint Arch. 2024: 819 (2024) - [i22]Alexander Maximov:
Notes on (failed) attempts to instantiate TLR3. IACR Cryptol. ePrint Arch. 2024: 951 (2024) - 2023
- [i21]Alexander Maximov, Mats Näslund:
Security analysis of the Milenage-construction based on a PRF. IACR Cryptol. ePrint Arch. 2023: 607 (2023) - 2022
- [j7]Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-Round SHA-3-384 in Practical Time. IACR Trans. Symmetric Cryptol. 2022(3): 239-270 (2022) - [i20]Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-round SHA3-384 in Practical Time. IACR Cryptol. ePrint Arch. 2022: 194 (2022) - 2021
- [j6]Jing Yang, Thomas Johansson, Alexander Maximov:
Improved guess-and-determine and distinguishing attacks on SNOW-V. IACR Trans. Symmetric Cryptol. 2021(3): 54-83 (2021) - [c13]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. CANS 2021: 24-41 - [c12]Patrik Ekdahl, Alexander Maximov, Thomas Johansson, Jing Yang:
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs. WISEC 2021: 261-272 - [i19]Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
SNOW-Vi: an extreme performance variant of SNOW-V for low-end CPUs. IACR Cryptol. ePrint Arch. 2021: 236 (2021) - [i18]Jing Yang, Thomas Johansson, Alexander Maximov:
New improved attacks on SNOW-V. IACR Cryptol. ePrint Arch. 2021: 544 (2021) - [i17]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. IACR Cryptol. ePrint Arch. 2021: 751 (2021) - [i16]Alexander Maximov:
Some observations on ZUC-256. IACR Cryptol. ePrint Arch. 2021: 1134 (2021) - 2020
- [j5]Jing Yang, Thomas Johansson, Alexander Maximov:
Spectral analysis of ZUC-256. IACR Trans. Symmetric Cryptol. 2020(1): 266-288 (2020) - [i15]Alexander Maximov:
On Roots Factorization for PQC Algorithms. IACR Cryptol. ePrint Arch. 2020: 27 (2020) - [i14]Alexander Maximov, Martin Hell:
Software Evaluation of Grain-128AEAD for Embedded Platforms. IACR Cryptol. ePrint Arch. 2020: 659 (2020) - [i13]Steve Babbage, Alexander Maximov:
Differential analysis of the ZUC-256 initialisation. IACR Cryptol. ePrint Arch. 2020: 1215 (2020)
2010 – 2019
- 2019
- [j4]Alexander Maximov, Patrik Ekdahl:
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 91-125 (2019) - [j3]Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
A new SNOW stream cipher called SNOW-V. IACR Trans. Symmetric Cryptol. 2019(3): 1-42 (2019) - [j2]Jing Yang, Thomas Johansson, Alexander Maximov:
Vectorized linear approximations for attacks on SNOW 3G. IACR Trans. Symmetric Cryptol. 2019(4): 249-271 (2019) - [i12]Alexander Maximov, Patrik Ekdahl:
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes. IACR Cryptol. ePrint Arch. 2019: 802 (2019) - [i11]Alexander Maximov:
AES MixColumn with 92 XOR gates. IACR Cryptol. ePrint Arch. 2019: 833 (2019) - [i10]Jing Yang, Thomas Johansson, Alexander Maximov:
Vectorized linear approximations for attacks on SNOW 3G. IACR Cryptol. ePrint Arch. 2019: 991 (2019) - [i9]Jing Yang, Thomas Johansson, Alexander Maximov:
Spectral analysis of ZUC-256. IACR Cryptol. ePrint Arch. 2019: 1352 (2019) - 2018
- [i8]Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
A new SNOW stream cipher called SNOW-V. IACR Cryptol. ePrint Arch. 2018: 1143 (2018) - 2017
- [i7]Alexander Maximov, Helena Sjoberg:
On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2). IACR Cryptol. ePrint Arch. 2017: 889 (2017) - 2015
- [i6]Christine Jost, Ha Lam, Alexander Maximov, Ben J. M. Smeets:
Encryption Performance Improvements of the Paillier Cryptosystem. IACR Cryptol. ePrint Arch. 2015: 864 (2015)
2000 – 2009
- 2008
- [c11]Alexander Maximov, Dmitry Khovratovich:
New State Recovery Attack on RC4. CRYPTO 2008: 297-316 - [p1]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier:
The Grain Family of Stream Ciphers. The eSTREAM Finalists 2008: 179-190 - [i5]Alexander Maximov, Dmitry Khovratovich:
New State Recovery Attack on RC4. IACR Cryptol. ePrint Arch. 2008: 17 (2008) - 2007
- [j1]Alexander Maximov, Thomas Johansson:
A Linear Distinguishing Attack on Scream. IEEE Trans. Inf. Theory 53(9): 3127-3144 (2007) - [c10]Alexander Maximov:
On Large Distributions for Linear Cryptanalysis. ICISC 2007: 89-101 - [c9]Alexander Maximov, Alex Biryukov:
Two Trivial Attacks on Trivium. Selected Areas in Cryptography 2007: 36-55 - [i4]Alexander Maximov, Alex Biryukov:
Two Trivial Attacks on Trivium. IACR Cryptol. ePrint Arch. 2007: 21 (2007) - [i3]Alexander Maximov:
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected). IACR Cryptol. ePrint Arch. 2007: 70 (2007) - 2006
- [b1]Alexander Maximov:
Some Words on Cryptanalysis of Stream Ciphers. Lund University, Sweden, 2006 - [c8]Alexander Maximov:
Cryptanalysis of the "Grain" family of stream ciphers. AsiaCCS 2006: 283-288 - [c7]Côme Berbain, Henri Gilbert, Alexander Maximov:
Cryptanalysis of Grain. FSE 2006: 15-29 - [c6]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier:
A Stream Cipher Proposal: Grain-128. ISIT 2006: 1614-1618 - 2005
- [c5]Alexander Maximov, Thomas Johansson:
Fast Computation of Large Distributions and Its Cryptographic Applications. ASIACRYPT 2005: 313-332 - [c4]Alexander Maximov:
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. FSE 2005: 342-358 - [c3]Håkan Englund, Alexander Maximov:
Attack the Dragon. INDOCRYPT 2005: 130-142 - 2004
- [c2]Alexander Maximov:
On Linear Approximation of Modulo Sum. FSE 2004: 483-484 - [c1]Alexander Maximov, Thomas Johansson, Steve Babbage:
An Improved Correlation Attack on A5/1. Selected Areas in Cryptography 2004: 1-18 - [i2]Alexander Maximov, Martin Hell, Subhamoy Maitra:
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables. IACR Cryptol. ePrint Arch. 2004: 144 (2004) - [i1]Alexander Maximov:
Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra. IACR Cryptol. ePrint Arch. 2004: 354 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint