Available identifiers
zbMath Open derbez.patrick MaRDI QID Q778908
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv . We are working on additional sources - please check back here soon!
Publication Date of Publication Type Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT 2024-12-13 Paper A generic algorithm for efficient key recovery in differential attacks -- and its associated tool 2024-11-12 Paper A CP-based automatic tool for instantiating truncated differential characteristics 2024-10-23 Paper A simpler model for recovering superpoly on Trivium 2024-10-14 Paper Differential meet-in-the-middle cryptanalysis 2024-02-02 Paper Revisiting related-key boomerang attacks on AES using computer-aided tool 2023-08-25 Paper New algorithm for exhausting optimal permutations for generalized Feistel networks 2023-08-14 Paper Cryptanalysis results on spook. Bringing full-round shadow-512 to the light 2022-12-07 Paper Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 2021-12-08 Paper Linearly equivalent s-boxes and the division property 2020-10-07 Paper Cryptanalysis of \texttt{SKINNY} in the framework of the \texttt{SKINNY} 2018--2019 cryptanalysis competition 2020-07-21 Paper Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE 2020-06-15 Paper Troika: a ternary cryptographic hash function 2020-01-09 Paper Variants of the AES key schedule for better truncated differential bounds 2019-02-20 Paper Programming the Demirci-Selçuk meet-in-the-middle attack with constraints 2019-01-23 Paper Key-recovery attacks on \(\mathsf{ASASA}\) 2018-09-14 Paper Note on Impossible Differential Attacks 2018-05-09 Paper Low-Data Complexity Attacks on AES 2017-06-08 Paper Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks 2016-10-27 Paper Key-Recovery Attacks on ASASA 2016-03-23 Paper Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE 2015-09-18 Paper Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE 2015-09-18 Paper Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES 2015-09-18 Paper Faster Chosen-Key Distinguishers on Reduced-Round AES 2014-08-20 Paper Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting 2013-05-31 Paper Automatic Search of Attacks on Round-Reduced AES and Applications 2011-08-12 Paper Bounded Cohomology and $l_1$-Homology of Three-Manifolds 2008-09-25 Paper
Research outcomes over time
This page was built for person: Patrick Derbez