BibTeX records: Gaëtan Leurent

download as .bib file

@book{DBLP:books/hal/Leurent24,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Symmetric Cryptanalysis Beyond Primitives},
  year         = {2024},
  url          = {https://tel.archives-ouvertes.fr/tel-04406617},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/hal/Leurent24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeurentP24,
  author       = {Ga{\"{e}}tan Leurent and
                  Clara Pernot},
  title        = {Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {441--458},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.441-458},
  doi          = {10.46586/TOSC.V2024.I1.441-458},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LeurentP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainBLS24,
  author       = {Xavier Bonnetain and
                  Rachelle Heim Boissier and
                  Ga{\"{e}}tan Leurent and
                  Andr{\'{e}} Schrottenloher},
  title        = {Improving Generic Attacks Using Exceptional Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/488},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainBLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BariantL23,
  author       = {Augustin Bariant and
                  Ga{\"{e}}tan Leurent},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Truncated Boomerang Attacks and Application to AES-Based Ciphers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_1},
  doi          = {10.1007/978-3-031-30634-1\_1},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BariantL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanGKLMM23,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Avichai Marmor and
                  Victor Mollimard},
  title        = {Partial Sums Meet {FFT:} Improved Attack on 6-Round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1659},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1659},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanGKLMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentP23,
  author       = {Ga{\"{e}}tan Leurent and
                  Clara Pernot},
  title        = {Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1803},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1803},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanEKKLS22,
  author       = {Orr Dunkelman and
                  Maria Eichlseder and
                  Daniel Kales and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Markus Schofnegger},
  title        = {Practical key recovery attacks on FlexAEAD},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {983--1007},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01023-5},
  doi          = {10.1007/S10623-022-01023-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BariantBLP22,
  author       = {Augustin Bariant and
                  Cl{\'{e}}mence Bouvier and
                  Ga{\"{e}}tan Leurent and
                  L{\'{e}}o Perrin},
  title        = {Algebraic Attacks against Some Arithmetization-Oriented Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {73--101},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.73-101},
  doi          = {10.46586/TOSC.V2022.I3.73-101},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BariantBLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BariantL22,
  author       = {Augustin Bariant and
                  Ga{\"{e}}tan Leurent},
  title        = {Truncated Boomerang Attacks and Application to AES-based Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/701},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BariantL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Florez-Gutierrez21,
  author       = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher and
                  Ferdinand Sibleyras},
  title        = {Internal Symmetries and Linear Properties: Full-permutation Distinguishers
                  and Improved Collisions on Gimli},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {4},
  pages        = {45},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09413-z},
  doi          = {10.1007/S00145-021-09413-Z},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Florez-Gutierrez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LeurentPS21,
  author       = {Ga{\"{e}}tan Leurent and
                  Clara Pernot and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Clustering Effect in Simon and Simeck},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {272--302},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_10},
  doi          = {10.1007/978-3-030-92062-3\_10},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LeurentPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonnetainLNS21,
  author       = {Xavier Bonnetain and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Quantum Linearization Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {422--452},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_15},
  doi          = {10.1007/978-3-030-92062-3\_15},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonnetainLNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BhaumikBCLNSS21,
  author       = {Ritam Bhaumik and
                  Xavier Bonnetain and
                  Andr{\'{e}} Chailloux and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher and
                  Yannick Seurin},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {{QCB:} Efficient Quantum-Secure Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {668--698},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_23},
  doi          = {10.1007/978-3-030-92062-3\_23},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BhaumikBCLNSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChattopadhyayKL21,
  author       = {Anupam Chattopadhyay and
                  Mustafa Khairallah and
                  Ga{\"{e}}tan Leurent and
                  Zakaria Najm and
                  Thomas Peyrin and
                  Vesselin Velichkov},
  editor       = {Kenneth G. Paterson},
  title        = {On the Cost of {ASIC} Hardware Crackers: {A} {SHA-1} Case Study},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {657--681},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_27},
  doi          = {10.1007/978-3-030-75539-3\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChattopadhyayKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LeurentP21,
  author       = {Ga{\"{e}}tan Leurent and
                  Clara Pernot},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {New Representations of the {AES} Key Schedule},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {54--84},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_3},
