{"id":"alex-biryukov","title":"Alex Biryukov","content":"**Alexei \"Alex\" Biryukov** is a world-renowned cryptographer, security expert, and computer scientist. He is a Full Professor at the University of Luxembourg, where he is the founder and head of the CryptoLux research group. [\\[1\\]](#cite-id-rSgJhtBrfO9nAEWW) [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) Biryukov has made fundamental contributions to symmetric-key cryptography, including the co-design of the Keccak algorithm, which became the SHA-3 standard, and the Argon2 password hashing function, which won the Password Hashing Competition. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) In the field of cryptanalysis, he is known for co-inventing the slide attack, impossible differential cryptanalysis, and for developing the first attacks on the full versions of AES-192 and AES-256. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s) He has also been a key academic figure in the blockchain space, co-inventing the Equihash proof-of-work algorithm and serving as a founding scientist of the [Zcash](https://iq.wiki/wiki/zcash) protocol. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe)​\n\n## Education\n\nBiryukov earned a Bachelor of Science in Applied Mathematics from the Moscow Institute of Physics and Technology (MIPT). [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) [\\[1\\]](#cite-id-rSgJhtBrfO9nAEWW) He continued his academic career in Israel, where he obtained his Ph.D. in Computer Science from the Technion – Israel Institute of Technology in 1999. His doctoral dissertation was titled \"Methods of Cryptanalysis,\" and his advisors were Professor Shimon Even and Professor Eyal Kushilevitz. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)\n\n## Career\n\nAfter completing his Ph.D., Biryukov was a postdoctoral researcher at the Weizmann Institute of Science in Israel from 2000 to 2001, where he worked in the Department of Computer Science and Applied Mathematics and collaborated with Adi Shamir on symmetric cryptography. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) Following this, he was a research fellow and guest professor from 2002 to 2006 at the Katholieke Universiteit Leuven (K.U. Leuven) in Belgium. There, he was part of the esteemed Computer Security and Industrial Cryptography (COSIC) group, where he was involved in analyzing candidates for the Advanced Encryption Standard (AES) and contributed to the eSTREAM project for stream cipher standardization. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)\n\nIn 2006, Biryukov was appointed Full Professor at the University of Luxembourg. He founded and continues to lead the CryptoLux research group, which operates within the Faculty of Science, Technology and Medicine (FSTM) and is also affiliated with the university's Interdisciplinary Centre for Security, Reliability and Trust (SnT), where he serves as a member of the management board. [\\[1\\]](#cite-id-rSgJhtBrfO9nAEWW) [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) His work at the university involves teaching advanced cryptography, supervising doctoral and postdoctoral researchers, and leading major research projects. Biryukov has been a member of the International Association for Cryptologic Research (IACR) since 1994. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)\n\n## Research and Contributions\n\nBiryukov's research spans the design and analysis of cryptographic systems, with major impacts on both academic theory and real-world security standards. His publications have garnered over 44,000 citations, and he has an h-index of 87 as of January 2026. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)​\n\n### Cryptanalysis\n\nBiryukov is credited with the co-invention of several powerful cryptanalytic techniques.\n\n#### Slide and Boomerang Attacks\n\nIn 1999, alongside David Wagner, Biryukov co-invented the slide attack. This is a generic form of cryptanalysis that applies to block ciphers constructed from identical, repeated permutations or round functions, regardless of the total number of rounds. The attack works by \"sliding\" two ciphertexts against each other to create a condition where they are both at the same stage of the encryption process, effectively reducing the problem to a single-round attack. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) He also contributed to the development of the boomerang attack, an advanced differential cryptanalysis technique invented by Wagner that allows two short differential paths to be combined to attack a larger number of rounds than traditional differential analysis would allow. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe)​\n\n#### Impossible Differential Cryptanalysis\n\nIn 1998, with Eli Biham and Adi Shamir, Biryukov co-invented impossible differential cryptanalysis. This method exploits differential paths that have a probability of zero. By identifying these \"impossible\" differentials, an analyst can definitively rule out incorrect key candidates, making it a highly effective tool for breaking block ciphers. The technique was famously used to demonstrate a break on 31 out of 32 rounds of the Skipjack cipher. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)​\n\n#### Analysis of the Advanced Encryption Standard (AES)\n\nWhile he did not design the AES (Rijndael), Biryukov's work on its security analysis is highly significant. In 2009, he and [Dmitry Khovratovich](https://iq.wiki/wiki/dmitry-khovratovich) published the first related-key cryptanalysis of the full AES-192 and AES-256 standards. This attack, while theoretical, demonstrated a key recovery on AES-256 with a computational complexity of 2^99.5, representing a significant finding in a related-key attack model. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)​\n\nLater, in 2011, Biryukov, Khovratovich, and Ivan Nikolić developed the biclique attack. This was the first cryptanalytic method to reduce the computational complexity for a key recovery attack on the full AES-256 algorithm to a value slightly less than that of a brute-force search (2^254.4 compared to 2^256). Though not a practical threat, this result was a major theoretical breakthrough in the analysis of the world's most widely used encryption standard. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)​\n\n### Design of Cryptographic Standards\n\nBiryukov has been a leading figure in the design of modern cryptographic algorithms that have become global standards.\n\n#### Keccak (SHA-3)\n\nBiryukov is a co-designer of the Keccak cryptographic hash function. In 2012, Keccak was selected by the U.S. National Institute of Standards and Technology (NIST) as the winner of its widely publicized hash function competition. In 2015, Keccak was formally standardized as SHA-3 (Secure Hash Algorithm 3), the latest generation in the Secure Hash Algorithm family. SHA-3 is now a fundamental component of modern digital security, used for data integrity, digital signatures, and other cryptographic applications. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe)​\n\n#### Argon2 Password Hashing Function\n\nBiryukov led the design of Argon2, a memory-hard key derivation function, created with Daniel Dinu and [Dmitry Khovratovich](https://iq.wiki/wiki/dmitry-khovratovich). Argon2 was specifically engineered to securely hash passwords for storage and verification, providing high resistance to cracking attempts using specialized hardware like GPUs and ASICs by making memory usage the primary performance bottleneck. In 2015, Argon2 was declared the winner of the international Password Hashing Competition (PHC). [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s) [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) In 2021, Argon2 was standardized by the Internet Engineering Task Force (IETF) as RFC 9106, cementing its role as a leading standard for password protection. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)​\n\n### Blockchain and Cryptocurrency\n\nBiryukov has applied his expertise to the field of cryptocurrencies and blockchain technology, focusing on privacy and consensus mechanisms.\n\n#### Equihash Proof-of-Work\n\nWith [Dmitry Khovratovich](https://iq.wiki/wiki/dmitry-khovratovich), Biryukov co-invented Equihash, an asymmetric memory-hard Proof-of-Work (PoW) algorithm. Based on the generalized birthday problem, Equihash was designed to be ASIC-resistant by making memory capacity, rather than raw processing speed, the limiting factor in mining efficiency. This approach aimed to democratize the mining process by favoring general-purpose hardware (CPUs and GPUs). [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s) [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) Equihash was famously adopted by the privacy-focused cryptocurrency [Zcash](https://iq.wiki/wiki/zcash) upon its launch, as well as by several other digital currencies. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)​\n\n#### Zerocash and Privacy\n\nBiryukov was one of the seven founding scientists and co-authors of the seminal 2014 paper \"Zerocash: Decentralized Anonymous Payments from Bitcoin.\" This paper laid the cryptographic groundwork for [Zcash](https://iq.wiki/wiki/zcash) by introducing a protocol that could provide fully anonymous transactions using zero-knowledge proofs, specifically zk-SNARKs. This work was a foundational step in the development of practical, privacy-preserving cryptocurrencies. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) He has also been affiliated with IC3 (Initiative for Cryptocurrencies and Contracts), a leading academic blockchain research initiative, and was involved in the early stages of the formation of [Blockstream](https://iq.wiki/wiki/blockstream). [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe)​\n\n#### Network Analysis and Security\n\nIn 2014, Biryukov, along with Ivan Pustogarov and [Dmitry Khovratovich](https://iq.wiki/wiki/dmitry-khovratovich), published research demonstrating how to deanonymize [Bitcoin](https://iq.wiki/wiki/bitcoin) users. Their method involved passively monitoring peer-to-peer network traffic to link transactions to the IP addresses of the users who originated them, highlighting fundamental privacy weaknesses in the [Bitcoin](https://iq.wiki/wiki/bitcoin) network. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) In subsequent work, he also analyzed vulnerabilities in the Tor network, showing how traffic and timing analysis could potentially deanonymize hidden services. [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)​\n\n### Other Notable Algorithm Designs\n\nThroughout his career, Biryukov has been involved in the design and analysis of numerous other cryptographic algorithms:\n\n* **Serpent**: He was part of the design team for the Serpent block cipher, which was one of the five finalists in the NIST AES competition. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe)\n* **SAFER++**: A block cipher he co-designed as a candidate for the NESSIE (New European Schemes for Signatures, Integrity, and Encryption) project. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)\n* **LEX**: A stream cipher designed by Biryukov and submitted to the eSTREAM project. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)\n* **IDEA**: The International Data Encryption Algorithm, a well-known 64-bit block cipher that Biryukov helped design. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)\n* **DEAL**: A 128-bit block cipher based on the DES design, which he co-designed. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)\n* **PRESENT**: He was involved in the design of PRESENT, a lightweight block cipher optimized for highly constrained environments like RFID tags. [\\[1\\]](#cite-id-rSgJhtBrfO9nAEWW)\n* **ECHO**: He was a co-designer of the ECHO hash function, which was a second-round candidate in the NIST SHA-3 competition. [\\[1\\]](#cite-id-rSgJhtBrfO9nAEWW)\n\nThese contributions demonstrate Biryukov's wide-ranging influence on the field of symmetric-key cryptography, from heavyweight standards to lightweight ciphers for specialized devices. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s) [\\[1\\]](#cite-id-rSgJhtBrfO9nAEWW)​\n\n## Awards and Recognition\n\nBiryukov's contributions to cryptography have been recognized with several awards and honors.\n\n* **Winner of the Password Hashing Competition (2015)**: Received as the leader of the design team for the Argon2 algorithm. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s) [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa)\n* **FNR Award for Outstanding Scientific Publication (2017)**: Received from the Luxembourg National Research Fund for the paper on the Argon2 hash function. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)\n* **ESORICS Best Paper Award (2018)**: Received for research presented at the European Symposium on Research in Computer Security. [\\[4\\]](#cite-id-hX5l9xKj1vyVaK2s)\n\nIn addition to these awards, Biryukov is an active leader in the academic community. He served as the Program Chair for the 14th Fast Software Encryption (FSE) Workshop in 2007 and frequently serves on the program committees for major international cryptography conferences, including CRYPTO, EUROCRYPT, and Asiacrypt. [\\[2\\]](#cite-id-Hb1OSLQ3OWmeBUwe) [\\[3\\]](#cite-id-MBG7byGRzHoJ6Noa) [\\[5\\]](#cite-id-IHu5lhp4MiMcuoQg)​","summary":"Alex Biryukov is a cryptographer and professor at the University of Luxembourg. He leads the CryptoLux group and is known for co-designing Keccak (SHA-3), Equihash, and Argon2, and for inventing seminal cryptanalytic techniques like the slide attack.","images":[{"id":"QmS5xoBobZ6kUQbpXvjJ3LvD7KA1wHQaM44BdfY5d6jDfF","type":"image/jpeg, image/png"}],"categories":[{"id":"people","title":"people"}],"tags":[{"id":"PeopleInDeFi"},{"id":"Developers"}],"media":[{"id":"QmZzW3A8PSwMt2bTHhihiiH73v7N1a9ka9SSP47j2u162h","type":"GALLERY","source":"IPFS_IMG"},{"id":"QmNjggMQeBE4A9uuAcb6Y4niNqZWtTr7wvFGiW23uex6Ja","type":"GALLERY","source":"IPFS_IMG"},{"id":"QmVJvNK7fFjrKj32kiJRzQZNAQx5r4NoMpbTrjciC4H8MT","type":"GALLERY","source":"IPFS_IMG"}],"metadata":[{"id":"references","value":"[\n  {\n    \"id\": \"rSgJhtBrfO9nAEWW\",\n    \"url\": \"https://www.uni.lu/fstm-en/people/alexei-biryukov/\",\n    \"description\": \"Official profile at University of Luxembourg\",\n    \"timestamp\": 1769381665999\n  },\n  {\n    \"id\": \"Hb1OSLQ3OWmeBUwe\",\n    \"url\": \"https://scholar.google.com/citations?user=tP5rH0wAAAAJ\\\\&hl=en\",\n    \"description\": \"Google Scholar profile for Alex Biryukov\",\n    \"timestamp\": 1769381665999\n  },\n  {\n    \"id\": \"MBG7byGRzHoJ6Noa\",\n    \"url\": \"https://grokipedia.com/page/alex\\\\_biryukov\",\n    \"description\": \"Profile detailing contributions to Argon2 and cryptanalysis\",\n    \"timestamp\": 1769381665999\n  },\n  {\n    \"id\": \"hX5l9xKj1vyVaK2s\",\n    \"url\": \"https://dblp.org/pid/09/5071\",\n    \"description\": \"DBLP publication list for Alex Biryukov\",\n    \"timestamp\": 1769381665999\n  },\n  {\n    \"id\": \"IHu5lhp4MiMcuoQg\",\n    \"url\": \"https://x.com/alexcryptan?lang=en\",\n    \"description\": \"X (Twitter) profile for Alex Biryukov\",\n    \"timestamp\": 1769381665999\n  }\n]"},{"id":"twitter_profile","value":"https://x.com/alexcryptan"},{"id":"references","value":"https://scholar.google.com/citations?user=tP5rH0wAAAAJ&hl=en"},{"id":"references","value":"https://dblp.org/pid/09/5071"},{"id":"commit-message","value":"\"Added wiki page for Alexei Biryukov\""}],"events":[{"id":"eefb1ea5-41ec-46ed-9a50-83a8d43e50c4","date":"1999-01","title":"Graduated with Ph.D. in Computer Science","type":"DEFAULT","description":"Alex Biryukov earned his Ph.D. in Computer Science from the Technion – Israel Institute of Technology.","link":null,"multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null,"action":"CREATE"},{"id":"586b829f-0ba6-4d5a-ae71-83ae49d49ba5","date":"1999-02","title":"Co-invented the Slide Attack","type":"DEFAULT","description":"Along with David Wagner, Biryukov invented the slide attack, a new form of cryptanalysis for block ciphers.","link":"https://dblp.org/rec/conf/fse/BiryukovW99.html","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null,"action":"CREATE"},{"id":"81a2bde3-9b0f-4728-a24a-3cdb946f8cb6","date":"2006-01","title":"Became Full Professor at University of Luxembourg","type":"DEFAULT","description":"Biryukov began his tenure as a Full Professor at the University of Luxembourg, where he founded and leads the CryptoLux research group.","link":"https://www.uni.lu/fstm-en/people/alexei-biryukov/","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null,"action":"CREATE"},{"id":"33b7aff0-787f-44f5-949f-8c61dbbdb760","date":"2014-05","title":"Co-authored Zerocash Protocol Paper","type":"DEFAULT","description":"Biryukov was one of the seven founding scientists and authors of the seminal paper \"Zerocash: Decentralized Anonymous Payments from Bitcoin,\" laying the groundwork for Zcash.","link":null,"multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null,"action":"CREATE"},{"id":"dc30c61a-34ab-426f-a6aa-0175da310aa1","date":"2015-07","title":"Argon2 Wins Password Hashing Competition","type":"DEFAULT","description":"The Argon2 algorithm, co-designed by Biryukov, was selected as the winner of the Password Hashing Competition.","link":"https://password-hashing.net/","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null,"action":"CREATE"}],"user":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"author":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"operator":{"id":"0x1E23b34d3106F0C1c74D17f2Cd0F65cdb039b138"},"language":"en","version":1,"linkedWikis":{"blockchains":[],"founders":[],"speakers":[]}}