Patrick Derbez

Affiliations:
  • University of Rennes 1, France
  • École Normale Supérieure, Paris, France


According to our database1, Patrick Derbez authored at least 45 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Key Committing Attacks against AES-based AEAD Schemes.
IACR Trans. Symmetric Cryptol., 2024

Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
IACR Cryptol. ePrint Arch., 2024

Equivalence of Generalised Feistel Networks.
IACR Cryptol. ePrint Arch., 2024

New Models for the Cryptanalysis of ASCON.
IACR Cryptol. ePrint Arch., 2024

Alternative Key Schedules for the AES.
IACR Cryptol. ePrint Arch., 2024

A generic algorithm for efficient key recovery in differential attacks - and its associated tool.
IACR Cryptol. ePrint Arch., 2024

2023
Related-Key Differential Analysis of the AES.
IACR Trans. Symmetric Cryptol., 2023

A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics - Extended Version.
IACR Cryptol. ePrint Arch., 2023

New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2023

A CP-Based Automatic Tool for Instantiating Truncated Differential Characteristics.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
Breaking HALFLOOP-24.
IACR Trans. Symmetric Cryptol., 2022

Fast MILP Models for Division Property.
IACR Cryptol. ePrint Arch., 2022

Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.
IACR Cryptol. ePrint Arch., 2022

Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

Tools and Algorithms for Cryptanalysis. (Outils et Algorithmes pour la Cryptanalyse).
, 2022

2021
Fake Near Collisions Attacks.
IACR Cryptol. ePrint Arch., 2021

Increasing Precision of Division Property.
IACR Cryptol. ePrint Arch., 2021

Catching the Fastest Boomerangs - Application to SKINNY.
IACR Cryptol. ePrint Arch., 2021

A Simpler Model for Recovering Superpoly onTrivium.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
IACR Cryptol. ePrint Arch., 2021

A Simpler Model for Recovering Superpoly on Trivium.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Efficient Methods to Search for Best Differential Characteristics on SKINNY.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
J. Cryptol., 2020

Cryptanalysis Results on Spook.
IACR Cryptol. ePrint Arch., 2020

SKINNY with Scalpel - Comparing Tools for Differential Analysis.
IACR Cryptol. ePrint Arch., 2020

Linearly equivalent S-boxes and the division property.
Des. Codes Cryptogr., 2020

Troika: a ternary cryptographic hash function.
Des. Codes Cryptogr., 2020

Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2019

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
Cryptanalysis of AES-PRF and Its Dual.
IACR Trans. Symmetric Cryptol., 2018

On Recovering Affine Encodings in White-Box Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Key-Recovery Attacks on ASASA.
J. Cryptol., 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018

2016
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
IACR Cryptol. ePrint Arch., 2016

Note on Impossible Differential Attacks.
IACR Cryptol. ePrint Arch., 2016

2015
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES.
IACR Cryptol. ePrint Arch., 2015

Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE.
IACR Cryptol. ePrint Arch., 2015

2013
Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES).
PhD thesis, 2013

2012
Low-Data Complexity Attacks on AES.
IEEE Trans. Inf. Theory, 2012

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
IACR Cryptol. ePrint Arch., 2012

Automatic Search of Attacks on round-reduced AES and Applications.
IACR Cryptol. ePrint Arch., 2012

Faster Chosen-Key Distinguishers on Reduced-Round AES.
Proceedings of the Progress in Cryptology, 2012

2011
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011


  Loading...