default search action
Thomas Peyrin
Person information
- affiliation: Nanyang Technological University, Singapore
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin:
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. IACR Commun. Cryptol. 1(2): 17 (2024) - [j22]Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin:
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac. IACR Trans. Symmetric Cryptol. 2024(2): 35-67 (2024) - [c78]Adrien Benamira, Thomas Peyrin, Trevor Yap, Tristan Guérand, Bryan Hooi:
Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form. IJCAI 2024: 13-21 - [i74]Emanuele Bellini, David Gérault, Juan Grados, Thomas Peyrin:
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs. IACR Cryptol. ePrint Arch. 2024: 1743 (2024) - 2023
- [j21]Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 24-53 (2023) - [j20]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP. IACR Trans. Symmetric Cryptol. 2023(2): 189-223 (2023) - [c77]Kai Hu, Thomas Peyrin, Quan Quan Tan, Trevor Yap:
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective. ASIACRYPT (3) 2023: 405-435 - [c76]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks Against ARX Ciphers. CT-RSA 2023: 252-276 - [c75]Adrien Benamira, Tristan Guérand, Thomas Peyrin, Hans Soegeng:
Neural Network-Based Rule Models with Truth Tables. ECAI 2023: 223-230 - [i73]Adrien Benamira, Tristan Guérand, Thomas Peyrin, Sayandeep Saha:
TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture. CoRR abs/2302.01584 (2023) - [i72]Adrien Benamira, Tristan Guérand, Thomas Peyrin, Hans Soegeng:
Neural Network-Based Rule Models With Truth Tables. CoRR abs/2309.09638 (2023) - [i71]Adrien Benamira, Tristan Guérand, Thomas Peyrin:
A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making. CoRR abs/2309.11101 (2023) - [i70]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks against ARX Ciphers. IACR Cryptol. ePrint Arch. 2023: 181 (2023) - 2022
- [j19]Thomas Peyrin, Quan Quan Tan:
Mind Your Path: On (Key) Dependencies in Differential Characteristics. IACR Trans. Symmetric Cryptol. 2022(4): 179-207 (2022) - [j18]Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Trans. Symmetric Cryptol. 2022(4): 291-324 (2022) - [c74]Adrien Benamira, Thomas Peyrin, Bryan Hooi Kuen-Yew:
Truth-Table Net: A New Convolutional Architecture Encodable by Design into SAT Formulas. ECCV Workshops (1) 2022: 483-500 - [c73]Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. SAC 2022: 285-305 - [i69]Adrien Benamira, Thomas Peyrin, Bryan Hooi Kuen-Yew:
Truth-Table Net: A New Convolutional Architecture Encodable By Design Into SAT Formulas. CoRR abs/2208.08609 (2022) - [i68]Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin:
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2022: 846 (2022) - [i67]Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. IACR Cryptol. ePrint Arch. 2022: 1034 (2022) - [i66]Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2022: 1055 (2022) - [i65]Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1247 (2022) - [i64]Kai Hu, Thomas Peyrin:
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha. IACR Cryptol. ePrint Arch. 2022: 1335 (2022) - [i63]Thomas Peyrin, Quan Quan Tan:
Mind Your Path: On (Key) Dependencies in Differential Characteristics. IACR Cryptol. ePrint Arch. 2022: 1734 (2022) - 2021
- [j17]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Yannick Seurin:
The Deoxys AEAD Family. J. Cryptol. 34(3): 31 (2021) - [j16]Alexandre Adomnicai, Thomas Peyrin:
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 402-425 (2021) - [j15]David Gérault, Thomas Peyrin, Quan Quan Tan:
Exploring Differential-Based Distinguishers and Forgeries for ASCON. IACR Trans. Symmetric Cryptol. 2021(3): 102-136 (2021) - [c72]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. ASIACRYPT (2) 2021: 124-156 - [c71]Anupam Chattopadhyay, Mustafa Khairallah, Gaëtan Leurent, Zakaria Najm, Thomas Peyrin, Vesselin Velichkov:
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study. CT-RSA 2021: 657-681 - [c70]Adrien Benamira, David Gérault, Thomas Peyrin, Quan Quan Tan:
A Deeper Look at Machine Learning-Based Cryptanalysis. EUROCRYPT (1) 2021: 805-835 - [i62]Adrien Benamira, David Gérault, Thomas Peyrin, Quan Quan Tan:
A Deeper Look at Machine Learning-Based Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 287 (2021) - [i61]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. IACR Cryptol. ePrint Arch. 2021: 712 (2021) - [i60]David Gérault, Thomas Peyrin, Quan Quan Tan:
