Thomas Peyrin

From MaRDI portal
Person:321320

Available identifiers

zbMath Open peyrin.thomasMaRDI QIDQ321320

List of research outcomes

PublicationDate of PublicationType
Fully automated differential-linear attacks against ARX ciphers2023-10-04Paper
DEFAULT: cipher level resistance against differential fault attack2023-05-12Paper
The MALICIOUS framework: embedding backdoors into tweakable block ciphers2022-12-07Paper
On the cost of ASIC hardware crackers: a SHA-1 case study2021-12-20Paper
A deeper look at machine learning-based cryptanalysis2021-12-08Paper
The \texttt{Deoxys} AEAD family2021-08-10Paper
GIFT: A Small Present2020-06-24Paper
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives2020-06-24Paper
From collisions to chosen-prefix collisions application to full SHA-12020-02-04Paper
Boomerang Connectivity Table: a new cryptanalysis tool2018-07-09Paper
Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption2018-04-26Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers2016-11-30Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS2016-10-27Paper
Cryptanalysis of full \texttt{RIPEMD-128}2016-10-13Paper
Freestart Collision for Full SHA-12016-09-09Paper
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function2016-04-13Paper
Collision attack on \({\mathtt Grindahl}\)2016-01-11Paper
Known-Key Distinguisher on Full PRESENT2015-12-10Paper
Practical Free-Start Collision Attacks on 76-step SHA-12015-12-10Paper
Implementing Lightweight Block Ciphers on x86 Architectures2015-10-01Paper
Multiple Limited-Birthday Distinguishers and Applications2015-10-01Paper
Security Analysis of PRINCE2015-09-18Paper
Cryptanalysis of JAMBU2015-09-18Paper
Lightweight MDS Involution Matrices2015-09-18Paper
A Very Compact FPGA Implementation of LED and PHOTON2015-09-10Paper
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison2015-07-21Paper
Improved cryptanalysis of AES-like permutations2015-01-07Paper
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework2015-01-06Paper
Updates on Generic Attacks against HMAC and NMAC2014-08-07Paper
Generic Universal Forgery Attack on Iterative Hash-Based MACs2014-05-27Paper
New Generic Attacks against Hash-Based MACs2013-12-10Paper
Improved Cryptanalysis of Reduced RIPEMD-1602013-12-10Paper
Limited-Birthday Distinguishers for Hash Functions2013-12-10Paper
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-1282013-09-02Paper
Cryptanalysis of Full RIPEMD-1282013-05-31Paper
Generic Related-Key Attacks for HMAC2013-03-19Paper
Improved Rebound Attack on the Finalist Grøstl2013-01-08Paper
Practical Cryptanalysis of ARMADILLO22013-01-08Paper
On the (In)Security of IDEA in Various Hashing Modes2013-01-08Paper
Unaligned Rebound Attack: Application to Keccak2013-01-08Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks2012-07-23Paper
The LED Block Cipher2011-10-07Paper
The PHOTON Family of Lightweight Hash Functions2011-08-12Paper
Analysis of Reduced-SHAvite-3-256 v22011-07-07Paper
A Forward-Secure Symmetric-Key Derivation Protocol2010-12-07Paper
Cryptanalysis of the ESSENCE Family of Hash Functions2010-11-23Paper
Distinguishers for the Compression Function and Output Transformation of Hamsi-2562010-10-25Paper
Improved Differential Attacks for ECHO and Grøstl2010-08-24Paper
Side-Channel Analysis of Six SHA-3 Candidates2010-08-17Paper
Cryptanalysis of ESSENCE2010-07-13Paper
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations2010-07-13Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-5122010-05-04Paper
Linearization Framework for Collision Attacks: Application to CubeHash and MD62009-12-15Paper
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher2009-12-09Paper
Cryptanalysis of RadioGatún2009-08-11Paper
Inside the Hypercube2009-06-25Paper
Hash Functions and the (Amplified) Boomerang Attack2009-03-10Paper
On Building Hash Functions from Multivariate Quadratic Equations2009-03-06Paper
Slide Attacks on a Class of Hash Functions2009-02-10Paper
How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions2009-01-27Paper
Collisions on SHA-0 in One Hour2008-09-18Paper
Cryptanalysis of FORK-2562008-09-16Paper
Security Analysis of Constructions Combining FIL Random Oracles2008-09-16Paper
Cryptanalysis of Grindahl2008-05-15Paper
Cryptanalysis of T-Function-Based Hash Functions2008-05-06Paper
Combining Compression Functions and Block Cipher-Based Hash Functions2008-04-24Paper
Linear Cryptanalysis of the TSC Family of Stream Ciphers2008-03-18Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Thomas Peyrin