Patrick Derbez

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
\textsc{ChiLow} and \textsc{ChiChi}: new constructions for code encryption2025-11-20Paper
New models for the cryptanalysis of ASCON
Designs, Codes and Cryptography
2025-07-18Paper
Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT2024-12-13Paper
A generic algorithm for efficient key recovery in differential attacks -- and its associated tool2024-11-12Paper
A CP-based automatic tool for instantiating truncated differential characteristics2024-10-23Paper
A simpler model for recovering superpoly on Trivium2024-10-14Paper
Differential meet-in-the-middle cryptanalysis
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Revisiting related-key boomerang attacks on AES using computer-aided tool
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
New algorithm for exhausting optimal permutations for generalized Feistel networks
Lecture Notes in Computer Science
2023-08-14Paper
Cryptanalysis results on spook. Bringing full-round shadow-512 to the light2022-12-07Paper
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-22021-12-08Paper
Linearly equivalent s-boxes and the division property
Designs, Codes and Cryptography
2020-10-07Paper
Cryptanalysis of \texttt{SKINNY} in the framework of the \texttt{SKINNY} 2018--2019 cryptanalysis competition2020-07-21Paper
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
Journal of Cryptology
2020-06-15Paper
Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography
2020-01-09Paper
Variants of the AES key schedule for better truncated differential bounds2019-02-20Paper
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints2019-01-23Paper
Key-recovery attacks on \(\mathsf{ASASA}\)
Journal of Cryptology
2018-09-14Paper
Note on impossible differential attacks
Fast Software Encryption
2018-05-09Paper
Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory
2017-06-08Paper
Automatic search of meet-in-the-middle and impossible differential attacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Key-recovery attacks on \(\mathsf {ASASA}\)
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Differential analysis and meet-in-the-middle attack against round-reduced TWINE
Fast Software Encryption
2015-09-18Paper
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
Fast Software Encryption
2015-09-18Paper
Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
Fast Software Encryption
2015-09-18Paper
Faster chosen-key distinguishers on reduced-round AES
Lecture Notes in Computer Science
2014-08-20Paper
Improved key recovery attacks on reduced-round AES in the single-key setting
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Automatic search of attacks on round-reduced AES and applications
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Bounded Cohomology and $l_1$-Homology of Three-Manifolds2008-09-25Paper


Research outcomes over time


This page was built for person: Patrick Derbez