Yann Rotella

According to our database1, Yann Rotella authored at least 20 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
SoK: On Shallow Weak PRFs A Common Symmetric Building Block for MPC Protocols.
IACR Trans. Symmetric Cryptol., 2025

Transistor: a TFHE-Friendly Stream Cipher.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2023
Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Learning with Physical Rounding for Linear and Quadratic Leakage Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

On the Security of Keyed Hashing Based on Public Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
On the security of keyed hashing based on an unkeyed block function.
IACR Cryptol. ePrint Arch., 2022

Differential Analysis of the Ternary Hash Function Troika.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022

Breaking Panther.
Proceedings of the Progress in Cryptology, 2022

2021
Algebraic Collision Attacks on Keccak.
IACR Trans. Symmetric Cryptol., 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96.
IACR Trans. Symmetric Cryptol., 2020

The Subterranean 2.0 Cipher Suite.
IACR Trans. Symmetric Cryptol., 2020

2018
Mathématiques discrètes appliquées à la cryptographie symétrique. (Discrete Mathematics for symmetric cryptography).
PhD thesis, 2018

State-Recovery Attacks on Modified Ketje Jr.
IACR Trans. Symmetric Cryptol., 2018

On the Concrete Security of Goldreich's Pseudorandom Generator.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Cryptanalysis of MORUS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Boolean functions with restricted input and their robustness; application to the FLIP cipher.
IACR Cryptol. ePrint Arch., 2017

Proving Resistance Against Invariant Attacks: How to Choose the Round Constants.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Attacks Against Filter Generators Exploiting Monomial Mappings.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Cryptanalysis of the FLIP Family of Stream Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016


  Loading...