Gaëtan Leurent

Orcid: 0000-0001-5903-9055

Affiliations:
  • Inria, Paris, France


According to our database1, Gaëtan Leurent authored at least 85 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Corrigendum to Fast AES-Based Universal Hash Functions and MACs.
IACR Trans. Symmetric Cryptol., 2025

Note: Full-round distinguisher for Synergy.
IACR Cryptol. ePrint Arch., 2025

Cryptanalysis of Full SCARF.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Transistor: a TFHE-Friendly Stream Cipher.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
IACR Trans. Symmetric Cryptol., 2024

Improved Boomerang Attacks on 6-Round AES.
IACR Cryptol. ePrint Arch., 2024

Partial Sums Meet FFT: Improved Attack on 6-Round AES.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Improving Generic Attacks Using Exceptional Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Cryptanalysis of Algebraic Verifiable Delay Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Symmetric Cryptanalysis Beyond Primitives.
, 2024

2023
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation.
IACR Cryptol. ePrint Arch., 2023

Truncated Boomerang Attacks and Application to AES-Based Ciphers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Algebraic Attacks against Some Arithmetization-Oriented Primitives.
IACR Trans. Symmetric Cryptol., 2022

2021
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
J. Cryptol., 2021

Practical Key Recovery Attacks on FlexAEAD.
IACR Cryptol. ePrint Arch., 2021

New Representations of the AES Key Schedule.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Clustering Effect in Simon and Simeck.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Quantum Linearization Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

QCB: Efficient Quantum-Secure Authenticated Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Preface to Volume 2020, Issue 1.
IACR Trans. Symmetric Cryptol., 2020

Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
IACR Trans. Symmetric Cryptol., 2020

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

Cryptanalysis of Forkciphers.
IACR Trans. Symmetric Cryptol., 2020

SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
Proceedings of the 29th USENIX Security Symposium, 2020

Universal Forgery Attack Against GCM-RUP.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Generic Attacks on Hash Combiners.
IACR Cryptol. ePrint Arch., 2019

From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Lightweight MACs from Universal Hash Functions.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2018
MDS Matrices with Lightweight Circuits.
IACR Cryptol. ePrint Arch., 2018

The Missing Difference Problem, and Its Applications to Counter Mode Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Generic Attacks Against Beyond-Birthday-Bound MACs.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Cryptanalysis of MORUS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2016
Quantum Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2016

Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Key Recovery Attack Against 2.5-Round \pi -Cipher.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Breaking Symmetric Cryptosystems Using Quantum Period Finding.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Differential and Linear Cryptanalysis of ARX with Partitioning - Application to FEAL and Chaskey.
IACR Cryptol. ePrint Arch., 2015

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version).
IACR Cryptol. ePrint Arch., 2015

Differential Forgery Attack Against LAC.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Construction of Lightweight S-Boxes Using Feistel and MISTY Structures.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Cryptanalysis of Feistel Networks with Secret Round Functions.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

The Sum Can Be Weaker Than Each Part.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

SPRING: Fast Pseudorandom Functions from Rounded Ring Products.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Hardware Implementation and Side-Channel Analysis of Lapin.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Improved Generic Attacks against Hash-Based MACs and HAIFA.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Time-Memory Trade-Offs for Near-Collisions.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Cryptanalysis of WIDEA.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Construction of Differential Characteristics in ARX Designs Application to Skein.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

New Generic Attacks against Hash-Based MACs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Cryptanalysis of the "Kindle" Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Narrow-Bicliques: Cryptanalysis of Full IDEA.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Boomerang Attacks on Hash Function Using Auxiliary Differentials.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Analysis of Differential Attacks in ARX Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
New Insights on Impossible Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Near-Collisions on the Compression Function of BMW.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Quantum Preimage and Collision Attacks on CubeHash.
IACR Cryptol. ePrint Arch., 2010

Security Analysis of SIMD.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round <i>Lesamnta</i> and <i>SHAvite-3</i><sub>512</sub>.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Cryptanalysis of ESSENCE.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Another Look at Complementation Properties.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Practical Key Recovery Attack against Secret-IV Edon-.
Proceedings of the Topics in Cryptology, 2010

Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Proceedings of the Progress in Cryptology, 2010

2009
Practical Key Recovery Attack against Secret-prefix Edon-R.
IACR Cryptol. ePrint Arch., 2009

Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3<sub>512</sub>.
IACR Cryptol. ePrint Arch., 2009

How Risky Is the Random-Oracle Model?
Proceedings of the Advances in Cryptology, 2009

Practical Electromagnetic Template Attack on HMAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication.
Int. J. Appl. Cryptogr., 2008

MD4 is Not One-Way.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
Proceedings of the Topics in Cryptology, 2008

2007
Automatic Search of Differential Path in MD4.
IACR Cryptol. ePrint Arch., 2007

Message Freedom in MD4 and MD5 Collisions: Application to APOP.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Proceedings of the Advances in Cryptology, 2007

2005
An Analysis of the XSL Algorithm.
Proceedings of the Advances in Cryptology, 2005


  Loading...