  doi          = {10.1007/978-3-030-77870-5\_3},
  timestamp    = {Wed, 16 Jun 2021 11:49:32 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LeurentP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BeierleDLLRRRS21,
  author       = {Christof Beierle and
                  Patrick Derbez and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  H{\aa}vard Raddum and
                  Yann Rotella and
                  David Rupprecht and
                  Lukas Stennes},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Cryptanalysis of the {GPRS} Encryption Algorithms {GEA-1} and {GEA-2}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {155--183},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_6},
  doi          = {10.1007/978-3-030-77886-6\_6},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BeierleDLLRRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeierleDLLRRRS21,
  author       = {Christof Beierle and
                  Patrick Derbez and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  H{\aa}vard Raddum and
                  Yann Rotella and
                  David Rupprecht and
                  Lukas Stennes},
  title        = {Cryptanalysis of the {GPRS} Encryption Algorithms {GEA-1} and {GEA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/819},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeierleDLLRRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanEKKLS21,
  author       = {Orr Dunkelman and
                  Maria Eichlseder and
                  Daniel Kales and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Markus Schofnegger},
  title        = {Practical Key Recovery Attacks on FlexAEAD},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/931},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanEKKLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentPS21,
  author       = {Ga{\"{e}}tan Leurent and
                  Clara Pernot and
                  Andr{\'{e}} Schrottenloher},
  title        = {Clustering Effect in Simon and Simeck},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1198},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1198},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainLNS21,
  author       = {Xavier Bonnetain and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Linearization Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1239},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainLNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaoDGLW20,
  author       = {Zhenzhen Bao and
                  Itai Dinur and
                  Jian Guo and
                  Ga{\"{e}}tan Leurent and
                  Lei Wang},
  title        = {Generic Attacks on Hash Combiners},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {3},
  pages        = {742--823},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09328-w},
  doi          = {10.1007/S00145-019-09328-W},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaoDGLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeurentS20,
  author       = {Ga{\"{e}}tan Leurent and
                  Yu Sasaki},
  title        = {Preface to Volume 2020, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {1--5},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.1-5},
  doi          = {10.13154/TOSC.V2020.I1.1-5},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LeurentS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BariantDL20,
  author       = {Augustin Bariant and
                  Nicolas David and
                  Ga{\"{e}}tan Leurent},
  title        = {Cryptanalysis of Forkciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {233--265},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.233-265},
  doi          = {10.13154/TOSC.V2020.I1.233-265},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BariantDL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DinurL20,
  author       = {Itai Dinur and
                  Ga{\"{e}}tan Leurent},
  title        = {Preface to Volume 2020, Special Issue on Designs for the {NIST} Lightweight
                  Standardisation Process},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {1--4},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.1-4},
  doi          = {10.13154/TOSC.V2020.IS1.1-4},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DinurL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CanteautDLNPPS20,
  author       = {Anne Canteaut and
                  S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Thomas Pornin and
                  Andr{\'{e}} Schrottenloher},
  title        = {Saturnin: a suite of lightweight symmetric algorithms for post-quantum
                  security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {160--207},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.160-207},
  doi          = {10.13154/TOSC.V2020.IS1.160-207},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CanteautDLNPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BelliziaBBCDGLL20,
  author       = {Davide Bellizia and
                  Francesco Berti and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  S{\'{e}}bastien Duval and
                  Chun Guo and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Itamar Levi and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi and
                  Friedrich Wiemer},
  title        = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with
                  a Masked Tweakable Block Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {295--349},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.295-349},
  doi          = {10.13154/TOSC.V2020.IS1.295-349},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Florez-Gutierrez20,
  author       = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher and
                  Ferdinand Sibleyras},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {New Results on Gimli: Full-Permutation Distinguishers and Improved
                  Collisions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_2},
  doi          = {10.1007/978-3-030-64837-4\_2},
  timestamp    = {Thu, 10 Dec 2020 09:57:08 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Florez-Gutierrez20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Itai Dinur and
                  Maria Eichlseder and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Yu Sasaki and
                  Yosuke Todo and
                  Friedrich Wiemer},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives
