The following pages link to Thomas Peyrin (Q321320):
Displaying 50 items.
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- Improved cryptanalysis of AES-like permutations (Q484330) (← links)
- On the cost of ASIC hardware crackers: a SHA-1 case study (Q826307) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- Boomerang Connectivity Table: a new cryptanalysis tool (Q1648856) (← links)
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication (Q1675192) (← links)
- Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption (Q1746847) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- A deeper look at machine learning-based cryptanalysis (Q2056717) (← links)
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066) (← links)
- From collisions to chosen-prefix collisions application to full SHA-1 (Q2292706) (← links)
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function (Q2798614) (← links)
- Freestart Collision for Full SHA-1 (Q2820493) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 (Q2845672) (← links)
- New Generic Attacks against Hash-Based MACs (Q2867143) (← links)
- Improved Cryptanalysis of Reduced RIPEMD-160 (Q2867171) (← links)
- Limited-Birthday Distinguishers for Hash Functions (Q2867172) (← links)
- Updates on Generic Attacks against HMAC and NMAC (Q2874501) (← links)
- SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks (Q2900625) (← links)
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework (Q2936613) (← links)
- A Very Compact FPGA Implementation of LED and PHOTON (Q2945392) (← links)
- Security Analysis of PRINCE (Q2946873) (← links)
- Cryptanalysis of JAMBU (Q2946946) (← links)
- Lightweight MDS Involution Matrices (Q2946958) (← links)
- Implementing Lightweight Block Ciphers on x86 Architectures (Q2949539) (← links)
- Multiple Limited-Birthday Distinguishers and Applications (Q2949549) (← links)
- Analysis of Reduced-SHAvite-3-256 v2 (Q3013078) (← links)
- Cryptanalysis of the ESSENCE Family of Hash Functions (Q3056877) (← links)
- A Forward-Secure Symmetric-Key Derivation Protocol (Q3058660) (← links)
- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 (Q3163098) (← links)
- The LED Block Cipher (Q3172972) (← links)
- Cryptanalysis of RadioGatún (Q3391567) (← links)
- Known-Key Distinguisher on Full PRESENT (Q3457123) (← links)
- Practical Free-Start Collision Attacks on 76-step SHA-1 (Q3457131) (← links)
- Cryptanalysis of Grindahl (Q3498399) (← links)
- Cryptanalysis of FORK-256 (Q3524879) (← links)
- Security Analysis of Constructions Combining FIL Random Oracles (Q3524885) (← links)
- Collisions on SHA-0 in One Hour (Q3525659) (← links)
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 (Q3558326) (← links)
- Cryptanalysis of ESSENCE (Q3577956) (← links)
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations (Q3577971) (← links)
- Improved Differential Attacks for ECHO and Grøstl (Q3582765) (← links)
- Side-Channel Analysis of Six SHA-3 Candidates (Q3583447) (← links)
- Slide Attacks on a Class of Hash Functions (Q3600370) (← links)
- On Building Hash Functions from Multivariate Quadratic Equations (Q3608906) (← links)
- Hash Functions and the (Amplified) Boomerang Attack (Q3612553) (← links)
- Inside the Hypercube (Q3634494) (← links)
- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 (Q3650714) (← links)