David Gérault

Orcid: 0000-0001-8583-0668

Affiliations:
  • University of Surrey, UK
  • Nanyang Technological University, Singapore (former)
  • University of Clermont Auvergne, LIMOS, Clermont-Ferrand, France (PhD 2018)


According to our database1, David Gérault authored at least 34 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.
IACR Cryptol. ePrint Arch., 2024

Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK.
IACR Cryptol. ePrint Arch., 2024

2023
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP.
IACR Trans. Symmetric Cryptol., 2023

NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher.
IACR Cryptol. ePrint Arch., 2023

Fully Automated Differential-Linear Attacks against ARX Ciphers.
IACR Cryptol. ePrint Arch., 2023

CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives.
IACR Cryptol. ePrint Arch., 2023

Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

2022
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences.
IACR Cryptol. ePrint Arch., 2022

And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael.
Proceedings of the Progress in Cryptology, 2022

2021
Exploring Differential-Based Distinguishers and Forgeries for ASCON.
IACR Cryptol. ePrint Arch., 2021

A Deeper Look at Machine Learning-Based Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

A Survey of Technologies for Building Trusted Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models.
Proceedings of the Financial Cryptography and Data Security, 2021

Mechanised Models and Proofs for Distance-Bounding.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

From Relay Attacks to Distance-Bounding Protocols.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments.
IACR Cryptol. ePrint Arch., 2020

Computing AES related-key differential characteristics with constraint programming.
Artif. Intell., 2020

NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
Verifiable and Private Oblivious Polynomial Evaluation.
Proceedings of the Information Security Theory and Practice, 2019

Distance bounding under different assumptions: opinion.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Here and There at Once, with my Mobile Phone!
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Towards Secure TMIS Protocols.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
Security analysis of contactless communication protocols. (Analyse de sécurité des protocoles de communication sans contact).
PhD thesis, 2018

Revisiting AES related-key differential attacks with constraint programming.
Inf. Process. Lett., 2018

2017
Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Cryptol. ePrint Arch., 2017

Verifiable Private Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2017

Breaking and Fixing the HB+DB protocol.
IACR Cryptol. ePrint Arch., 2017

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

Using Constraint Programming to solve a Cryptanalytic Problem.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Related-Key Cryptanalysis of Midori.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Constraint Programming Models for Chosen Key Differential Cryptanalysis.
Proceedings of the Principles and Practice of Constraint Programming, 2016

2015
Survey of Distance Bounding Protocols and Threats.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015


  Loading...