                  Optimized for Integrity Proof Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {299--328},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_11},
  doi          = {10.1007/978-3-030-56877-1\_11},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LiLW0ZL20,
  author       = {Yanbin Li and
                  Ga{\"{e}}tan Leurent and
                  Meiqin Wang and
                  Wei Wang and
                  Guoyan Zhang and
                  Yu Liu},
  editor       = {Stanislaw Jarecki},
  title        = {Universal Forgery Attack Against {GCM-RUP}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {15--34},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_2},
  doi          = {10.1007/978-3-030-40186-3\_2},
  timestamp    = {Fri, 14 Feb 2020 13:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LiLW0ZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeurentP20,
  author       = {Ga{\"{e}}tan Leurent and
                  Thomas Peyrin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{SHA-1} is a Shambles: First Chosen-Prefix Collision on {SHA-1} and
                  Application to the {PGP} Web of Trust},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1839--1856},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/leurent},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LeurentP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentP20,
  author       = {Ga{\"{e}}tan Leurent and
                  Thomas Peyrin},
  title        = {{SHA-1} is a Shambles - First Chosen-Prefix Collision on {SHA-1} and
                  Application to the {PGP} Web of Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeyneCDELLNPSTW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Itai Dinur and
                  Maria Eichlseder and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Yu Sasaki and
                  Yosuke Todo and
                  Friedrich Wiemer},
  title        = {Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives
                  Optimized for Integrity Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/188},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BeyneCDELLNPSTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Florez-Gutierrez20,
  author       = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher and
                  Ferdinand Sibleyras},
  title        = {New results on Gimli: full-permutation distinguishers and improved
                  collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/744},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Florez-Gutierrez20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentP20a,
  author       = {Ga{\"{e}}tan Leurent and
                  Clara Pernot},
  title        = {New Representations of the {AES} Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1253},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1253},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentP20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikBCLNSS20,
  author       = {Ritam Bhaumik and
                  Xavier Bonnetain and
                  Andr{\'{e}} Chailloux and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher and
                  Yannick Seurin},
  title        = {{QCB:} Efficient Quantum-secure Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1304},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1304},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikBCLNSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DuvalL19,
  author       = {S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  editor       = {Sonia Bela{\"{\i}}d and
                  Tim G{\"{u}}neysu},
  title        = {Lightweight MACs from Universal Hash Functions},
  booktitle    = {Smart Card Research and Advanced Applications - 18th International
                  Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13,
                  2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11833},
  pages        = {195--215},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42068-0\_12},
  doi          = {10.1007/978-3-030-42068-0\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DuvalL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LeurentS19,
  author       = {Ga{\"{e}}tan Leurent and
                  Ferdinand Sibleyras},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR
                  Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {210--235},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_8},
  doi          = {10.1007/978-3-030-26951-7\_8},
  timestamp    = {Fri, 09 Aug 2019 14:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LeurentS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LeurentP19,
  author       = {Ga{\"{e}}tan Leurent and
                  Thomas Peyrin},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {From Collisions to Chosen-Prefix Collisions Application to Full {SHA-1}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  pages        = {527--555},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4\_18},
  doi          = {10.1007/978-3-030-17659-4\_18},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LeurentP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentP19,
  author       = {Ga{\"{e}}tan Leurent and
                  Thomas Peyrin},
  title        = {From Collisions to Chosen-Prefix Collisions - Application to Full
                  {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoDGLW19,
  author       = {Zhenzhen Bao and
                  Itai Dinur and
                  Jian Guo and
                  Ga{\"{e}}tan Leurent and
                  Lei Wang},
  title        = {Generic Attacks on Hash Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/755},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoDGLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentS19,
  author       = {Ga{\"{e}}tan Leurent and
                  Ferdinand Sibleyras},
  title        = {Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {938},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/938},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLW0ZL19,
  author       = {Yanbin Li and
                  Ga{\"{e}}tan Leurent and
                  Meiqin Wang and
                  Wei Wang and
                  Guoyan Zhang and
                  Yu Liu},
  title        = {Universal Forgery Attack against {GCM-RUP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1359},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLW0ZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DuvalL18,
