Patrick Derbez

Orcid: 0000-0003-0478-8483

Affiliations:
  • University of Rennes 1, France
  • École Normale Supérieure, Paris, France


According to our database1, Patrick Derbez authored at least 52 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Extending the Quasidifferential Framework: From Fixed-Key to Expected Differential Probability.
IACR Trans. Symmetric Cryptol., 2025

Minimalist Model for Impossible Differentials.
IACR Cryptol. ePrint Arch., 2025

A note on a recent attack against SPEEDY-7-192.
IACR Cryptol. ePrint Arch., 2025

SPEEDY: Caught at Last.
IACR Cryptol. ePrint Arch., 2025

ChiLow and ChiChi: New Constructions for Code Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Cryptanalysis of Full-Round BipBip.
IACR Trans. Symmetric Cryptol., 2024

Key Committing Attacks against AES-based AEAD Schemes.
IACR Trans. Symmetric Cryptol., 2024

Equivalence of Generalised Feistel Networks.
IACR Cryptol. ePrint Arch., 2024

New Models for the Cryptanalysis of ASCON.
IACR Cryptol. ePrint Arch., 2024

A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Alternative Key Schedules for the AES.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Related-Key Differential Analysis of the AES.
IACR Trans. Symmetric Cryptol., 2023

A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics - Extended Version.
IACR Cryptol. ePrint Arch., 2023

A CP-Based Automatic Tool for Instantiating Truncated Differential Characteristics.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

Differential Meet-In-The-Middle Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Implementation of attacks on HALFLOOP-24.
Dataset, September, 2022

Breaking HALFLOOP-24.
IACR Trans. Symmetric Cryptol., 2022

Fast MILP Models for Division Property.
IACR Cryptol. ePrint Arch., 2022

New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Tools and Algorithms for Cryptanalysis. (Outils et Algorithmes pour la Cryptanalyse).
, 2022

2021
Fake Near Collisions Attacks.
IACR Cryptol. ePrint Arch., 2021

Increasing Precision of Division Property.
IACR Cryptol. ePrint Arch., 2021

Catching the Fastest Boomerangs - Application to SKINNY.
IACR Cryptol. ePrint Arch., 2021

A Simpler Model for Recovering Superpoly onTrivium.
IACR Cryptol. ePrint Arch., 2021

A Simpler Model for Recovering Superpoly on Trivium.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Efficient Methods to Search for Best Differential Characteristics on SKINNY.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Cryptanalysis Results on Spook.
IACR Cryptol. ePrint Arch., 2020

SKINNY with Scalpel - Comparing Tools for Differential Analysis.
IACR Cryptol. ePrint Arch., 2020

Troika: a ternary cryptographic hash function.
Des. Codes Cryptogr., 2020

Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2019

On Recovering Affine Encodings in White-Box Implementations.
IACR Cryptol. ePrint Arch., 2019

Linearly equivalent S-boxes and the Division Property.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
Cryptanalysis of AES-PRF and Its Dual.
IACR Trans. Symmetric Cryptol., 2018

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2016
Note on Impossible Differential Attacks.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Key-Recovery Attacks on ASASA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2013
Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES).
PhD thesis, 2013

Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
Proceedings of the Advances in Cryptology, 2013

2012
Faster Chosen-Key Distinguishers on Reduced-Round AES.
Proceedings of the Progress in Cryptology, 2012

2011
Automatic Search of Attacks on Round-Reduced AES and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Meet-in-the-Middle and Impossible Differential Fault Analysis on AES.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Low Data Complexity Attacks on AES.
IACR Cryptol. ePrint Arch., 2010


  Loading...