Patrick Derbez

Affiliations:
  • University of Rennes 1, France
  • École Normale Supérieure, Paris, France


According to our database1, Patrick Derbez authored at least 29 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Fake Near Collisions Attacks.
IACR Cryptol. ePrint Arch., 2021

Increasing Precision of Division Property.
IACR Cryptol. ePrint Arch., 2021

Catching the Fastest Boomerangs - Application to SKINNY.
IACR Cryptol. ePrint Arch., 2021

A Simpler Model for Recovering Superpoly onTrivium.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
IACR Cryptol. ePrint Arch., 2021

Efficient Methods to Search for Best Differential Characteristics on SKINNY.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
J. Cryptol., 2020

Cryptanalysis Results on Spook.
IACR Cryptol. ePrint Arch., 2020

SKINNY with Scalpel - Comparing Tools for Differential Analysis.
IACR Cryptol. ePrint Arch., 2020

Linearly equivalent S-boxes and the division property.
Des. Codes Cryptogr., 2020

Troika: a ternary cryptographic hash function.
Des. Codes Cryptogr., 2020

Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2019

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
Cryptanalysis of AES-PRF and Its Dual.
IACR Trans. Symmetric Cryptol., 2018

On Recovering Affine Encodings in White-Box Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Key-Recovery Attacks on ASASA.
J. Cryptol., 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018

2016
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
IACR Cryptol. ePrint Arch., 2016

Note on Impossible Differential Attacks.
IACR Cryptol. ePrint Arch., 2016

2015
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES.
IACR Cryptol. ePrint Arch., 2015

Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE.
IACR Cryptol. ePrint Arch., 2015

2013
Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES).
PhD thesis, 2013

2012
Low-Data Complexity Attacks on AES.
IEEE Trans. Inf. Theory, 2012

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
IACR Cryptol. ePrint Arch., 2012

Automatic Search of Attacks on round-reduced AES and Applications.
IACR Cryptol. ePrint Arch., 2012

Faster Chosen-Key Distinguishers on Reduced-Round AES.
Proceedings of the Progress in Cryptology, 2012

2011
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011


  Loading...