


default search action
Thomas Peyrin
Person information
- affiliation: Nanyang Technological University, Singapore
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j23]Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin:
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. IACR Commun. Cryptol. 1(2): 17 (2024) - [j22]Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin:
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac. IACR Trans. Symmetric Cryptol. 2024(2): 35-67 (2024) - [c78]Adrien Benamira, Thomas Peyrin, Trevor Yap, Tristan Guérand, Bryan Hooi:
Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form. IJCAI 2024: 13-21 - [i75]Emanuele Bellini, David Gérault, Juan Grados, Thomas Peyrin:
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs. IACR Cryptol. ePrint Arch. 2024: 1743 (2024) - [i74]Kai Hu, Mustafa Khairallah, Thomas Peyrin, Quan Quan Tan:
uKNIT: Breaking Round-alignment for Cipher Design - Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher. IACR Cryptol. ePrint Arch. 2024: 1962 (2024) - 2023
- [j21]Trevor Yap
, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 24-53 (2023) - [j20]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin
:
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP. IACR Trans. Symmetric Cryptol. 2023(2): 189-223 (2023) - [c77]Kai Hu, Thomas Peyrin, Quan Quan Tan, Trevor Yap:
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective. ASIACRYPT (3) 2023: 405-435 - [c76]Emanuele Bellini
, David Gérault
, Juan Grados
, Rusydi H. Makarim
, Thomas Peyrin
:
Fully Automated Differential-Linear Attacks Against ARX Ciphers. CT-RSA 2023: 252-276 - [c75]Adrien Benamira, Tristan Guérand, Thomas Peyrin, Hans Soegeng:
Neural Network-Based Rule Models with Truth Tables. ECAI 2023: 223-230 - [i73]Adrien Benamira, Tristan Guérand, Thomas Peyrin
, Sayandeep Saha:
TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture. CoRR abs/2302.01584 (2023) - [i72]Adrien Benamira, Tristan Guérand, Thomas Peyrin
, Hans Soegeng:
Neural Network-Based Rule Models With Truth Tables. CoRR abs/2309.09638 (2023) - [i71]Adrien Benamira, Tristan Guérand, Thomas Peyrin
:
A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making. CoRR abs/2309.11101 (2023) - [i70]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks against ARX Ciphers. IACR Cryptol. ePrint Arch. 2023: 181 (2023) - 2022
- [j19]Thomas Peyrin
, Quan Quan Tan:
Mind Your Path: On (Key) Dependencies in Differential Characteristics. IACR Trans. Symmetric Cryptol. 2022(4): 179-207 (2022) - [j18]Sayandeep Saha, Mustafa Khairallah
, Thomas Peyrin
:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Trans. Symmetric Cryptol. 2022(4): 291-324 (2022) - [c74]Adrien Benamira, Thomas Peyrin
, Bryan Hooi Kuen-Yew:
Truth-Table Net: A New Convolutional Architecture Encodable by Design into SAT Formulas. ECCV Workshops (1) 2022: 483-500 - [c73]Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. SAC 2022: 285-305 - [i69]Adrien Benamira, Thomas Peyrin
, Bryan Hooi Kuen-Yew:
Truth-Table Net: A New Convolutional Architecture Encodable By Design Into SAT Formulas. CoRR abs/2208.08609 (2022) - [i68]Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin:
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2022: 846 (2022) - [i67]Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. IACR Cryptol. ePrint Arch. 2022: 1034 (2022) - [i66]Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2022: 1055 (2022) - [i65]Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1247 (2022) - [i64]Kai Hu, Thomas Peyrin:
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha. IACR Cryptol. ePrint Arch. 2022: 1335 (2022) - [i63]Thomas Peyrin, Quan Quan Tan:
Mind Your Path: On (Key) Dependencies in Differential Characteristics. IACR Cryptol. ePrint Arch. 2022: 1734 (2022) - 2021
- [j17]Jérémy Jean, Ivica Nikolic, Thomas Peyrin
, Yannick Seurin:
The Deoxys AEAD Family. J. Cryptol. 34(3): 31 (2021) - [j16]Alexandre Adomnicai, Thomas Peyrin
:
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 402-425 (2021) - [j15]David Gérault, Thomas Peyrin