Exploring Differential-Based Distinguishers and Forgeries for ASCON. IACR Cryptol. ePrint Arch. 2021: 1103 (2021) - 2020
- [j14]Quan Quan Tan, Thomas Peyrin:
Improved Heuristics for Short Linear Programs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 203-230 (2020) - [j13]Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin:
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 402-427 (2020) - [j12]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020) - [j11]Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. IACR Trans. Symmetric Cryptol. 2020(S1): 31-59 (2020) - [j10]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [c69]Thomas Peyrin, Haoyang Wang:
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers. CRYPTO (3) 2020: 249-278 - [c68]Ling Sun, David Gérault, Adrien Benamira, Thomas Peyrin:
NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis. CSCML 2020: 62-84 - [c67]Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. USENIX Security Symposium 2020: 1839-1856 - [i59]Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. IACR Cryptol. ePrint Arch. 2020: 14 (2020) - [i58]Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin:
Fixslicing: A New GIFT Representation. IACR Cryptol. ePrint Arch. 2020: 412 (2020) - [i57]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i56]Thomas Peyrin, Haoyang Wang:
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 986 (2020) - [i55]Alexandre Adomnicai, Thomas Peyrin:
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V. IACR Cryptol. ePrint Arch. 2020: 1123 (2020) - [i54]Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay:
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates. IACR Cryptol. ePrint Arch. 2020: 1459 (2020)
2010 – 2019
- 2019
- [j9]Haoyang Wang, Thomas Peyrin:
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys. IACR Trans. Symmetric Cryptol. 2019(1): 142-169 (2019) - [c66]Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks. AsiaCCS 2019: 403-414 - [c65]Gaëtan Leurent, Thomas Peyrin:
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1. EUROCRYPT (3) 2019: 527-555 - [i53]Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. IACR Cryptol. ePrint Arch. 2019: 387 (2019) - [i52]Gaëtan Leurent, Thomas Peyrin:
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1. IACR Cryptol. ePrint Arch. 2019: 459 (2019) - [i51]Quan Quan Tan, Thomas Peyrin:
Improved Heuristics for Short Linear Programs. IACR Cryptol. ePrint Arch. 2019: 847 (2019) - [i50]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Cryptol. ePrint Arch. 2019: 992 (2019) - 2018
- [c64]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. EUROCRYPT (2) 2018: 683-714 - [c63]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting block ciphers against differential fault attacks without re-keying. HOST 2018: 191-194 - [c62]Mustafa Khairallah, Zakaria Najm, Anupam Chattopadhyay, Thomas Peyrin:
Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey. SAMOS 2018: 167-172 - [e7]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11272, Springer 2018, ISBN 978-3-030-03325-5 [contents] - [e6]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11273, Springer 2018, ISBN 978-3-030-03328-6 [contents] - [e5]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. Lecture Notes in Computer Science 11274, Springer 2018, ISBN 978-3-030-03331-6 [contents] - [i49]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version). IACR Cryptol. ePrint Arch. 2018: 85 (2018) - [i48]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. IACR Cryptol. ePrint Arch. 2018: 161 (2018) - 2017
- [j8]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. IACR Trans. Symmetric Cryptol. 2017(2): 59-83 (2017) - [j7]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(3): 73-107 (2017) - [j6]Shivam Bhasin, Dirmanto Jap, Thomas Peyrin:
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure. IACR Trans. Symmetric Cryptol. 2017(3): 108-129 (2017) - [j5]Jérémy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux:
Optimizing Implementations of Lightweight Building Blocks. IACR Trans. Symmetric Cryptol. 2017(4): 130-168 (2017) - [c61]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [c60]Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. CHES 2017: 687-707 - [c59]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO (3) 2017: 34-65 - [c58]Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin:
Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. INDOCRYPT 2017: 282-301 - [e4]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10624, Springer 2017, ISBN 978-3-319-70693-1 [contents] - [e3]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10625, Springer 2017, ISBN 978-3-319-70696-2 [contents] - [e2]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10626, Springer 2017, ISBN 978-3-319-70699-3 [contents] - [i47]Jérémy Jean, Thomas Peyrin, Siang Meng Sim:
Optimizing Implementations of Lightweight Building Blocks. IACR Cryptol. ePrint Arch. 2017: 101 (2017) - [i46]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. IACR Cryptol. ePrint Arch. 2017: 535 (2017) - [i45]Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. IACR Cryptol. ePrint Arch. 2017: 600 (2017) - [i44]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - [i43]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 693 (2017) - [i42]Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin:
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. IACR Cryptol. ePrint Arch. 2017: 1019 (2017) - 2016
- [j4]Franck Landelle, Thomas Peyrin:
Cryptanalysis of Full RIPEMD-128. J. Cryptol. 29(4): 927-951 (2016) - [c57]Thomas Peyrin, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. CRYPTO (1) 2016: 33-63 - [c56]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c55]Marc Stevens, Pierre Karpman, Thomas Peyrin:
Freestart Collision for Full SHA-1. EUROCRYPT (1) 2016: 459-483 - [e1]Thomas Peyrin:
Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9783, Springer 2016, ISBN 978-3-662-52992-8 [contents] - [i41]Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. IACR Cryptol. ePrint Arch. 2016: 25 (2016) - [i40]Thomas Peyrin:
Collision Attack on GRINDAHL. IACR Cryptol. ePrint Arch. 2016: 295 (2016) - [i39]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - 2015
- [j3]Thomas Peyrin:
Collision Attack on Grindahl. J. Cryptol. 28(4): 879-898 (2015) - [c54]Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-Key Distinguisher on Full PRESENT. CRYPTO (1) 2015: 455-474 - [c53]Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. CRYPTO (1) 2015: 623-642 - [c52]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. FSE 2015: 264-281 - [c51]Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. FSE 2015: 471-493 - [i38]Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:
Lightweight MDS Involution Matrices. IACR Cryptol. ePrint Arch. 2015: 258 (2015) - [i37]Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. IACR Cryptol. ePrint Arch. 2015: 279 (2015) - [i36]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. IACR Cryptol. ePrint Arch. 2015: 372 (2015) - [i35]Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. IACR Cryptol. ePrint Arch. 2015: 530 (2015) - [i34]Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-key Distinguisher on Full PRESENT. IACR Cryptol. ePrint Arch. 2015: 575 (2015) - [i33]Marc Stevens, Pierre Karpman, Thomas Peyrin:
Freestart collision on full SHA-1. IACR Cryptol. ePrint Arch. 2015: 967 (2015) - [i32]Thomas Peyrin, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 1049 (2015) - 2014
- [j2]Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Cryptanalysis of AES-like Permutations. J. Cryptol. 27(4): 772-798 (2014) - [c50]Jérémy Jean, Ivica Nikolic, Thomas Peyrin:
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework. ASIACRYPT (2) 2014: 274-288 - [c49]Khoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap:
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. CHES 2014: 433-450 - [c48]Jian Guo, Thomas Peyrin, Yu Sasaki, Lei Wang:
Updates on Generic Attacks against HMAC and NMAC. CRYPTO (1) 2014: 131-148 - [c47]Thomas Peyrin, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-Based MACs. EUROCRYPT 2014: 147-164 - [c46]N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. INDOCRYPT 2014: 304-321 - [c45]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Selected Areas in Cryptography 2014: 195-211 - [i31]Jian Guo, Jérémy Jean, Thomas Peyrin, Lei Wang:
Breaking POET Authentication with a Single Query. IACR Cryptol. ePrint Arch. 2014: 197 (2014) - [i30]Thomas Peyrin, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 403 (2014) - [i29]Gaëtan Leurent, Thomas Peyrin, Lei Wang:
New Generic Attacks Against Hash-based MACs. IACR Cryptol. ePrint Arch. 2014: 406 (2014) - [i28]Khoongming Khoo, Thomas Peyrin, Axel Poschmann, Huihui Yap:
