Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gaëtan Leurent
@book{DBLP:books/hal/Leurent24, author = {Ga{\"{e}}tan Leurent}, title = {Symmetric Cryptanalysis Beyond Primitives}, year = {2024}, url = {https://tel.archives-ouvertes.fr/tel-04406617}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/hal/Leurent24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeurentP24, author = {Ga{\"{e}}tan Leurent and Clara Pernot}, title = {Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {441--458}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.441-458}, doi = {10.46586/TOSC.V2024.I1.441-458}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LeurentP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainBLS24, author = {Xavier Bonnetain and Rachelle Heim Boissier and Ga{\"{e}}tan Leurent and Andr{\'{e}} Schrottenloher}, title = {Improving Generic Attacks Using Exceptional Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2024}, url = {https://eprint.iacr.org/2024/488}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainBLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BariantL23, author = {Augustin Bariant and Ga{\"{e}}tan Leurent}, editor = {Carmit Hazay and Martijn Stam}, title = {Truncated Boomerang Attacks and Application to AES-Based Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {3--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_1}, doi = {10.1007/978-3-031-30634-1\_1}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BariantL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanGKLMM23, author = {Orr Dunkelman and Shibam Ghosh and Nathan Keller and Ga{\"{e}}tan Leurent and Avichai Marmor and Victor Mollimard}, title = {Partial Sums Meet {FFT:} Improved Attack on 6-Round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1659}, year = {2023}, url = {https://eprint.iacr.org/2023/1659}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanGKLMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentP23, author = {Ga{\"{e}}tan Leurent and Clara Pernot}, title = {Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1803}, year = {2023}, url = {https://eprint.iacr.org/2023/1803}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LeurentP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanEKKLS22, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Ga{\"{e}}tan Leurent and Markus Schofnegger}, title = {Practical key recovery attacks on FlexAEAD}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {983--1007}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01023-5}, doi = {10.1007/S10623-022-01023-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BariantBLP22, author = {Augustin Bariant and Cl{\'{e}}mence Bouvier and Ga{\"{e}}tan Leurent and L{\'{e}}o Perrin}, title = {Algebraic Attacks against Some Arithmetization-Oriented Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {73--101}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.73-101}, doi = {10.46586/TOSC.V2022.I3.73-101}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BariantBLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BariantL22, author = {Augustin Bariant and Ga{\"{e}}tan Leurent}, title = {Truncated Boomerang Attacks and Application to AES-based Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2022}, url = {https://eprint.iacr.org/2022/701}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BariantL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Florez-Gutierrez21, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher and Ferdinand Sibleyras}, title = {Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli}, journal = {J. Cryptol.}, volume = {34}, number = {4}, pages = {45}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09413-z}, doi = {10.1007/S00145-021-09413-Z}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Florez-Gutierrez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LeurentPS21, author = {Ga{\"{e}}tan Leurent and Clara Pernot and Andr{\'{e}} Schrottenloher}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Clustering Effect in Simon and Simeck}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {272--302}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_10}, doi = {10.1007/978-3-030-92062-3\_10}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LeurentPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonnetainLNS21, author = {Xavier Bonnetain and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Quantum Linearization Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {422--452}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_15}, doi = {10.1007/978-3-030-92062-3\_15}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonnetainLNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BhaumikBCLNSS21, author = {Ritam Bhaumik and Xavier Bonnetain and Andr{\'{e}} Chailloux and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher and Yannick Seurin}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {{QCB:} Efficient Quantum-Secure Authenticated Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {668--698}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_23}, doi = {10.1007/978-3-030-92062-3\_23}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BhaumikBCLNSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChattopadhyayKL21, author = {Anupam Chattopadhyay and Mustafa Khairallah and Ga{\"{e}}tan Leurent and Zakaria Najm and Thomas Peyrin and Vesselin Velichkov}, editor = {Kenneth G. Paterson}, title = {On the Cost of {ASIC} Hardware Crackers: {A} {SHA-1} Case Study}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {657--681}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_27}, doi = {10.1007/978-3-030-75539-3\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/ChattopadhyayKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentP21, author = {Ga{\"{e}}tan Leurent and Clara Pernot}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {New Representations of the {AES} Key Schedule}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {54--84}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_3}, doi = {10.1007/978-3-030-77870-5\_3}, timestamp = {Wed, 16 Jun 2021 11:49:32 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeierleDLLRRRS21, author = {Christof Beierle and Patrick Derbez and Gregor Leander and Ga{\"{e}}tan Leurent and H{\aa}vard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Cryptanalysis of the {GPRS} Encryption Algorithms {GEA-1} and {GEA-2}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {155--183}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_6}, doi = {10.1007/978-3-030-77886-6\_6}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeierleDLLRRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleDLLRRRS21, author = {Christof Beierle and Patrick Derbez and Gregor Leander and Ga{\"{e}}tan Leurent and H{\aa}vard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes}, title = {Cryptanalysis of the {GPRS} Encryption Algorithms {GEA-1} and {GEA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2021}, url = {https://eprint.iacr.org/2021/819}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleDLLRRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanEKKLS21, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Ga{\"{e}}tan Leurent and Markus Schofnegger}, title = {Practical Key Recovery Attacks on FlexAEAD}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2021}, url = {https://eprint.iacr.org/2021/931}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanEKKLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentPS21, author = {Ga{\"{e}}tan Leurent and Clara Pernot and Andr{\'{e}} Schrottenloher}, title = {Clustering Effect in Simon and Simeck}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1198}, year = {2021}, url = {https://eprint.iacr.org/2021/1198}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainLNS21, author = {Xavier Bonnetain and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum Linearization Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2021}, url = {https://eprint.iacr.org/2021/1239}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainLNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaoDGLW20, author = {Zhenzhen Bao and Itai Dinur and Jian Guo and Ga{\"{e}}tan Leurent and Lei Wang}, title = {Generic Attacks on Hash Combiners}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {742--823}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09328-w}, doi = {10.1007/S00145-019-09328-W}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaoDGLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeurentS20, author = {Ga{\"{e}}tan Leurent and Yu Sasaki}, title = {Preface to Volume 2020, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {1--5}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.1-5}, doi = {10.13154/TOSC.V2020.I1.1-5}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LeurentS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BariantDL20, author = {Augustin Bariant and Nicolas David and Ga{\"{e}}tan Leurent}, title = {Cryptanalysis of Forkciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {233--265}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.233-265}, doi = {10.13154/TOSC.V2020.I1.233-265}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BariantDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DinurL20, author = {Itai Dinur and Ga{\"{e}}tan Leurent}, title = {Preface to Volume 2020, Special Issue on Designs for the {NIST} Lightweight Standardisation Process}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {1--4}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.1-4}, doi = {10.13154/TOSC.V2020.IS1.1-4}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DinurL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CanteautDLNPPS20, author = {Anne Canteaut and S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Thomas Pornin and Andr{\'{e}} Schrottenloher}, title = {Saturnin: a suite of lightweight symmetric algorithms for post-quantum security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {160--207}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.160-207}, doi = {10.13154/TOSC.V2020.IS1.160-207}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CanteautDLNPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BelliziaBBCDGLL20, author = {Davide Bellizia and Francesco Berti and Olivier Bronchain and Ga{\"{e}}tan Cassiers and S{\'{e}}bastien Duval and Chun Guo and Gregor Leander and Ga{\"{e}}tan Leurent and Itamar Levi and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi and Friedrich Wiemer}, title = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {295--349}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.295-349}, doi = {10.13154/TOSC.V2020.IS1.295-349}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Florez-Gutierrez20, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher and Ferdinand Sibleyras}, editor = {Shiho Moriai and Huaxiong Wang}, title = {New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {33--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_2}, doi = {10.1007/978-3-030-64837-4\_2}, timestamp = {Thu, 10 Dec 2020 09:57:08 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Florez-Gutierrez20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {299--328}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_11}, doi = {10.1007/978-3-030-56877-1\_11}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LiLW0ZL20, author = {Yanbin Li and Ga{\"{e}}tan Leurent and Meiqin Wang and Wei Wang and Guoyan Zhang and Yu Liu}, editor = {Stanislaw Jarecki}, title = {Universal Forgery Attack Against {GCM-RUP}}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {15--34}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_2}, doi = {10.1007/978-3-030-40186-3\_2}, timestamp = {Fri, 14 Feb 2020 13:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/LiLW0ZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeurentP20, author = {Ga{\"{e}}tan Leurent and Thomas Peyrin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{SHA-1} is a Shambles: First Chosen-Prefix Collision on {SHA-1} and Application to the {PGP} Web of Trust}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1839--1856}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/leurent}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/LeurentP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentP20, author = {Ga{\"{e}}tan Leurent and Thomas Peyrin}, title = {{SHA-1} is a Shambles - First Chosen-Prefix Collision on {SHA-1} and Application to the {PGP} Web of Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2020}, url = {https://eprint.iacr.org/2020/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeyneCDELLNPSTW20, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, title = {Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2020}, url = {https://eprint.iacr.org/2020/188}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BeyneCDELLNPSTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Florez-Gutierrez20, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher and Ferdinand Sibleyras}, title = {New results on Gimli: full-permutation distinguishers and improved collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2020}, url = {https://eprint.iacr.org/2020/744}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Florez-Gutierrez20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentP20a, author = {Ga{\"{e}}tan Leurent and Clara Pernot}, title = {New Representations of the {AES} Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1253}, year = {2020}, url = {https://eprint.iacr.org/2020/1253}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LeurentP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikBCLNSS20, author = {Ritam Bhaumik and Xavier Bonnetain and Andr{\'{e}} Chailloux and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher and Yannick Seurin}, title = {{QCB:} Efficient Quantum-secure Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1304}, year = {2020}, url = {https://eprint.iacr.org/2020/1304}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikBCLNSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DuvalL19, author = {S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, editor = {Sonia Bela{\"{\i}}d and Tim G{\"{u}}neysu}, title = {Lightweight MACs from Universal Hash Functions}, booktitle = {Smart Card Research and Advanced Applications - 18th International Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11833}, pages = {195--215}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42068-0\_12}, doi = {10.1007/978-3-030-42068-0\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DuvalL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeurentS19, author = {Ga{\"{e}}tan Leurent and Ferdinand Sibleyras}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {210--235}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_8}, doi = {10.1007/978-3-030-26951-7\_8}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LeurentS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentP19, author = {Ga{\"{e}}tan Leurent and Thomas Peyrin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {From Collisions to Chosen-Prefix Collisions Application to Full {SHA-1}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {527--555}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_18}, doi = {10.1007/978-3-030-17659-4\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentP19, author = {Ga{\"{e}}tan Leurent and Thomas Peyrin}, title = {From Collisions to Chosen-Prefix Collisions - Application to Full {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2019}, url = {https://eprint.iacr.org/2019/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoDGLW19, author = {Zhenzhen Bao and Itai Dinur and Jian Guo and Ga{\"{e}}tan Leurent and Lei Wang}, title = {Generic Attacks on Hash Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2019}, url = {https://eprint.iacr.org/2019/755}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoDGLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentS19, author = {Ga{\"{e}}tan Leurent and Ferdinand Sibleyras}, title = {Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {938}, year = {2019}, url = {https://eprint.iacr.org/2019/938}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLW0ZL19, author = {Yanbin Li and Ga{\"{e}}tan Leurent and Meiqin Wang and Wei Wang and Guoyan Zhang and Yu Liu}, title = {Universal Forgery Attack against {GCM-RUP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1359}, year = {2019}, url = {https://eprint.iacr.org/2019/1359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLW0ZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DuvalL18, author = {S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, title = {{MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {48--78}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.48-78}, doi = {10.13154/TOSC.V2018.I2.48-78}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DuvalL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AshurELLMRSV18, author = {Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Ga{\"{e}}tan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Beno{\^{\i}}t Viguier}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Cryptanalysis of {MORUS}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {35--64}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_2}, doi = {10.1007/978-3-030-03329-3\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AshurELLMRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeurentNS18, author = {Ga{\"{e}}tan Leurent and Mridul Nandi and Ferdinand Sibleyras}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Generic Attacks Against Beyond-Birthday-Bound MACs}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {306--336}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_11}, doi = {10.1007/978-3-319-96884-1\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LeurentNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentS18, author = {Ga{\"{e}}tan Leurent and Ferdinand Sibleyras}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {The Missing Difference Problem, and Its Applications to Counter Mode Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {745--770}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_24}, doi = {10.1007/978-3-319-78375-8\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentS18, author = {Ga{\"{e}}tan Leurent and Ferdinand Sibleyras}, title = {The Missing Difference Problem, and its Applications to Counter Mode Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2018}, url = {http://eprint.iacr.org/2018/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuvalL18, author = {S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, title = {{MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2018}, url = {http://eprint.iacr.org/2018/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuvalL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurELLMRSV18, author = {Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Ga{\"{e}}tan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Beno{\^{\i}}t Viguier}, title = {Cryptanalysis of {MORUS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2018}, url = {https://eprint.iacr.org/2018/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurELLMRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentNS18, author = {Ga{\"{e}}tan Leurent and Mridul Nandi and Ferdinand Sibleyras}, title = {Generic Attacks against Beyond-Birthday-Bound MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2018}, url = {https://eprint.iacr.org/2018/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/DinurL17, author = {Itai Dinur and Ga{\"{e}}tan Leurent}, title = {Improved Generic Attacks Against Hash-Based MACs and {HAIFA}}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1161--1195}, year = {2017}, url = {https://doi.org/10.1007/s00453-016-0236-6}, doi = {10.1007/S00453-016-0236-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/DinurL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Quantum Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {71--94}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.71-94}, doi = {10.13154/TOSC.V2016.I1.71-94}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhargavanL16, author = {Karthikeyan Bhargavan and Ga{\"{e}}tan Leurent}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on {HTTP} over {TLS} and OpenVPN}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {456--467}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978423}, doi = {10.1145/2976749.2978423}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhargavanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Breaking Symmetric Cryptosystems Using Quantum Period Finding}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {207--237}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_8}, doi = {10.1007/978-3-662-53008-5\_8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Leurent16, author = {Ga{\"{e}}tan Leurent}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {344--371}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_14}, doi = {10.1007/978-3-662-49890-3\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Leurent16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouraCLPSSS16, author = {Christina Boura and Avik Chakraborti and Ga{\"{e}}tan Leurent and Goutam Paul and Dhiman Saha and Hadi Soleimany and Valentin Suder}, editor = {Thomas Peyrin}, title = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {535--553}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_27}, doi = {10.1007/978-3-662-52993-5\_27}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BhargavanL16, author = {Karthikeyan Bhargavan and Ga{\"{e}}tan Leurent}, title = {Transcript Collision Attacks: Breaking Authentication in TLS, {IKE} and {SSH}}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/transcript-collision-attacks-breaking-authentication-tls-ike-ssh.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BhargavanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Breaking Symmetric Cryptosystems using Quantum Period Finding}, journal = {CoRR}, volume = {abs/1602.05973}, year = {2016}, url = {http://arxiv.org/abs/1602.05973}, eprinttype = {arXiv}, eprint = {1602.05973}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraCLPSSS16, author = {Christina Boura and Avik Chakraborti and Ga{\"{e}}tan Leurent and Goutam Paul and Dhiman Saha and Hadi Soleimany and Valentin Suder}, title = {Key Recovery Attack against 2.5-round pi-Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2016}, url = {http://eprint.iacr.org/2016/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhargavanL16, author = {Karthikeyan Bhargavan and Ga{\"{e}}tan Leurent}, title = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on {HTTP} over {TLS} and OpenVPN}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {798}, year = {2016}, url = {http://eprint.iacr.org/2016/798}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhargavanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FuhrLS15, author = {Thomas Fuhr and Ga{\"{e}}tan Leurent and Valentin Suder}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Collision Attacks Against {CAESAR} Candidates - Forgery and Key-Recovery Against {AEZ} and Marble}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {510--532}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_21}, doi = {10.1007/978-3-662-48800-3\_21}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FuhrLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentW15, author = {Ga{\"{e}}tan Leurent and Lei Wang}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {The Sum Can Be Weaker Than Each Part}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {345--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_14}, doi = {10.1007/978-3-662-46800-5\_14}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BiryukovLP15, author = {Alex Biryukov and Ga{\"{e}}tan Leurent and L{\'{e}}o Perrin}, editor = {Orr Dunkelman and Liam Keliher}, title = {Cryptanalysis of Feistel Networks with Secret Round Functions}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {102--121}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_6}, doi = {10.1007/978-3-319-31301-6\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BiryukovLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Leurent15, author = {Ga{\"{e}}tan Leurent}, editor = {Orr Dunkelman and Liam Keliher}, title = {Differential Forgery Attack Against {LAC}}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {217--224}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_13}, doi = {10.1007/978-3-319-31301-6\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Leurent15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CanteautDL15, author = {Anne Canteaut and S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, editor = {Orr Dunkelman and Liam Keliher}, title = {Construction of Lightweight S-Boxes Using Feistel and {MISTY} Structures}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {373--393}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_22}, doi = {10.1007/978-3-319-31301-6\_22}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CanteautDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KaplanLLN15, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Quantum Differential and Linear Cryptanalysis}, journal = {CoRR}, volume = {abs/1510.05836}, year = {2015}, url = {http://arxiv.org/abs/1510.05836}, eprinttype = {arXiv}, eprint = {1510.05836}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KaplanLLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentW15, author = {Ga{\"{e}}tan Leurent and Lei Wang}, title = {The Sum Can Be Weaker Than Each Part}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2015}, url = {http://eprint.iacr.org/2015/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautDL15, author = {Anne Canteaut and S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, title = {Construction of Lightweight S-Boxes using Feistel and {MISTY} structures (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2015}, url = {http://eprint.iacr.org/2015/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovLP15, author = {Alex Biryukov and Ga{\"{e}}tan Leurent and L{\'{e}}o Perrin}, title = {Cryptanalysis of Feistel Networks with Secret Round Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2015}, url = {http://eprint.iacr.org/2015/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent15, author = {Ga{\"{e}}tan Leurent}, title = {Differential and Linear Cryptanalysis of {ARX} with Partitioning - Application to {FEAL} and Chaskey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {968}, year = {2015}, url = {http://eprint.iacr.org/2015/968}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrLS15, author = {Thomas Fuhr and Ga{\"{e}}tan Leurent and Valentin Suder}, title = {Collision Attacks against {CAESAR} Candidates - Forgery and Key-Recovery against {AEZ} and Marble}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2015}, url = {http://eprint.iacr.org/2015/1193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BrennerGLRS14, author = {Hai Brenner and Lubos Gaspar and Ga{\"{e}}tan Leurent and Alon Rosen and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Lejla Batina and Matthew Robshaw}, title = {{FPGA} Implementations of {SPRING} - And Their Countermeasures against Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {414--432}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_23}, doi = {10.1007/978-3-662-44709-3\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BrennerGLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurL14, author = {Itai Dinur and Ga{\"{e}}tan Leurent}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Improved Generic Attacks against Hash-Based MACs and {HAIFA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {149--168}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_9}, doi = {10.1007/978-3-662-44371-2\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GasparLS14, author = {Lubos Gaspar and Ga{\"{e}}tan Leurent and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Josh Benaloh}, title = {Hardware Implementation and Side-Channel Analysis of Lapin}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {206--226}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_11}, doi = {10.1007/978-3-319-04852-9\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GasparLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GrossoLSV14, author = {Vincent Grosso and Ga{\"{e}}tan Leurent and Fran{\c{c}}ois{-}Xavier Standaert and Kerem Varici}, editor = {Carlos Cid and Christian Rechberger}, title = {LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {18--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_2}, doi = {10.1007/978-3-662-46706-0\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GrossoLSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/0001BLPR14, author = {Abhishek Banerjee and Hai Brenner and Ga{\"{e}}tan Leurent and Chris Peikert and Alon Rosen}, editor = {Carlos Cid and Christian Rechberger}, title = {{SPRING:} Fast Pseudorandom Functions from Rounded Ring Products}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {38--57}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_3}, doi = {10.1007/978-3-662-46706-0\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/0001BLPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/0001JLPW14, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, editor = {Antoine Joux and Amr M. Youssef}, title = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {195--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_12}, doi = {10.1007/978-3-319-13051-4\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/0001JLPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentPW14, author = {Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, title = {New Generic Attacks Against Hash-based MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2014}, url = {http://eprint.iacr.org/2014/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurL14, author = {Itai Dinur and Ga{\"{e}}tan Leurent}, title = {Improved Generic Attacks Against Hash-based MACs and {HAIFA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2014}, url = {http://eprint.iacr.org/2014/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JLPW14a, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, title = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2014}, url = {http://eprint.iacr.org/2014/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JLPW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LeurentPW13, author = {Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, editor = {Kazue Sako and Palash Sarkar}, title = {New Generic Attacks against Hash-Based MACs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {1--20}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_1}, doi = {10.1007/978-3-642-42045-0\_1}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LeurentPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Leurent13, author = {Ga{\"{e}}tan Leurent}, editor = {Ran Canetti and Juan A. Garay}, title = {Construction of Differential Characteristics in {ARX} Designs Application to Skein}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {241--258}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_14}, doi = {10.1007/978-3-642-40041-4\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Leurent13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent13, author = {Ga{\"{e}}tan Leurent}, editor = {Shiho Moriai}, title = {Cryptanalysis of {WIDEA}}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {39--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_3}, doi = {10.1007/978-3-662-43933-3\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Leurent13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent13a, author = {Ga{\"{e}}tan Leurent}, editor = {Shiho Moriai}, title = {Time-Memory Trade-Offs for Near-Collisions}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {205--218}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_11}, doi = {10.1007/978-3-662-43933-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Leurent13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Leurent12, author = {Ga{\"{e}}tan Leurent}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Analysis of Differential Attacks in {ARX} Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {226--243}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_15}, doi = {10.1007/978-3-642-34961-4\_15}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Leurent12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LeurentR12, author = {Ga{\"{e}}tan Leurent and Arnab Roy}, editor = {Orr Dunkelman}, title = {Boomerang Attacks on Hash Function Using Auxiliary Differentials}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {215--230}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_14}, doi = {10.1007/978-3-642-27954-6\_14}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/LeurentR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhovratovichLR12, author = {Dmitry Khovratovich and Ga{\"{e}}tan Leurent and Christian Rechberger}, editor = {David Pointcheval and Thomas Johansson}, title = {Narrow-Bicliques: Cryptanalysis of Full {IDEA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {392--410}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_24}, doi = {10.1007/978-3-642-29011-4\_24}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhovratovichLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BiryukovL012, author = {Alex Biryukov and Ga{\"{e}}tan Leurent and Arnab Roy}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Cryptanalysis of the "Kindle" Cipher}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {86--103}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_7}, doi = {10.1007/978-3-642-35999-6\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BiryukovL012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent12, author = {Ga{\"{e}}tan Leurent}, title = {Construction of Differential Characteristics in {ARX} Designs - Application to Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2012}, url = {http://eprint.iacr.org/2012/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent12a, author = {Ga{\"{e}}tan Leurent}, title = {Cryptanalysis of {WIDEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2012}, url = {http://eprint.iacr.org/2012/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent12b, author = {Ga{\"{e}}tan Leurent}, title = {Time-memory Trade-offs for Near-collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2012}, url = {http://eprint.iacr.org/2012/731}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeurentT11, author = {Ga{\"{e}}tan Leurent and S{\o}ren S. Thomsen}, editor = {Antoine Joux}, title = {Practical Near-Collisions on the Compression Function of {BMW}}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {238--251}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_14}, doi = {10.1007/978-3-642-21702-9\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LeurentT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetDFL11, author = {Charles Bouillaguet and Orr Dunkelman and Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent}, editor = {Ali Miri and Serge Vaudenay}, title = {New Insights on Impossible Differential Cryptanalysis}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {243--259}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_15}, doi = {10.1007/978-3-642-28496-0\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetDFL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10, author = {Praveen Gauravaram and Ga{\"{e}}tan Leurent and Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin and Christian Rechberger and Martin Schl{\"{a}}ffer}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {419--436}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_25}, doi = {10.1007/978-3-642-12678-9\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Leurent10, author = {Ga{\"{e}}tan Leurent}, editor = {Josef Pieprzyk}, title = {Practical Key Recovery Attack against Secret-IV Edon-}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {334--349}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_23}, doi = {10.1007/978-3-642-11925-5\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Leurent10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Jean{-}Philippe Aumasson and Yann Laigle{-}Chapuy and Ga{\"{e}}tan Leurent and Willi Meier and Thomas Peyrin}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Cryptanalysis of {ESSENCE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {134--152}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_8}, doi = {10.1007/978-3-642-13858-4\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouillaguetDLF10, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Another Look at Complementation Properties}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {347--364}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_20}, doi = {10.1007/978-3-642-13858-4\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetDLF10, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round \emph{Lesamnta} and \emph{SHAvite-3}\({}_{\mbox{512}}\)}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {18--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_2}, doi = {10.1007/978-3-642-19574-7\_2}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetDLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetFL10, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Security Analysis of {SIMD}}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {351--368}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_24}, doi = {10.1007/978-3-642-19574-7\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetFL10, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent}, title = {Security Analysis of {SIMD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2010}, url = {http://eprint.iacr.org/2010/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent10, author = {Ga{\"{e}}tan Leurent}, title = {Quantum Preimage and Collision Attacks on CubeHash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2010}, url = {http://eprint.iacr.org/2010/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueLRV09, author = {Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent and Denis R{\'{e}}al and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Christophe Clavier and Kris Gaj}, title = {Practical Electromagnetic Template Attack on {HMAC}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {66--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_6}, doi = {10.1007/978-3-642-04138-9\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FouqueLRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeurentN09, author = {Ga{\"{e}}tan Leurent and Phong Q. Nguyen}, editor = {Shai Halevi}, title = {How Risky Is the Random-Oracle Model?}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {445--464}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_26}, doi = {10.1007/978-3-642-03356-8\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LeurentN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent09, author = {Ga{\"{e}}tan Leurent}, title = {Practical Key Recovery Attack against Secret-prefix Edon-R}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2009}, url = {http://eprint.iacr.org/2009/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naya-PlasenciaRALLMP09, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Jean{-}Philippe Aumasson and Yann Laigle{-}Chapuy and Ga{\"{e}}tan Leurent and Willi Meier and Thomas Peyrin}, title = {Cryptanalysis of {ESSENCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2009}, url = {http://eprint.iacr.org/2009/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naya-PlasenciaRALLMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDLF09, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, title = {Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3\({}_{\mbox{512}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2009}, url = {http://eprint.iacr.org/2009/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDLF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Leurent08, author = {Ga{\"{e}}tan Leurent}, title = {Practical key-recovery attack against APOP, an MD5-based challenge-response authentication}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {32--46}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017049}, doi = {10.1504/IJACT.2008.017049}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Leurent08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FouqueL08, author = {Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent}, editor = {Tal Malkin}, title = {Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {19--35}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_2}, doi = {10.1007/978-3-540-79263-5\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FouqueL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent08, author = {Ga{\"{e}}tan Leurent}, editor = {Kaisa Nyberg}, title = {{MD4} is Not One-Way}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {412--428}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_26}, doi = {10.1007/978-3-540-71039-4\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Leurent08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentN08, author = {Ga{\"{e}}tan Leurent and Phong Q. Nguyen}, title = {How Risky is the Random-Oracle Model?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2008}, url = {http://eprint.iacr.org/2008/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FouqueLN07, author = {Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent and Phong Q. Nguyen}, editor = {Alfred Menezes}, title = {Full Key-Recovery Attacks on {HMAC/NMAC-MD4} and {NMAC-MD5}}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {13--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_2}, doi = {10.1007/978-3-540-74143-5\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FouqueLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent07, author = {Ga{\"{e}}tan Leurent}, editor = {Alex Biryukov}, title = {Message Freedom in {MD4} and {MD5} Collisions: Application to {APOP}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {309--328}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_20}, doi = {10.1007/978-3-540-74619-5\_20}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/Leurent07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueLN07, author = {Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent and Phong Q. Nguyen}, title = {Automatic Search of Differential Path in {MD4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2007}, url = {http://eprint.iacr.org/2007/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CidL05, author = {Carlos Cid and Ga{\"{e}}tan Leurent}, editor = {Bimal K. Roy}, title = {An Analysis of the {XSL} Algorithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {333--352}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_18}, doi = {10.1007/11593447\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CidL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.