Thomas Peyrin

Orcid: 0000-0002-2690-9197

Affiliations:
  • Nanyang Technological University, Singapore


According to our database1, Thomas Peyrin authored at least 121 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Navigating the Deep: Signature Extraction on Deep Neural Networks.
CoRR, June, 2025

AQUATIC-Diff: Additive Quantization for Truly Tiny Compressed Diffusion Models.
CoRR, June, 2025

Corrigendum to Fast AES-Based Universal Hash Functions and MACs.
IACR Trans. Symmetric Cryptol., 2025

Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers.
IACR Cryptol. ePrint Arch., 2025

Periodic Table of Cryptanalysis: Geometric Approach with Different Bases.
IACR Cryptol. ePrint Arch., 2025

AsconAEAD128 Revisited in the Multi-user Setting.
IACR Cryptol. ePrint Arch., 2025

The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

Unlocking Mix-Basis Potential: Geometric Approach for Combined Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
IACR Trans. Symmetric Cryptol., 2024

uKNIT: Breaking Round-alignment for Cipher Design - Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher.
IACR Cryptol. ePrint Arch., 2024

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
IACR Commun. Cryptol., 2024

Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2023
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP.
IACR Trans. Symmetric Cryptol., 2023

A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making.
CoRR, 2023

TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture.
CoRR, 2023

Neural Network-Based Rule Models with Truth Tables.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Fully Automated Differential-Linear Attacks Against ARX Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2022

Exploring Integrity of AEADs with Faults: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2022

Mind Your Path: On (Key) Dependencies in Differential Characteristics.
IACR Cryptol. ePrint Arch., 2022

Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha.
IACR Cryptol. ePrint Arch., 2022

Finding All Impossible Differentials When Considering the DDT.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022

Truth-Table Net: A New Convolutional Architecture Encodable by Design into SAT Formulas.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

2021
The Deoxys AEAD Family.
J. Cryptol., 2021

Exploring Differential-Based Distinguishers and Forgeries for ASCON.
IACR Cryptol. ePrint Arch., 2021

A Deeper Look at Machine Learning-Based Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates.
IACR Cryptol. ePrint Arch., 2020

GIFT-COFB.
IACR Cryptol. ePrint Arch., 2020

Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V.
IACR Cryptol. ePrint Arch., 2020

Fixslicing: A New GIFT Representation.
IACR Cryptol. ePrint Arch., 2020

SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
Proceedings of the 29th USENIX Security Symposium, 2020

NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.
IACR Trans. Symmetric Cryptol., 2019

Improved Heuristics for Short Linear Programs.
IACR Cryptol. ePrint Arch., 2019

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms.
IACR Cryptol. ePrint Arch., 2019

From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

SoK: On DFA Vulnerabilities of Substitution-Permutation Networks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018

Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018

Protecting block ciphers against differential fault attacks without re-keying.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

Boomerang Connectivity Table: A New Cryptanalysis Tool.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Optimizing Implementations of Lightweight Building Blocks.
IACR Trans. Symmetric Cryptol., 2017

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Practical Evaluation of FSE 2016 Customized Encoding Countermeasure.
IACR Trans. Symmetric Cryptol., 2017

Optimizing Implementations of Lightweight Building Blocks.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

GIFT: A Small Present.
IACR Cryptol. ePrint Arch., 2017

Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Collision Attack on GRINDAHL.
IACR Cryptol. ePrint Arch., 2016

Human-readable Proof of the Related-Key Security of AES-128.
IACR Cryptol. ePrint Arch., 2016

Freestart Collision for Full SHA-1.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Improved Cryptanalysis of AES-like Permutations.
IACR Cryptol. ePrint Arch., 2015

Lightweight MDS Involution Matrices.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Cryptanalysis of JAMBU.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Practical Free-Start Collision Attacks on 76-step SHA-1.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Known-Key Distinguisher on Full PRESENT.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Breaking POET Authentication with a Single Query.
IACR Cryptol. ePrint Arch., 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

A Very Compact FPGA Implementation of LED and PHOTON.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Generic Universal Forgery Attack on Iterative Hash-Based MACs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Updates on Generic Attacks against HMAC and NMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Tweaks and Keys for Block Ciphers: The TWEAKEY Framework.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Cryptanalysis of Zorro.
IACR Cryptol. ePrint Arch., 2013

Multiple Limited-Birthday Distinguishers and Applications.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Implementing Lightweight Block Ciphers on x86 Architectures.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Security Analysis of PRINCE.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Cryptanalysis of Full RIPEMD-128.
Proceedings of the Advances in Cryptology, 2013

Security challenges in automotive hardware/software architecture design.
Proceedings of the Design, Automation and Test in Europe, 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Improved Cryptanalysis of Reduced RIPEMD-160.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

New Generic Attacks against Hash-Based MACs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Practical Cryptanalysis of ARMADILLO2.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Improved Rebound Attack on the Finalist Grøstl.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Unaligned Rebound Attack: Application to Keccak.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

On the (In)Security of IDEA in Various Hashing Modes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Generic Related-Key Attacks for HMAC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Analysis of Reduced-SHAvite-3-256 v2.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

The PHOTON Family of Lightweight Hash Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

The LED Block Cipher.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Cryptanalysis of ESSENCE.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Improved Differential Attacks for ECHO and Grøstl.
Proceedings of the Advances in Cryptology, 2010

Side-Channel Analysis of Six SHA-3 Candidates.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Proceedings of the Progress in Cryptology, 2010

Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Cryptanalysis of RadioGatún.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Cryptanalysis of the ESSENCE Family of Hash Functions.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
Proceedings of the Advances in Cryptology, 2009

Cryptanalysis of CubeHash.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Inside the Hypercube.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Proceedings of the Provable Security, Second International Conference, 2008

Collisions on SHA-0 in One Hour.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Slide Attacks on a Class of Hash Functions.
Proceedings of the Advances in Cryptology, 2008

2007
Security Analysis of Constructions Combining FIL Random Oracles.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Hash Functions and the (Amplified) Boomerang Attack.
Proceedings of the Advances in Cryptology, 2007

Cryptanalysis of Grindahl.
Proceedings of the Advances in Cryptology, 2007

On Building Hash Functions from Multivariate Quadratic Equations.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Cryptanalysis of T-Function-Based Hash Functions.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Combining Compression Functions and Block Cipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2006

2005
The Pairing Problem with User Interaction.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Linear Cryptanalysis of the TSC Family of Stream Ciphers.
Proceedings of the Advances in Cryptology, 2005

2004
Advances in Alternative Non-adjacent Form Representations.
Proceedings of the Progress in Cryptology, 2004


  Loading...