Thomas Peyrin

From MaRDI portal
Person:321320

Available identifiers

zbMath Open peyrin.thomasWikidataQ27996441 ScholiaQ27996441MaRDI QIDQ321320

List of research outcomes





PublicationDate of PublicationType
Finding all impossible differentials when considering the DDT2024-10-16Paper
Revisiting higher-order differential-linear attacks from an algebraic perspective2024-08-30Paper
Fully automated differential-linear attacks against ARX ciphers2023-10-04Paper
DEFAULT: cipher level resistance against differential fault attack2023-05-12Paper
The MALICIOUS framework: embedding backdoors into tweakable block ciphers2022-12-07Paper
On the cost of ASIC hardware crackers: a SHA-1 case study2021-12-20Paper
A deeper look at machine learning-based cryptanalysis2021-12-08Paper
The \texttt{Deoxys} AEAD family2021-08-10Paper
GIFT: A Small Present2020-06-24Paper
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives2020-06-24Paper
From collisions to chosen-prefix collisions application to full SHA-12020-02-04Paper
Boomerang Connectivity Table: a new cryptanalysis tool2018-07-09Paper
Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption2018-04-26Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers2016-11-30Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS2016-10-27Paper
Cryptanalysis of full \texttt{RIPEMD-128}2016-10-13Paper
Freestart Collision for Full SHA-12016-09-09Paper
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function2016-04-13Paper
Collision attack on \({\mathtt Grindahl}\)2016-01-11Paper
Known-Key Distinguisher on Full PRESENT2015-12-10Paper
Practical Free-Start Collision Attacks on 76-step SHA-12015-12-10Paper
Multiple Limited-Birthday Distinguishers and Applications2015-10-01Paper
Implementing Lightweight Block Ciphers on x86 Architectures2015-10-01Paper
Security Analysis of PRINCE2015-09-18Paper
Lightweight MDS Involution Matrices2015-09-18Paper
Cryptanalysis of JAMBU2015-09-18Paper
A Very Compact FPGA Implementation of LED and PHOTON2015-09-10Paper
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison2015-07-21Paper
Improved cryptanalysis of AES-like permutations2015-01-07Paper
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework2015-01-06Paper
Updates on Generic Attacks against HMAC and NMAC2014-08-07Paper
Generic Universal Forgery Attack on Iterative Hash-Based MACs2014-05-27Paper
Improved Cryptanalysis of Reduced RIPEMD-1602013-12-10Paper
Limited-Birthday Distinguishers for Hash Functions2013-12-10Paper
New Generic Attacks against Hash-Based MACs2013-12-10Paper
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-1282013-09-02Paper
Cryptanalysis of Full RIPEMD-1282013-05-31Paper
Generic Related-Key Attacks for HMAC2013-03-19Paper
On the (In)Security of IDEA in Various Hashing Modes2013-01-08Paper
Unaligned Rebound Attack: Application to Keccak2013-01-08Paper
Improved Rebound Attack on the Finalist Grøstl2013-01-08Paper
Practical Cryptanalysis of ARMADILLO22013-01-08Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks2012-07-23Paper
The LED Block Cipher2011-10-07Paper
The PHOTON Family of Lightweight Hash Functions2011-08-12Paper
Analysis of Reduced-SHAvite-3-256 v22011-07-07Paper
A Forward-Secure Symmetric-Key Derivation Protocol2010-12-07Paper
Cryptanalysis of the ESSENCE Family of Hash Functions2010-11-23Paper
Distinguishers for the Compression Function and Output Transformation of Hamsi-2562010-10-25Paper
Improved Differential Attacks for ECHO and Grøstl2010-08-24Paper
Side-Channel Analysis of Six SHA-3 Candidates2010-08-17Paper
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations2010-07-13Paper
Cryptanalysis of ESSENCE2010-07-13Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-5122010-05-04Paper
Linearization framework for collision attacks: application to CubeHash and MD62009-12-15Paper
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher2009-12-09Paper
Cryptanalysis of RadioGatún2009-08-11Paper
Inside the Hypercube2009-06-25Paper
Hash Functions and the (Amplified) Boomerang Attack2009-03-10Paper
On Building Hash Functions from Multivariate Quadratic Equations2009-03-06Paper
Slide Attacks on a Class of Hash Functions2009-02-10Paper
How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions2009-01-27Paper
Collisions on SHA-0 in One Hour2008-09-18Paper
Security Analysis of Constructions Combining FIL Random Oracles2008-09-16Paper
Cryptanalysis of FORK-2562008-09-16Paper
Cryptanalysis of Grindahl2008-05-15Paper
Cryptanalysis of T-Function-Based Hash Functions2008-05-06Paper
Combining Compression Functions and Block Cipher-Based Hash Functions2008-04-24Paper
Linear Cryptanalysis of the TSC Family of Stream Ciphers2008-03-18Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper

Research outcomes over time

This page was built for person: Thomas Peyrin