Léo Perrin

From MaRDI portal
(Redirected from Person:398955)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The algebraic FreeLunch: efficient Gröbner basis attacks against arithmetization-oriented primitives2024-12-13Paper
New design techniques for efficient arithmetization-oriented hash functions: \texttt{Anemoi} permutations and \texttt{Jive} compression mode
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions2023-03-21Paper
On the algebraic degree of iterated power functions
Designs, Codes and Cryptography
2023-03-17Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Cryptanalysis results on spook. Bringing full-round shadow-512 to the light2022-12-07Paper
Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)2022-12-07Paper
Constructing more quadratic APN functions with the QAM method
Cryptography and Communications
2022-11-11Paper
Recovering or Testing Extended-Affine Equivalence
IEEE Transactions on Information Theory
2022-10-11Paper
Feistel structures for MPC, and more2022-08-25Paper
A further study of quadratic APN permutations in dimension nine
Finite Fields and their Applications
2022-05-09Paper
Trims and extensions of quadratic APN functions
Designs, Codes and Cryptography
2022-03-31Paper
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
Journal of Cryptology
2021-11-24Paper
On subspaces of Kloosterman zeros and permutations of the form \(L_1(x^{-1})+L_2(x)\)
(available as arXiv preprint)
2021-10-04Paper
Boomerang uniformity of popular S-box constructions
Designs, Codes and Cryptography
2020-09-22Paper
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
Journal of Cryptology
2020-06-15Paper
Anomalies and vector space search: tools for S-box analysis2020-05-20Paper
If a generalised butterfly is APN then it operates on 6 bits
Cryptography and Communications
2020-05-12Paper
On subspaces of Kloosterman zeros and permutations of the form $L_1(x^{-1})+L_2(x)$
(available as arXiv preprint)
2020-03-31Paper
On CCZ-equivalence, extended-affine equivalence, and function twisting
Finite Fields and their Applications
2019-03-27Paper
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$
IEEE Transactions on Information Theory
2018-06-27Paper
Algebraic insights into the secret Feistel network
Fast Software Encryption
2018-05-09Paper
Symmetrically and asymmetrically hard cryptography2018-02-23Paper
Design Strategies for ARX with Provable Bounds: Sparx and LAX
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Cryptanalysis of Feistel networks with secret round functions
Lecture Notes in Computer Science
2016-05-19Paper
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Lecture Notes in Computer Science
2015-12-10Paper
Differential analysis and meet-in-the-middle attack against round-reduced TWINE
Fast Software Encryption
2015-09-18Paper
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
Fast Software Encryption
2015-09-18Paper
Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-64
Fast Software Encryption
2015-09-18Paper
More differentially 6-uniform power functions
Designs, Codes and Cryptography
2014-08-18Paper


Research outcomes over time


This page was built for person: Léo Perrin