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. IACR Cryptol. ePrint Arch. 2014: 530 (2014) - [i27]Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. IACR Cryptol. ePrint Arch. 2014: 675 (2014) - [i26]N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. IACR Cryptol. ePrint Arch. 2014: 738 (2014) - [i25]Jérémy Jean, Ivica Nikolic, Thomas Peyrin:
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework. IACR Cryptol. ePrint Arch. 2014: 831 (2014) - [i24]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. IACR Cryptol. ePrint Arch. 2014: 931 (2014) - 2013
- [c44]Gaëtan Leurent, Thomas Peyrin, Lei Wang:
New Generic Attacks against Hash-Based MACs. ASIACRYPT (2) 2013: 1-20 - [c43]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. ASIACRYPT (2) 2013: 484-503 - [c42]Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki:
Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful. ASIACRYPT (2) 2013: 504-523 - [c41]Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin:
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128. CRYPTO (1) 2013: 183-203 - [c40]Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William R. Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, Samarjit Chakraborty:
Security challenges in automotive hardware/software architecture design. DATE 2013: 458-463 - [c39]Franck Landelle, Thomas Peyrin:
Cryptanalysis of Full RIPEMD-128. EUROCRYPT 2013: 228-244 - [c38]Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. FSE 2013: 92-111 - [c37]Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin:
Implementing Lightweight Block Ciphers on x86 Architectures. Selected Areas in Cryptography 2013: 324-351 - [c36]Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Multiple Limited-Birthday Distinguishers and Applications. Selected Areas in Cryptography 2013: 533-550 - [i23]Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin:
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. IACR Cryptol. ePrint Arch. 2013: 366 (2013) - [i22]Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin:
Implementing Lightweight Block Ciphers on x86 Architectures. IACR Cryptol. ePrint Arch. 2013: 445 (2013) - [i21]Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Multiple Limited-Birthday Distinguishers and Applications. IACR Cryptol. ePrint Arch. 2013: 521 (2013) - [i20]Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu:
Improved Cryptanalysis of Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2013: 600 (2013) - [i19]Franck Landelle, Thomas Peyrin:
Cryptanalysis of Full RIPEMD-128. IACR Cryptol. ePrint Arch. 2013: 607 (2013) - [i18]Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki:
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful. IACR Cryptol. ePrint Arch. 2013: 611 (2013) - [i17]Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang:
Cryptanalysis of Zorro. IACR Cryptol. ePrint Arch. 2013: 713 (2013) - 2012
- [c35]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks. AFRICACRYPT 2012: 270-286 - [c34]Thomas Peyrin, Yu Sasaki, Lei Wang:
Generic Related-Key Attacks for HMAC. ASIACRYPT 2012: 580-597 - [c33]Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Improved Rebound Attack on the Finalist Grøstl. FSE 2012: 110-126 - [c32]María Naya-Plasencia, Thomas Peyrin:
Practical Cryptanalysis of ARMADILLO2. FSE 2012: 146-162 - [c31]Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. FSE 2012: 163-179 - [c30]Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei:
Unaligned Rebound Attack: Application to Keccak. FSE 2012: 402-421 - [i16]Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks. IACR Cryptol. ePrint Arch. 2012: 234 (2012) - [i15]Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. IACR Cryptol. ePrint Arch. 2012: 264 (2012) - [i14]Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. IACR Cryptol. ePrint Arch. 2012: 600 (2012) - [i13]Thomas Peyrin, Yu Sasaki, Lei Wang:
Generic Related-key Attacks for HMAC. IACR Cryptol. ePrint Arch. 2012: 684 (2012) - 2011
- [c29]Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. CHES 2011: 326-341 - [c28]Jian Guo, Thomas Peyrin, Axel Poschmann:
The PHOTON Family of Lightweight Hash Functions. CRYPTO 2011: 222-239 - [c27]Marine Minier, María Naya-Plasencia, Thomas Peyrin:
Analysis of Reduced-SHAvite-3-256 v2. FSE 2011: 68-87 - [i12]Marine Minier, María Naya-Plasencia, Thomas Peyrin:
Analysis of reduced-SHAvite-3-256 v2. IACR Cryptol. ePrint Arch. 2011: 175 (2011) - [i11]Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei:
Unaligned Rebound Attack - Application to Keccak. IACR Cryptol. ePrint Arch. 2011: 420 (2011) - [i10]Jian Guo, Thomas Peyrin, Axel Poschmann:
The PHOTON Family of Lightweight Hash Functions. IACR Cryptol. ePrint Arch. 2011: 609 (2011) - 2010
- [c26]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. ACISP 2010: 87-103 - [c25]Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. AFRICACRYPT 2010: 419-436 - [c24]Eric Brier, Thomas Peyrin:
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT. ASIACRYPT 2010: 250-267 - [c23]Olivier Benoît, Thomas Peyrin:
Side-Channel Analysis of Six SHA-3 Candidates. CHES 2010: 140-157 - [c22]Thomas Peyrin:
Improved Differential Attacks for ECHO and Grøstl. CRYPTO 2010: 370-392 - [c21]María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin:
Cryptanalysis of ESSENCE. FSE 2010: 134-152 - [c20]Henri Gilbert, Thomas Peyrin:
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. FSE 2010: 365-383 - [i9]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. IACR Cryptol. ePrint Arch. 2010: 91 (2010) - [i8]Thomas Peyrin:
Improved Differential Attacks for ECHO and Grostl. IACR Cryptol. ePrint Arch. 2010: 223 (2010) - [i7]Olivier Benoît, Thomas Peyrin:
Side-channel Analysis of Six SHA-3 Candidates. IACR Cryptol. ePrint Arch. 2010: 447 (2010)
2000 – 2009
- 2009
- [j1]Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro, Kazuo Ohta:
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 87-95 (2009) - [c19]Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin:
Inside the Hypercube. ACISP 2009: 202-213 - [c18]Eric Brier, Thomas Peyrin:
Cryptanalysis of CubeHash. ACNS 2009: 354-368 - [c17]Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin:
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. ASIACRYPT 2009: 560-577 - [c16]Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel:
Cryptanalysis of the ESSENCE Family of Hash Functions. Inscrypt 2009: 15-34 - [c15]Thomas Fuhr, Thomas Peyrin:
Cryptanalysis of RadioGatún. FSE 2009: 122-138 - [c14]Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Selected Areas in Cryptography 2009: 16-35 - [i6]María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin:
Cryptanalysis of ESSENCE. IACR Cryptol. ePrint Arch. 2009: 302 (2009) - [i5]Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin:
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. IACR Cryptol. ePrint Arch. 2009: 382 (2009) - [i4]Henri Gilbert, Thomas Peyrin:
Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations. IACR Cryptol. ePrint Arch. 2009: 531 (2009) - 2008
- [c13]Michael Gorski, Stefan Lucks, Thomas Peyrin:
Slide Attacks on a Class of Hash Functions. ASIACRYPT 2008: 143-160 - [c12]Stéphane Manuel, Thomas Peyrin:
Collisions on SHA-0 in One Hour. FSE 2008: 16-35 - [c11]Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin:
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. ProvSec 2008: 241-253 - [i3]Michael Gorski, Stefan Lucks, Thomas Peyrin:
Slide Attacks on a Class of Hash Functions. IACR Cryptol. ePrint Arch. 2008: 263 (2008) - [i2]Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin:
Inside the Hypercube. IACR Cryptol. ePrint Arch. 2008: 486 (2008) - [i1]Thomas Fuhr, Thomas Peyrin:
Cryptanalysis of RadioGatun. IACR Cryptol. ePrint Arch. 2008: 515 (2008) - 2007
- [c10]Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin:
On Building Hash Functions from Multivariate Quadratic Equations. ACISP 2007: 82-95 - [c9]Thomas Peyrin:
Cryptanalysis of Grindahl. ASIACRYPT 2007: 551-567 - [c8]Antoine Joux, Thomas Peyrin:
Hash Functions and the (Amplified) Boomerang Attack. CRYPTO 2007: 244-263 - [c7]Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk:
Cryptanalysis of FORK-256. FSE 2007: 19-38 - [c6]Yannick Seurin, Thomas Peyrin:
Security Analysis of Constructions Combining FIL Random Oracles. FSE 2007: 119-136 - 2006
- [c5]Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw:
Combining Compression Functions and Block Cipher-Based Hash Functions. ASIACRYPT 2006: 315-331 - [c4]Frédéric Muller, Thomas Peyrin:
Cryptanalysis of T-Function-Based Hash Functions. ICISC 2006: 267-285 - 2005
- [c3]Frédéric Muller, Thomas Peyrin:
Linear Cryptanalysis of the TSC Family of Stream Ciphers. ASIACRYPT 2005: 373-394 - [c2]Thomas Peyrin, Serge Vaudenay:
The Pairing Problem with User Interaction. SEC 2005: 251-266 - 2004
- [c1]Gildas Avoine, Jean Monnerat, Thomas Peyrin:
Advances in Alternative Non-adjacent Form Representations. INDOCRYPT 2004: 260-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint