Thomas Peyrin

According to our database1, Thomas Peyrin authored at least 97 papers between 2004 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

The Deoxys AEAD Family.
J. Cryptol., 2021

Exploring Differential-Based Distinguishers and Forgeries for ASCON.
IACR Cryptol. ePrint Arch., 2021

A Deeper Look at Machine Learning-Based Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
IACR Cryptol. ePrint Arch., 2021

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

Improved Heuristics for Short Linear Programs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
IACR Cryptol. ePrint Arch., 2020

Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates.
IACR Cryptol. ePrint Arch., 2020

GIFT-COFB.
IACR Cryptol. ePrint Arch., 2020

Fixslicing: A New GIFT Representation.
IACR Cryptol. ePrint Arch., 2020

NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.
IACR Trans. Symmetric Cryptol., 2019

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1.
IACR Cryptol. ePrint Arch., 2019

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2019

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms.
IACR Cryptol. ePrint Arch., 2019

2018
Boomerang Connectivity Table: A New Cryptanalysis Tool.
IACR Cryptol. ePrint Arch., 2018

Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018

Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018

Protecting block ciphers against differential fault attacks without re-keying.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

2017
Optimizing Implementations of Lightweight Building Blocks.
IACR Trans. Symmetric Cryptol., 2017

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Practical Evaluation of FSE 2016 Customized Encoding Countermeasure.
IACR Trans. Symmetric Cryptol., 2017

Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017

Optimizing Implementations of Lightweight Building Blocks.
IACR Cryptol. ePrint Arch., 2017

Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
IACR Cryptol. ePrint Arch., 2017

ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

GIFT: A Small Present.
IACR Cryptol. ePrint Arch., 2017

GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Cryptanalysis of Full RIPEMD-128.
J. Cryptol., 2016

Human-readable Proof of the Related-Key Security of AES-128.
IACR Cryptol. ePrint Arch., 2016

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.
IACR Cryptol. ePrint Arch., 2016

2015
Collision Attack on Grindahl.
J. Cryptol., 2015

Freestart collision on full SHA-1.
IACR Cryptol. ePrint Arch., 2015

Lightweight MDS Involution Matrices.
IACR Cryptol. ePrint Arch., 2015

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2015

Practical Free-Start Collision Attacks on 76-step SHA-1.
IACR Cryptol. ePrint Arch., 2015

Security Analysis of PRINCE.
IACR Cryptol. ePrint Arch., 2015

Known-key Distinguisher on Full PRESENT.
IACR Cryptol. ePrint Arch., 2015

2014
Improved Cryptanalysis of AES-like Permutations.
J. Cryptol., 2014

Generic Universal Forgery Attack on Iterative Hash-based MACs.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of JAMBU.
IACR Cryptol. ePrint Arch., 2014

New Generic Attacks Against Hash-based MACs.
IACR Cryptol. ePrint Arch., 2014

FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.
IACR Cryptol. ePrint Arch., 2014

Tweaks and Keys for Block Ciphers: the TWEAKEY Framework.
IACR Cryptol. ePrint Arch., 2014

A Very Compact FPGA Implementation of LED and PHOTON.
IACR Cryptol. ePrint Arch., 2014

Breaking POET Authentication with a Single Query.
IACR Cryptol. ePrint Arch., 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014

Updates on Generic Attacks against HMAC and NMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Improved Cryptanalysis of Reduced RIPEMD-160.
IACR Cryptol. ePrint Arch., 2013

Multiple Limited-Birthday Distinguishers and Applications.
IACR Cryptol. ePrint Arch., 2013

Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful.
IACR Cryptol. ePrint Arch., 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128.
IACR Cryptol. ePrint Arch., 2013

Implementing Lightweight Block Ciphers on x86 Architectures.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of Zorro.
IACR Cryptol. ePrint Arch., 2013

Security challenges in automotive hardware/software architecture design.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
On the (In)Security of IDEA in Various Hashing Modes.
IACR Cryptol. ePrint Arch., 2012

Generic Related-key Attacks for HMAC.
IACR Cryptol. ePrint Arch., 2012

SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks.
IACR Cryptol. ePrint Arch., 2012

The LED Block Cipher.
IACR Cryptol. ePrint Arch., 2012

Practical Cryptanalysis of ARMADILLO2.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Improved Rebound Attack on the Finalist Grøstl.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Analysis of reduced-SHAvite-3-256 v2.
IACR Cryptol. ePrint Arch., 2011

The PHOTON Family of Lightweight Hash Functions.
IACR Cryptol. ePrint Arch., 2011

Unaligned Rebound Attack - Application to Keccak.
IACR Cryptol. ePrint Arch., 2011

2010
Improved Differential Attacks for ECHO and Grostl.
IACR Cryptol. ePrint Arch., 2010

Side-channel Analysis of Six SHA-3 Candidates.
IACR Cryptol. ePrint Arch., 2010

Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
IACR Cryptol. ePrint Arch., 2010

A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Proceedings of the Progress in Cryptology, 2010

2009
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Cryptanalysis of ESSENCE.
IACR Cryptol. ePrint Arch., 2009

Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations.
IACR Cryptol. ePrint Arch., 2009

Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
IACR Cryptol. ePrint Arch., 2009

Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Cryptanalysis of the ESSENCE Family of Hash Functions.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Cryptanalysis of CubeHash.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Slide Attacks on a Class of Hash Functions.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of RadioGatun.
IACR Cryptol. ePrint Arch., 2008

Inside the Hypercube.
IACR Cryptol. ePrint Arch., 2008

How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Proceedings of the Provable Security, Second International Conference, 2008

Collisions on SHA-0 in One Hour.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Security Analysis of Constructions Combining FIL Random Oracles.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Hash Functions and the (Amplified) Boomerang Attack.
Proceedings of the Advances in Cryptology, 2007

Cryptanalysis of Grindahl.
Proceedings of the Advances in Cryptology, 2007

On Building Hash Functions from Multivariate Quadratic Equations.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Cryptanalysis of T-Function-Based Hash Functions.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Combining Compression Functions and Block Cipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2006

2005
The Pairing Problem with User Interaction.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Linear Cryptanalysis of the TSC Family of Stream Ciphers.
Proceedings of the Advances in Cryptology, 2005

2004
Advances in Alternative Non-adjacent Form Representations.
Proceedings of the Progress in Cryptology, 2004


  Loading...