  author       = {S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  title        = {{MDS} Matrices with Lightweight Circuits},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {48--78},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.48-78},
  doi          = {10.13154/TOSC.V2018.I2.48-78},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DuvalL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AshurELLMRSV18,
  author       = {Tomer Ashur and
                  Maria Eichlseder and
                  Martin M. Lauridsen and
                  Ga{\"{e}}tan Leurent and
                  Brice Minaud and
                  Yann Rotella and
                  Yu Sasaki and
                  Beno{\^{\i}}t Viguier},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Cryptanalysis of {MORUS}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {35--64},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_2},
  doi          = {10.1007/978-3-030-03329-3\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AshurELLMRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LeurentNS18,
  author       = {Ga{\"{e}}tan Leurent and
                  Mridul Nandi and
                  Ferdinand Sibleyras},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Generic Attacks Against Beyond-Birthday-Bound MACs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {306--336},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_11},
  doi          = {10.1007/978-3-319-96884-1\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LeurentNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LeurentS18,
  author       = {Ga{\"{e}}tan Leurent and
                  Ferdinand Sibleyras},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {The Missing Difference Problem, and Its Applications to Counter Mode
                  Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {745--770},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_24},
  doi          = {10.1007/978-3-319-78375-8\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LeurentS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentS18,
  author       = {Ga{\"{e}}tan Leurent and
                  Ferdinand Sibleyras},
  title        = {The Missing Difference Problem, and its Applications to Counter Mode
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuvalL18,
  author       = {S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  title        = {{MDS} Matrices with Lightweight Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuvalL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurELLMRSV18,
  author       = {Tomer Ashur and
                  Maria Eichlseder and
                  Martin M. Lauridsen and
                  Ga{\"{e}}tan Leurent and
                  Brice Minaud and
                  Yann Rotella and
                  Yu Sasaki and
                  Beno{\^{\i}}t Viguier},
  title        = {Cryptanalysis of {MORUS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurELLMRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentNS18,
  author       = {Ga{\"{e}}tan Leurent and
                  Mridul Nandi and
                  Ferdinand Sibleyras},
  title        = {Generic Attacks against Beyond-Birthday-Bound MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/DinurL17,
  author       = {Itai Dinur and
                  Ga{\"{e}}tan Leurent},
  title        = {Improved Generic Attacks Against Hash-Based MACs and {HAIFA}},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1161--1195},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00453-016-0236-6},
  doi          = {10.1007/S00453-016-0236-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/DinurL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Quantum Differential and Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {71--94},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.71-94},
  doi          = {10.13154/TOSC.V2016.I1.71-94},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhargavanL16,
  author       = {Karthikeyan Bhargavan and
                  Ga{\"{e}}tan Leurent},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision
                  Attacks on {HTTP} over {TLS} and OpenVPN},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {456--467},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978423},
  doi          = {10.1145/2976749.2978423},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhargavanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Breaking Symmetric Cryptosystems Using Quantum Period Finding},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {207--237},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_8},
  doi          = {10.1007/978-3-662-53008-5\_8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Leurent16,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with
                  Partitioning},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {344--371},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_14},
  doi          = {10.1007/978-3-662-49890-3\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Leurent16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouraCLPSSS16,
  author       = {Christina Boura and
                  Avik Chakraborti and
                  Ga{\"{e}}tan Leurent and
                  Goutam Paul and
                  Dhiman Saha and
                  Hadi Soleimany and
                  Valentin Suder},
  editor       = {Thomas Peyrin},
  title        = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {535--553},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_27},
  doi          = {10.1007/978-3-662-52993-5\_27},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BhargavanL16,
  author       = {Karthikeyan Bhargavan and
                  Ga{\"{e}}tan Leurent},
  title        = {Transcript Collision Attacks: Breaking Authentication in TLS, {IKE}
                  and {SSH}},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/transcript-collision-attacks-breaking-authentication-tls-ike-ssh.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BhargavanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Breaking Symmetric Cryptosystems using Quantum Period Finding},
  journal      = {CoRR},
  volume       = {abs/1602.05973},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.05973},
  eprinttype    = {arXiv},
  eprint       = {1602.05973},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraCLPSSS16,
  author       = {Christina Boura and
                  Avik Chakraborti and
                  Ga{\"{e}}tan Leurent and
                  Goutam Paul and
                  Dhiman Saha and
                  Hadi Soleimany and
                  Valentin Suder},
  title        = {Key Recovery Attack against 2.5-round pi-Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavanL16,
  author       = {Karthikeyan Bhargavan and
                  Ga{\"{e}}tan Leurent},
  title        = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision
                  Attacks on {HTTP} over {TLS} and OpenVPN},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {798},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/798},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FuhrLS15,
  author       = {Thomas Fuhr and
                  Ga{\"{e}}tan Leurent and
                  Valentin Suder},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Collision Attacks Against {CAESAR} Candidates - Forgery and Key-Recovery
                  Against {AEZ} and Marble},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {510--532},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_21},
  doi          = {10.1007/978-3-662-48800-3\_21},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FuhrLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LeurentW15,
  author       = {Ga{\"{e}}tan Leurent and
                  Lei Wang},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {The Sum Can Be Weaker Than Each Part},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {345--367},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_14},
  doi          = {10.1007/978-3-662-46800-5\_14},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LeurentW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BiryukovLP15,
  author       = {Alex Biryukov and
                  Ga{\"{e}}tan Leurent and
                  L{\'{e}}o Perrin},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Cryptanalysis of Feistel Networks with Secret Round Functions},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {102--121},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_6},
  doi          = {10.1007/978-3-319-31301-6\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BiryukovLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Leurent15,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Differential Forgery Attack Against {LAC}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {217--224},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_13},
  doi          = {10.1007/978-3-319-31301-6\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Leurent15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CanteautDL15,
  author       = {Anne Canteaut and
                  S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Construction of Lightweight S-Boxes Using Feistel and {MISTY} Structures},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {373--393},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_22},
  doi          = {10.1007/978-3-319-31301-6\_22},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CanteautDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KaplanLLN15,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Quantum Differential and Linear Cryptanalysis},
  journal      = {CoRR},
  volume       = {abs/1510.05836},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.05836},
  eprinttype    = {arXiv},
  eprint       = {1510.05836},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KaplanLLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentW15,
  author       = {Ga{\"{e}}tan Leurent and
                  Lei Wang},
  title        = {The Sum Can Be Weaker Than Each Part},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautDL15,
  author       = {Anne Canteaut and
                  S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  title        = {Construction of Lightweight S-Boxes using Feistel and {MISTY} structures
                  (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovLP15,
  author       = {Alex Biryukov and
                  Ga{\"{e}}tan Leurent and
                  L{\'{e}}o Perrin},
  title        = {Cryptanalysis of Feistel Networks with Secret Round Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent15,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Differential and Linear Cryptanalysis of {ARX} with Partitioning -
                  Application to {FEAL} and Chaskey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {968},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/968},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrLS15,
  author       = {Thomas Fuhr and
                  Ga{\"{e}}tan Leurent and
                  Valentin Suder},
  title        = {Collision Attacks against {CAESAR} Candidates - Forgery and Key-Recovery
                  against {AEZ} and Marble},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrennerGLRS14,
  author       = {Hai Brenner and
                  Lubos Gaspar and
                  Ga{\"{e}}tan Leurent and
                  Alon Rosen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{FPGA} Implementations of {SPRING} - And Their Countermeasures against
                  Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {414--432},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_23},
  doi          = {10.1007/978-3-662-44709-3\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrennerGLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurL14,
  author       = {Itai Dinur and
                  Ga{\"{e}}tan Leurent},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Improved Generic Attacks against Hash-Based MACs and {HAIFA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {149--168},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_9},
  doi          = {10.1007/978-3-662-44371-2\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GasparLS14,
  author       = {Lubos Gaspar and
                  Ga{\"{e}}tan Leurent and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josh Benaloh},
  title        = {Hardware Implementation and Side-Channel Analysis of Lapin},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_11},
  doi          = {10.1007/978-3-319-04852-9\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GasparLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GrossoLSV14,
  author       = {Vincent Grosso and
                  Ga{\"{e}}tan Leurent and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Kerem Varici},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {18--37},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_2},