, Quan Quan Tan
:
Exploring Differential-Based Distinguishers and Forgeries for ASCON. IACR Trans. Symmetric Cryptol. 2021(3): 102-136 (2021) - [c72]Anubhab Baksi, Shivam Bhasin, Jakub Breier
, Mustafa Khairallah
, Thomas Peyrin
, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. ASIACRYPT (2) 2021: 124-156 - [c71]Anupam Chattopadhyay, Mustafa Khairallah
, Gaëtan Leurent, Zakaria Najm, Thomas Peyrin
, Vesselin Velichkov:
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study. CT-RSA 2021: 657-681 - [c70]Adrien Benamira, David Gérault, Thomas Peyrin
, Quan Quan Tan
:
A Deeper Look at Machine Learning-Based Cryptanalysis. EUROCRYPT (1) 2021: 805-835 - [i62]Adrien Benamira, David Gérault, Thomas Peyrin, Quan Quan Tan:
A Deeper Look at Machine Learning-Based Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 287 (2021) - [i61]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. IACR Cryptol. ePrint Arch. 2021: 712 (2021) - [i60]David Gérault, Thomas Peyrin, Quan Quan Tan:
Exploring Differential-Based Distinguishers and Forgeries for ASCON. IACR Cryptol. ePrint Arch. 2021: 1103 (2021) - 2020
- [j14]Quan Quan Tan, Thomas Peyrin
:
Improved Heuristics for Short Linear Programs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 203-230 (2020) - [j13]Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
:
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 402-427 (2020) - [j12]Tetsu Iwata, Mustafa Khairallah
, Kazuhiko Minematsu, Thomas Peyrin
:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020) - [j11]Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin
, Matthieu Rivain, Yu Sasaki, Siang Meng Sim
:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. IACR Trans. Symmetric Cryptol. 2020(S1): 31-59 (2020) - [j10]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin
, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [c69]Thomas Peyrin
, Haoyang Wang
:
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers. CRYPTO (3) 2020: 249-278 - [c68]Ling Sun, David Gérault, Adrien Benamira, Thomas Peyrin
:
NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis. CSCML 2020: 62-84 - [c67]Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. USENIX Security Symposium 2020: 1839-1856 - [i59]Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. IACR Cryptol. ePrint Arch. 2020: 14 (2020) - [i58]Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin:
Fixslicing: A New GIFT Representation. IACR Cryptol. ePrint Arch. 2020: 412 (2020) - [i57]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i56]Thomas Peyrin, Haoyang Wang:
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 986 (2020) - [i55]Alexandre Adomnicai, Thomas Peyrin:
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V. IACR Cryptol. ePrint Arch. 2020: 1123 (2020) - [i54]Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay:
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates. IACR Cryptol. ePrint Arch. 2020: 1459 (2020)
2010 – 2019
- 2019
- [j9]Haoyang Wang, Thomas Peyrin
:
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys. IACR Trans. Symmetric Cryptol. 2019(1): 142-169 (2019) - [c66]Mustafa Khairallah
, Xiaolu Hou
, Zakaria Najm, Jakub Breier
, Shivam Bhasin, Thomas Peyrin
:
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks. AsiaCCS 2019: 403-414 - [c65]Gaëtan Leurent, Thomas Peyrin
:
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1. EUROCRYPT (3) 2019: 527-555 - [i53]Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. IACR Cryptol. ePrint Arch. 2019: 387 (2019) - [i52]Gaëtan Leurent, Thomas Peyrin:
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1. IACR Cryptol. ePrint Arch. 2019: 459 (2019) - [i51]Quan Quan Tan, Thomas Peyrin:
Improved Heuristics for Short Linear Programs. IACR Cryptol. ePrint Arch. 2019: 847 (2019) - [i50]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Cryptol. ePrint Arch. 2019: 992 (2019) - 2018
- [c64]Carlos Cid, Tao Huang, Thomas Peyrin
, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. EUROCRYPT (2) 2018: 683-714 - [c63]Anubhab Baksi, Shivam Bhasin, Jakub Breier
, Mustafa Khairallah
, Thomas Peyrin
:
Protecting block ciphers against differential fault attacks without re-keying. HOST 2018: 191-194 - [c62]Mustafa Khairallah
, Zakaria Najm, Anupam Chattopadhyay, Thomas Peyrin
:
Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey. SAMOS 2018: 167-172 - [e7]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11272, Springer 2018, ISBN 978-3-030-03325-5 [contents] - [e6]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11273, Springer 2018, ISBN 978-3-030-03328-6 [contents] - [e5]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. Lecture Notes in Computer Science 11274, Springer 2018, ISBN 978-3-030-03331-6 [contents] - [i49]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version). IACR Cryptol. ePrint Arch. 2018: 85 (2018) - [i48]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. IACR Cryptol. ePrint Arch. 2018: 161 (2018) - 2017
- [j8]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
:
Human-readable Proof of the Related-Key Security of AES-128. IACR Trans. Symmetric Cryptol. 2017(2): 59-83 (2017) - [j7]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
:
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(3): 73-107 (2017) - [j6]Shivam Bhasin, Dirmanto Jap, Thomas Peyrin:
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure. IACR Trans. Symmetric Cryptol. 2017(3): 108-129 (2017) - [j5]Jérémy Jean, Thomas Peyrin, Siang Meng Sim
, Jade Tourteaux:
Optimizing Implementations of Lightweight Building Blocks. IACR Trans. Symmetric Cryptol. 2017(4): 130-168 (2017) - [c61]Subhadeep Banik
, Sumit Kumar Pandey, Thomas Peyrin
, Yu Sasaki, Siang Meng Sim
, Yosuke Todo
:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [c60]Jérémy Jean, Amir Moradi
, Thomas Peyrin
, Pascal Sasdrich
:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. CHES 2017: 687-707 - [c59]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin
, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO (3) 2017: 34-65 - [c58]Mustafa Khairallah
, Anupam Chattopadhyay
, Thomas Peyrin
:
Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. INDOCRYPT 2017: 282-301 - [e4]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10624, Springer 2017, ISBN 978-3-319-70693-1 [contents] - [e3]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10625, Springer 2017, ISBN 978-3-319-70696-2 [contents] - [e2]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10626, Springer 2017, ISBN 978-3-319-70699-3 [contents] - [i47]Jérémy Jean, Thomas Peyrin, Siang Meng Sim:
Optimizing Implementations of Lightweight Building Blocks. IACR Cryptol. ePrint Arch. 2017: 101 (2017) - [i46]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. IACR Cryptol. ePrint Arch. 2017: 535 (2017) - [i45]Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. IACR Cryptol. ePrint Arch. 2017: 600 (2017) - [i44]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - [i43]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 693 (2017) - [i42]Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin:
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 1019 (2017) - 2016
- [j4]Franck Landelle, Thomas Peyrin
:
Cryptanalysis of Full RIPEMD-128. J. Cryptol. 29(4): 927-951 (2016) - [c57]Thomas Peyrin
, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. CRYPTO (1) 2016: 33-63 - [c56]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin
, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c55]Marc Stevens
, Pierre Karpman, Thomas Peyrin
:
Freestart Collision for Full SHA-1. EUROCRYPT (1) 2016: 459-483 - [e1]Thomas Peyrin
:
Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9783, Springer 2016, ISBN 978-3-662-52992-8 [contents] - [i41]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. IACR Cryptol. ePrint Arch. 2016: 25 (2016) - [i40]Thomas Peyrin:
Collision Attack on GRINDAHL. IACR Cryptol. ePrint Arch. 2016: 295 (2016) - [i39]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - 2015
- [j3]Thomas Peyrin
:
Collision Attack on Grindahl. J. Cryptol. 28(4): 879-898 (2015) - [c54]Céline Blondeau, Thomas Peyrin
, Lei Wang:
Known-Key Distinguisher on Full PRESENT. CRYPTO (1) 2015: 455-474 - [c53]Pierre Karpman, Thomas Peyrin
, Marc Stevens
:
Practical Free-Start Collision Attacks on 76-step SHA-1. CRYPTO (1) 2015: 623-642 - [c52]Thomas Peyrin
, Siang Meng Sim
, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. FSE 2015: 264-281 - [c51]Siang Meng Sim
, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin
:
Lightweight MDS Involution Matrices. FSE 2015: 471-493 - [i38]Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. IACR Cryptol. ePrint Arch. 2015: 258 (2015) - [i37]Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. IACR Cryptol. ePrint Arch. 2015: 279 (2015) - [i36]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. IACR Cryptol. ePrint Arch. 2015: 372 (2015) - [i35]Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. IACR Cryptol. ePrint Arch. 2015: 530 (2015) - [i34]Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-key Distinguisher on Full PRESENT. IACR Cryptol. ePrint Arch. 2015: 575 (2015) - [i33]Marc Stevens, Pierre Karpman, Thomas Peyrin:
Freestart collision on full SHA-1. IACR Cryptol. ePrint Arch. 2015: 967 (2015) - [i32]Thomas Peyrin, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 1049 (2015) - 2014
- [j2]Jérémy Jean, María Naya-Plasencia
, Thomas Peyrin
:
Improved Cryptanalysis of AES-like Permutations. J. Cryptol. 27(4): 772-798 (2014) - [c50]Jérémy Jean, Ivica Nikolic, Thomas Peyrin:
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework. ASIACRYPT (2) 2014: 274-288 - [c49]Khoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap:
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. CHES 2014: 433-450 - [c48]Jian Guo
, Thomas Peyrin
, Yu Sasaki, Lei Wang:
Updates on Generic Attacks against HMAC and NMAC. CRYPTO (1) 2014: 131-148 - [c47]Thomas Peyrin
, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-Based MACs. EUROCRYPT 2014: 147-164 - [c46]N. Nalla Anandakumar, Thomas Peyrin
, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. INDOCRYPT 2014: 304-321 - [c45]Jian Guo
, Jérémy Jean, Gaëtan Leurent
, Thomas Peyrin
, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Selected Areas in Cryptography 2014: 195-211 - [i31]Jian Guo, Jérémy Jean, Thomas Peyrin, Lei Wang:
Breaking POET Authentication with a Single Query. IACR Cryptol. ePrint Arch. 2014: 197 (2014) - [i30]Thomas Peyrin, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 403 (2014) - [i29]Gaëtan Leurent, Thomas Peyrin, Lei Wang:
New Generic Attacks Against Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 406 (2014) - [i28]Khoongming Khoo, Thomas Peyrin, Axel Poschmann, Huihui Yap:
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. IACR Cryptol. ePrint Arch. 2014: 530 (2014) - [i27]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. IACR Cryptol. ePrint Arch. 2014: 675 (2014) - [i26]N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. IACR Cryptol. ePrint Arch. 2014: 738 (2014) - [i25]Jérémy Jean, Ivica Nikolic, Thomas Peyrin:
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework. IACR Cryptol. ePrint Arch. 2014: 831 (2014) - [i24]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. IACR Cryptol. ePrint Arch. 2014: 931 (2014) - 2013
- [c44]Gaëtan Leurent
, Thomas Peyrin
, Lei Wang:
New Generic Attacks against Hash-Based MACs. ASIACRYPT (2) 2013: 1-20 - [c43]Florian Mendel
, Thomas Peyrin
, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c42]Mitsugu Iwamoto, Thomas Peyrin
, Yu Sasaki:
Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful. ASIACRYPT (2) 2013: 504-523 - [c41]Pierre-Alain Fouque
, Jérémy Jean, Thomas Peyrin
:
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128. CRYPTO (1) 2013: 183-203 - [c40]Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst
, Marko Wolf
, Alexandre Bouard, William R. Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, Samarjit Chakraborty:
Security challenges in automotive hardware/software architecture design. DATE 2013: 458-463 - [c39]Franck Landelle, Thomas Peyrin
:
Cryptanalysis of Full RIPEMD-128. EUROCRYPT 2013: 228-244