Pierre Karpman

According to our database1, Pierre Karpman authored at least 18 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

2021
Computing the Characteristic Polynomial of Generic Toeplitz-like and Hankel-like Matrices.
Proceedings of the ISSAC '21: International Symposium on Symbolic and Algebraic Computation, 2021

Fast Verification of Masking Schemes in Characteristic Two.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2019
High-order private multiplication in characteristic two revisited.
IACR Cryptol. ePrint Arch., 2019

2018
Short Non-Malleable Codes from Related-Key Secure Block Ciphers.
IACR Cryptol. ePrint Arch., 2018

New Instantiations of the CRYPTO 2017 Masking Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
The First Collision for Full SHA-1.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Analyse de primitives symétriques. (Analysis of symmetric primitives).
PhD thesis, 2016

Freestart Collision for Full SHA-1.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Efficient and Provable White-Box Primitives.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions.
IACR Cryptol. ePrint Arch., 2015

From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour.
Proceedings of the Information Security - 18th International Conference, 2015

Practical Free-Start Collision Attacks on 76-step SHA-1.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Key-Recovery Attacks on ASASA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Analysis of BLAKE2.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
Security Amplification against Meet-in-the-Middle Attacks Using Whitening.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013


  Loading...