  doi          = {10.1007/978-3-662-46706-0\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GrossoLSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001BLPR14,
  author       = {Abhishek Banerjee and
                  Hai Brenner and
                  Ga{\"{e}}tan Leurent and
                  Chris Peikert and
                  Alon Rosen},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{SPRING:} Fast Pseudorandom Functions from Rounded Ring Products},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_3},
  doi          = {10.1007/978-3-662-46706-0\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/0001BLPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/0001JLPW14,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian
                  Standardized Hash Function},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_12},
  doi          = {10.1007/978-3-319-13051-4\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/0001JLPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentPW14,
  author       = {Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {New Generic Attacks Against Hash-based MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurL14,
  author       = {Itai Dinur and
                  Ga{\"{e}}tan Leurent},
  title        = {Improved Generic Attacks Against Hash-based MACs and {HAIFA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JLPW14a,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian
                  Standardized Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JLPW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LeurentPW13,
  author       = {Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {New Generic Attacks against Hash-Based MACs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_1},
  doi          = {10.1007/978-3-642-42045-0\_1},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LeurentPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Leurent13,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Construction of Differential Characteristics in {ARX} Designs Application
                  to Skein},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_14},
  doi          = {10.1007/978-3-642-40041-4\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Leurent13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent13,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Shiho Moriai},
  title        = {Cryptanalysis of {WIDEA}},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_3},
  doi          = {10.1007/978-3-662-43933-3\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent13a,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Shiho Moriai},
  title        = {Time-Memory Trade-Offs for Near-Collisions},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_11},
  doi          = {10.1007/978-3-662-43933-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Leurent12,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Analysis of Differential Attacks in {ARX} Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {226--243},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_15},
  doi          = {10.1007/978-3-642-34961-4\_15},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Leurent12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LeurentR12,
  author       = {Ga{\"{e}}tan Leurent and
                  Arnab Roy},
  editor       = {Orr Dunkelman},
  title        = {Boomerang Attacks on Hash Function Using Auxiliary Differentials},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_14},
  doi          = {10.1007/978-3-642-27954-6\_14},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LeurentR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KhovratovichLR12,
  author       = {Dmitry Khovratovich and
                  Ga{\"{e}}tan Leurent and
                  Christian Rechberger},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Narrow-Bicliques: Cryptanalysis of Full {IDEA}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {392--410},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_24},
  doi          = {10.1007/978-3-642-29011-4\_24},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KhovratovichLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BiryukovL012,
  author       = {Alex Biryukov and
                  Ga{\"{e}}tan Leurent and
                  Arnab Roy},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Cryptanalysis of the "Kindle" Cipher},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_7},
  doi          = {10.1007/978-3-642-35999-6\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BiryukovL012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent12,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Construction of Differential Characteristics in {ARX} Designs - Application
                  to Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent12a,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Cryptanalysis of {WIDEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent12b,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Time-memory Trade-offs for Near-collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/731},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LeurentT11,
  author       = {Ga{\"{e}}tan Leurent and
                  S{\o}ren S. Thomsen},
  editor       = {Antoine Joux},
  title        = {Practical Near-Collisions on the Compression Function of {BMW}},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {238--251},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_14},
  doi          = {10.1007/978-3-642-21702-9\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LeurentT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetDFL11,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {New Insights on Impossible Differential Cryptanalysis},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_15},
  doi          = {10.1007/978-3-642-28496-0\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetDFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10,
  author       = {Praveen Gauravaram and
                  Ga{\"{e}}tan Leurent and
                  Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Cryptanalysis of the 10-Round Hash and Full Compression Function of
                  SHAvite-3-512},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {419--436},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_25},
  doi          = {10.1007/978-3-642-12678-9\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Leurent10,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Josef Pieprzyk},
  title        = {Practical Key Recovery Attack against Secret-IV Edon-},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {334--349},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_23},
  doi          = {10.1007/978-3-642-11925-5\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Leurent10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Jean{-}Philippe Aumasson and
                  Yann Laigle{-}Chapuy and
                  Ga{\"{e}}tan Leurent and
                  Willi Meier and
                  Thomas Peyrin},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Cryptanalysis of {ESSENCE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {134--152},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_8},
  doi          = {10.1007/978-3-642-13858-4\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Another Look at Complementation Properties},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {347--364},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_20},
  doi          = {10.1007/978-3-642-13858-4\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Attacks on Hash Functions Based on Generalized Feistel: Application
                  to Reduced-Round \emph{Lesamnta} and \emph{SHAvite-3}\({}_{\mbox{512}}\)},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_2},
  doi          = {10.1007/978-3-642-19574-7\_2},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetFL10,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Security Analysis of {SIMD}},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_24},
  doi          = {10.1007/978-3-642-19574-7\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFL10,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  title        = {Security Analysis of {SIMD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent10,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Quantum Preimage and Collision Attacks on CubeHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueLRV09,
  author       = {Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent and
                  Denis R{\'{e}}al and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Practical Electromagnetic Template Attack on {HMAC}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {66--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_6},
  doi          = {10.1007/978-3-642-04138-9\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueLRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LeurentN09,
  author       = {Ga{\"{e}}tan Leurent and
                  Phong Q. Nguyen},
  editor       = {Shai Halevi},
  title        = {How Risky Is the Random-Oracle Model?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {445--464},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_26},
  doi          = {10.1007/978-3-642-03356-8\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LeurentN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent09,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Practical Key Recovery Attack against Secret-prefix Edon-R},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naya-PlasenciaRALLMP09,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Jean{-}Philippe Aumasson and
                  Yann Laigle{-}Chapuy and
                  Ga{\"{e}}tan Leurent and
                  Willi Meier and
                  Thomas Peyrin},
  title        = {Cryptanalysis of {ESSENCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naya-PlasenciaRALLMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDLF09,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  title        = {Attacks on Hash Functions based on Generalized Feistel - Application
                  to Reduced-Round Lesamnta and SHAvite-3\({}_{\mbox{512}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDLF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Leurent08,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Practical key-recovery attack against APOP, an MD5-based challenge-response
                  authentication},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {32--46},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017049},
  doi          = {10.1504/IJACT.2008.017049},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Leurent08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FouqueL08,
  author       = {Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  editor       = {Tal Malkin},
  title        = {Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_2},
  doi          = {10.1007/978-3-540-79263-5\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FouqueL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent08,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Kaisa Nyberg},
  title        = {{MD4} is Not One-Way},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {412--428},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_26},
  doi          = {10.1007/978-3-540-71039-4\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentN08,
  author       = {Ga{\"{e}}tan Leurent and
                  Phong Q. Nguyen},
  title        = {How Risky is the Random-Oracle Model?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FouqueLN07,
  author       = {Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent and
                  Phong Q. Nguyen},
  editor       = {Alfred Menezes},
  title        = {Full Key-Recovery Attacks on {HMAC/NMAC-MD4} and {NMAC-MD5}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {13--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_2},
  doi          = {10.1007/978-3-540-74143-5\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FouqueLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent07,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Alex Biryukov},
  title        = {Message Freedom in {MD4} and {MD5} Collisions: Application to {APOP}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_20},
  doi          = {10.1007/978-3-540-74619-5\_20},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueLN07,
  author       = {Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent and
                  Phong Q. Nguyen},
  title        = {Automatic Search of Differential Path in {MD4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CidL05,
  author       = {Carlos Cid and
                  Ga{\"{e}}tan Leurent},
  editor       = {Bimal K. Roy},
  title        = {An Analysis of the {XSL} Algorithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {333--352},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_18},
  doi          = {10.1007/11593447\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CidL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics