2024
- T. Yap and D. Jap, “Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack”
in Applied Cryptography and Network Security Workshops - ACNS 2024
- B. Cogliati, J. Jean, T. Peyrin and Y. Seurin, “A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers”
in IACR Communications in Cryptology CiC 2024-2
- Z. Xu, J. Cui, K. Hu and M. Wang, “Integral Attack on the Full FUTURE Block Cipher”
in TSINGHUA SCIENCE AND TECHNOLOGY
- A. Bariant, J. Baudrin, G. Leurent, C. Pernot, L. Perrin and T. Peyrin, “Fast AES-based Universal Hash Functions and MACs - Featuring LeMac and PetitMac”
in IACR Transactions on Symmetric Cryptology ToSC 2024-2 / Fast Software Encryption - FSE 2025
- K. Hu, “Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings – with a Break-Fix Strategy”
in IACR Transactions on Symmetric Cryptology ToSC 2024-2 / Fast Software Encryption - FSE 2025
- Z. Niu, K. Hu, S. Sun, Z. Zhang and M. Wan, “Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations”
in Advances in Cryptology - CRYPTO 2024
- R. Bhaumik, B. Chakraborty, W. Choi, A. Dutta, J. Govinden and Y. Shen, “The Committing Security of MACs with Applications to Generic Composition”
in Advances in Cryptology - CRYPTO 2024
- A. Benamira, T. Peyrin, T. Yap, T. Guérand and B. Hooi, “Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form”
in International Joint Conference on Artificial Intelligence - IJCAI 2024
- H. Li, H. Zhang, G. Liu, K. Hu and W. Qiu, “AlgSAT — a SAT Method for Verification of Differential Trails from an Algebraic Perspective”
in Information Security and Privacy - ACISP 2024
- B. Chakraborty, C. Dhar and M. Nandi, “Tight Multi-user Security of Ascon and Its Large Key Extension”
in Information Security and Privacy - ACISP 2024
- J. He, K. Hu, M. Wang and H. Lei, “Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium”
in Advances in Cryptology - EUROCRYPT 2024
2023
- H. Lei, J. He, K. Hu and M. Wang, “More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities”
in Selected Areas in Cryptography - SAC 2023
- B. Chakraborty, N. Datta and M. Nandi, “Designing Full-Rate Sponge based AEAD modes”
in Advances in Cryptology - INDOCRYPT 2023
- T. Yap, S. Picek and S. Bhasin, “Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis”
in Workshop on Attacks and Solutions in Hardware Security - ASHES 2023
- B. Chakraborty, C. Dhar and M. Nandi, “Exact Security Analysis of ASCON”
in Advances in Cryptology - ASIACRYPT 2023
- K. Hu, T. Peyrin, Q.Q. Tan and T. Yap, “Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective”
in Advances in Cryptology - ASIACRYPT 2023
- A. Benamira, T. Guérand and T. Peyrin, “A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making”
in International Conference on AI in Medicine - iAIM 2023
- A. Benamira, T. Guérand, T. Peyrin and H. Soegeng, “Neural Network-Based Rule Models With Truth Tables”
in European Conference on Artificial Intelligence - ECAI 2023
- E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin, “Boosting differential-linear cryptanalysis of ChaCha7 with MILP”
in IACR Transactions on Symmetric Cryptology ToSC 2023-2 / Fast Software Encryption - FSE 2024
- E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin, “Fully Automated Differential-Linear Attacks against ARX Ciphers”
in Topics in Cryptology - CT-RSA 2023
- T. Yap, A. Benamira, S. Bhasin and T. Peyrin, “Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis”
in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2023-2 / Cryptographic Hardware and Embedded Systems - CHES 2023
- S. Saha, P. Ravi, D. Jap and S. Bhasin, “Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP”
in Design, Automation and Test in Europe Conference - DATE 2023
- A. Chakraborty, S. Bhattacharya, S. Saha and D. Mukhopadhyay, “Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches”
in IEEE International Symposium on High-Performance Computer Architecture - HPCA 2023
2022
- S. Sinha, S. Saha, M. Alam, V. Agarwal, A. Chatterjee, A. Mishra, D. Khazanchi and D. Mukhopadhyay, “Exploring Bitslicing Architectures for Enabling FHE-Assisted Machine Learning”
in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - 2022
- R. Sadhukhan, S. Saha and D. Mukhopadhyay, “AntiSIFA-CAD: A Framework to Thwart SIFA at the Layout Level”
in ACM/IEEE International Conference on Computer-Aided Design - ICCAD 2022
- M. Khairallah and S. Bhasin, “Hardware Implementation of Masked SKINNY SBox with Application to AEAD”
in International Conference on Security, Privacy and Applied Cryptographic Engineering - SPACE 2022
- J. He, K. Hu, B. Preneel and M. Wang, “Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies”
in Advances in Cryptology - ASIACRYPT 2022
- J. Cui, K. Hu, M. Wang and P. Wei, “On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC”
in Advances in Cryptology - ASIACRYPT 2022
- A. Benamira, T. Peyrin and B. Hooi, “Truth-Table Net: A New Convolutional Architecture Encodable By Design Into SAT Formulas”
in Workshop on Adversarial Robustness in the Real World - AROW 2022
- S. Saha, M. Khairallah and T. Peyrin, “Exploring Integrity of AEADs with Faults: Definitions and Constructions”
in IACR Transactions on Symmetric Cryptology ToSC 2022-4 / Fast Software Encryption - FSE 2023
- Q.Q. Tan and T. Peyrin, “Mind You Path: on (Key) Dependencies in Differential Characteristics”
in IACR Transactions on Symmetric Cryptology ToSC 2022-4 / Fast Software Encryption - FSE 2023 - Best Paper Award
- M. Khairallah, “Security of COFB against Chosen Ciphertext Attacks”
in IACR Transactions on Symmetric Cryptology ToSC 2022-1 / Fast Software Encryption - FSE 2022
- K. Hu, T. Peyrin and M. Wang, “Finding All Impossible Differentials When Considering the DDT”
in Selected Areas in Cryptography - SAC 2022
2021
- A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, S. Sarkar and S. M. Sim, “DEFAULT: Cipher Level Resistance Against Differential Fault Attack”
in Advances in Cryptology - ASIACRYPT 2021
- D. Gerault, T. Peyrin and Q. Q. Tan, “Exploring Differential-Based Distinguishers and Forgeries for ASCON”
in IACR Transactions on Symmetric Cryptology ToSC 2021-3 / Fast Software Encryption - FSE 2022
- J. Jean, I. Nikolic, T. Peyrin and Y. Seurin, “The Deoxys AEAD Family”
in Journal of Cryptology - 2021
- A. Chattopadhyay, M. Khairallah, G. Leurent, Z. Najm, T. Peyrin and V. Velichkov, “On The Cost of ASIC Hardware Crackers: A SHA-1 Case Study”
in Topics in Cryptology - CT-RSA 2021
- A. Benamira, D. Gerault, T. Peyrin and Q. Q. Tan, “A Deeper Look at Machine Learning-Based Cryptanalysis”
in Advances in Cryptology - EUROCRYPT 2021
- A. Adomnicai and T. Peyrin, “Fixslicing AES-like Ciphers - New bitsliced AES speed records on ARM-Cortex M and RISC-V”
in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2021-1 / Cryptographic Hardware and Embedded Systems - CHES 2021
2020
- J. Breier, M. Khairallah, X. Hou and Y. Liu, “A Countermeasure Against Statistical Ineffective Fault Analysis”
in IEEE Transactions on Circuits and Systems II: Express Briefs - 2020
- T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin, “New Results on Romulus”
in NIST Lightweight Cryptography Workshop - NIST LWC 2020
- C. Guo, M. Khairallah and T. Peyrin, “AET-LR: Rate-1 Leakage-Resilient AEAD based on the Romulus Family”
in NIST Lightweight Cryptography Workshop - NIST LWC 2020
- A. Adomnicai and T. Peyrin, “Fixslicing - Application to Some NIST LWC Round 2 Candidates”
in NIST Lightweight Cryptography Workshop - NIST LWC 2020
- G. Leurent and T. Peyrin, “From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1”
in USENIX Security Symposium - USENIX Security 2020
- T. Peyrin and H. Wang, “SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust”
in Advances in Cryptology - CRYPTO 2020
- L. Sun, D. Gerault, A. Benamira and T. Peyrin, “NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis”
in International Symposium on Cyber Security Cryptology and Machine Learning - CSCML 2020
- C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich and S. M. Sim, “SKINNY-AEAD and SKINNY-Hash”
in IACR Transactions on Symmetric Cryptology ToSC 2020-LWC / Fast Software Encryption - FSE 2020
- D. Goudarzi, J. Jean, S. Kölbl, T. Peyrin, M. Rivain, Y. Sasaki and S. M. Sim, “Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation”
in IACR Transactions on Symmetric Cryptology ToSC 2020-LWC / Fast Software Encryption - FSE 2020
- T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin, “Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms”
in IACR Transactions on Symmetric Cryptology ToSC 2020-1 / Fast Software Encryption - FSE 2020
- A. Adomnicai, Z. Najm and T. Peyrin, “Fixslicing: A New GIFT Representation”
in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2020-3 / Cryptographic Hardware and Embedded Systems - CHES 2020
- Q. Q. Tan and T. Peyrin, “Improved Heuristics for Short Linear Programs”
in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2020-1 / Cryptographic Hardware and Embedded Systems - CHES 2020
2019
- M. Khairallah, S. Bhasin and K. M. Abdellatif, “On Comparison of Countermeasures against Statistical Ineffective Fault Attacks”
in IEEE International Conference on Microelectronics - ICM 2019
- V. B. Y. Kumar, S. Deb, R. Kumar, M. Khairallah, A. Chattopadhyay and A. Mendelson, “Recruiting Fault Tolerance Techniques for Microprocessor Security”
in IEEE Asian Test Symposium - ATS 2019
- P. Ravi, S. S. Gupta, A. Chattopadhyay, M. Khairallah, Z. Najm, S. Bhasin, “Security is an Architectural Design Constraint”
in The Journal of Microprocessors and Microsystems - 2019
- M. Khairallah, “Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed”
in IACR Transactions on Symmetric Cryptology ToSC 2019-4 / Fast Software Encryption - FSE 2020
- H. Wang, T. Peyrin, “Boomerang Switch in Multiple Rounds - Application to AES Variants and Deoxys”
in IACR Transactions on Symmetric Cryptology ToSC 2019-1 / Fast Software Encryption - FSE 2019
- D. Gerault, I. Boureanu, “Distance bounding under different assumptions: opinion”
in ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2019
- D. Gerault, I. Boureanu, “Here and there at once, with my mobile phone!”
in International Conference on Security and Cryptography - Secrypt 2019
- M. Khairallah, S. Bhasin, A. Chattopadhyay, “On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners”
in IEEE International Workshop on Advances in Sensors and Interfaces - IWASI 2019
- M. Khairallah, X. Hou, Z. Najm, J. Breier, S. Bhasin, T. Peyrin, “SoK : On DFA Vulnerabilities of Substitution-Permutation Networks”
in ACM ASIA Conference on Computer and Communications Security - AsiaCCS 2019
- G. Leurent, T. Peyrin, “From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1”
in Advances in Cryptology - EUROCRYPT 2019
2018
- P. Derbez, T. Iwata, L. Sun, S. Sun, Y. Todo, H. Wang, M. Wang, “Cryptanalysis of AES-PRF and Its Dual”
in IACR Transactions on Symmetric Cryptology ToSC 2018-2 / Fast Software Encryption - FSE 2019
- M. Khairallah, Z. Najm, A. Chattopadhyay, T. Peyrin, “Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey”
in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018
- Z. Najm, M. J. S. Flórez, F. Regazzoni, “Session details: Security threats caused by novel technologies”
in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018
- C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, “Boomerang Connectivity Table: a New Cryptanalysis Tool”
in Advances in Cryptology - EUROCRYPT 2018
- A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, “Protecting Block Ciphers against Differential Fault Attacks without Re-keying”
in IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2018
- Z. Najm, D. Jap, B. Jungk, S. Picek, S. Bhasin, “On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers”
in IEEE Asia Pacific Conference on Circuits and Systems - APCCAS 2018
- P. Ravi, B. Jungk, D. Jap, Z. Najm, S. Bhasin, “Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC”
in IEEE International Conference on Digital Signal Processing - DSL 2018
- A. Baksi, V. Pudi, S. Mandal, A. Chattopadhyay, “Lightweight ASIC Implementation of AEGIS-128”
in IEEE Computer Society Annual Symposium on VLSI - ISVLSI 2018
- M. A. Elmohr, S. Kumar, M. Khairallah, A. Chattopadhyay, “A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption”
in IEEE Computer Society Annual Symposium on VLSI - ISVLSI 2018
- M. Khairallah, R. Sadhukhan, R. Samanta, J. Breier, S. Bhasin, R. S. Chakraborty, A. Chattopadhyay, D. Mukhopadhyay, “DFARPA: Differential fault attack resistant physical design automation”
in Design, Automation and Test in Europe - DATE 2018
- M. Khairallah, A. Chattopadhyay, B. Mandal, S. Maitra, “On Hardware Implementation of Tang-Maitra Boolean Functions”
in WAIFI 2018
- D. Toh, J. Teo, K. Khoo, S. M. Sim, “Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count”
in AFRICACRYPT 2018
2017
- J. Jean, T. Peyrin, S. M. Sim, “Optimizing Implementations of Lightweight Building Blocks”
in IACR Transactions on Symmetric Cryptology ToSC 2017-4 / Fast Software Encryption - FSE 2018
- S. Bhasin, D. Jap, T. Peyrin, “Practical Evaluation of FSE 2016 Customized Encoding Countermeasure”
in IACR Transactions on Symmetric Cryptology ToSC 2017-3 / Fast Software Encryption - FSE 2018
- C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, “Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers”
in IACR Transactions on Symmetric Cryptology ToSC 2017-3 / Fast Software Encryption - FSE 2018
- K. Khoo, E. Lee, T. Peyrin, S. M. Sim, “Human-readable Proof of the Related-Key Security of AES-128”
in IACR Transactions on Symmetric Cryptology ToSC 2017-2 / Fast Software Encryption - FSE 2018
- S. Sarkar, S. Maitra, A. Baksi, “Observing Biases in the State: Case Studies with Trivium and Trivia-SC”
in Designs, Codes and Cryptography - 2017
- M. Khairallah, A. Chattopadhyay, T. Peyrin, “Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption”
in INDOCRYPT 2017
- J. Jean, A. Moradi, T. Peyrin, P. Sasdrich. “Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives”
in Cryptographic Hardware and Embedded Systems - CHES 2017
- S. Banik, S.K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim, Y. Todo. “GIFT: A Small Present”
in Cryptographic Hardware and Embedded Systems - CHES 2017
- T. Iwata, K. Minematsu, T. Peyrin, Y. Seurin, “ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication”
in Advances in Cryptology - CRYPTO 2017
- R. Ankele, S. Banik, A. Chakraborti, E. List, F. Mendel, S. M. Sim, G. Wang, “Related-Key Impossible-Differential Attack on Reduced-Round SKINNY”
in Applied Cryptography and Network Security Workshops - ACNS 2017
- S. V. D. Kumar, S. Patranabis, J. Breier, D. Mukhopadhyay, S. Bhasin, A. Chattopadhyay, A. Baksi, “A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20”
in FDTC 2017
2016
- J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions”
in IACR Transactions on Symmetric Cryptology ToSC 2016-2 / Fast Software Encryption - FSE 2017
- J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim, “Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs”
in IACR Transactions on Symmetric Cryptology ToSC 2016-1 / Fast Software Encryption - FSE 2017
- J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Extended meet-in-the-middle attacks on some Feistel constructions”
in Designs, Codes and Cryptography - 2016
- J. Jean, I. Nikolić, Y. Sasaki, L. Wang, “Practical Forgeries and Distinguishers against PAES”
in IEICE Transactions - 2016
- Y. Sasaki, L. Wang, “Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks”
in IEICE Transactions - 2016
- Y. Sasaki, L. Wang, “Message Extension Attack against Authenticated Encryptions: Application to PANDA”
in IEICE Transactions - 2016
- F. Landelle, T. Peyrin, “Cryptanalysis of Full RIPEMD-128”
in Journal of Cryptology - 2016
- T. Pandit, S.K. Pandey, R. Barua, “* Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version)*” in JISIS - 2016
- I. Nikolić, Y. Sasaki, “A New Algorithm for the Unbalanced Meet-in-the-Middle Problem”
in Advances in Cryptology - ASIACRYPT 2016
- P-A. Fouque, P. Karpman, P. Kirchner, B. Minaud, “Efficient and Provable White-Box Primitives”
in Advances in Cryptology - ASIACRYPT 2016
- C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, S. M. Sim, “The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS”
in Advances in Cryptology - CRYPTO 2016
- T. Peyrin, Y. Seurin, “Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers”
in Advances in Cryptology - CRYPTO 2016
- M. Stevens, P. Karpman, T. Peyrin, “Freestart collision on full SHA-1”
in Advances in Cryptology - EUROCRYPT 2016
- M. Liu, S. M. Sim, “Lightweight MDS Generalized Circulant Matrices”
in Fast Software Encryption - FSE 2016
- J. Jean, I. Nikolić, “Efficient Design Strategies Based on the AES Round Function”
in Fast Software Encryption - FSE 2016
- S. Sarkar, S. M. Sim, “A deeper understanding of the XOR count distribution in the context of lightweight cryptography”
in AFRICACRYPT 2016
- A. Chattopadhyay, A. Baksi. “Low-Quantum Cost Circuit Constructions for Adder and Symmetric Boolean Functions”
in ISCAS (Special Session) 2016
- J. Breier, D. Jap, S. Bhasin. “The Other Side of the Coin: Analyzing Software Encoding Schemes against Fault Injection Attacks”
in HOST 2016
- D. Jap, W. He, S. Bhasin. “Supervised and Unsupervised Machine Learning for Side-Channel based Trojan Detection”
in ASAP 2016
- K.C. Gupta, S.K. Pandey, I.G. Ray, “Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes.”
in INDOCRYPT 2016
2015
- T. Peyrin, “Collision Attack on Grindahl”
in Journal of Cryptology - 2015
- I. Nikolić, L. Wang, S. Wu, “The parallel-cut meet-in-the-middle attack”
in Cryptography and Communications - September 2015
- Y. Sasaki, L. Wang, “Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs”
in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015
- Y. Sasaki, G. Wang, L. Wang, “Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC”
in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015
- I. Nikolić, Y. Sasaki, “Refinements of the k-tree Algorithm for the Generalized Birthday Problem”
in Advances in Cryptology - ASIACRYPT 2015
- B. Minaud, P. Derbez, P-A. Fouque, P. Karpman, “Key-Recovery Attacks on ASASA”
in Advances in Cryptology - ASIACRYPT 2015 - Invited to JoC
- J. Jean, Y. Sasaki, L. Wang, “Analysis of the CAESAR Candidate Silver”
in Selected Areas in Cryptography 2015 - SAC 2015
- P. Karpman, “From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour”
in Information Security Conference - ISC 2015
- C. Blondeau, T. Peyrin, L. Wang, “Known-key Distinguisher on Full PRESENT”
in Advances in Cryptology - CRYPTO 2015
- P. Karpman, T. Peyrin, M. Stevens, “Practical Free-Start Collision Attacks on 76-step SHA-1”
in Advances in Cryptology - CRYPTO 2015
- . Espitau, P-A. Fouque, P. Karpman, “Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE”
in Advances in Cryptology - CRYPTO 2015
- J. Jean, I. Nikolić, “Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation”
in Fast Software Encryption - FSE 2015
- D. Khovratovich, I. Nikolić, J. Pieprzyk, P. Sokolowski, R. Steinfeld, “Rotational Cryptanalysis of ARX Revisited”
in Fast Software Encryption - FSE 2015
- S. M. Sim, K. Khoo, F. Oggier, T. Peyrin, “Lightweight MDS Involution Matrices”
in Fast Software Encryption - FSE 2015
- T. Peyrin, S. M. Sim, L. Wang, G. Zhang, “Cryptanalysis of JAMBU”
in Fast Software Encryption - FSE 2015
- G. Leurent, L. Wang, “The Sum Can Be Weaker Than Each Part”
in Advances in Cryptology - EUROCRYPT 2015
2014
- J. Jean, M. Naya-Plasencia, T. Peyrin, “Improved Cryptanalysis of AES-like Permutations”
in Journal of Cryptology - July 2013
- S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, “The Resistance of PRESENT-80 Against Related-Key Differential Attacks”
in Cryptography and Communications - September 2014
- D. Khovratovich, I. Nikolić, C. Rechberger, “Rotational Rebound Attacks on Reduced Skein”
in Journal of Cryptology - July 2014
- Y. Sasaki, L. Wang, “Comprehensive Study of Integral Analysis on LBlock”
in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014
- Y. Sasaki, L. Wang, “Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160”
in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014
- N. Anandakumar, T. Peyrin, A. Poschmann, “A Very Compact FPGA Implementation of LED and PHOTON”
in INDOCRYPT 2014
- J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Meet-in-the-Middle Attacks on Generic Feistel Constructions”
in Advances in Cryptology - ASIACRYPT 2014
- S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, “Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128”
in Advances in Cryptology - ASIACRYPT 2014
- J. Jean, I. Nikolić, T. Peyrin, “Tweaks and Keys for Block Ciphers: the TWEAKEY Framework”
in Advances in Cryptology - ASIACRYPT 2014
- Y. Sasaki, L. Wang, “Message Extension Attack against Authenticated Encryptions: Application to PANDA”
in CANS 2014
- A. Biryukov, I. Nikolić, “Colliding Keys for SC2000-256”
in Selected Areas in Cryptography - SAC 2014
- D. Augot, P-A. Fouque, P. Karpman, “Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation”
in Selected Areas in Cryptography - SAC 2014
- J. Jean, I. Nikolić, Y. Sasaki, L. Wang, “Practical Cryptanalysis of PAES”
in Selected Areas in Cryptography - SAC 2014
- J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang, “The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function”
in Selected Areas in Cryptography - SAC 2014
- Y. Sasaki, L. Wang, “Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks”
in SCN 2014
- K. Khoo, T. Peyrin, A. Poschmann, H. Yap, “FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison”
in Cryptographic Hardware and Embedded Systems - CHES 2014
- J. Guo, T. Peyrin, Y. Sasaki, L. Wang, “Updates on Generic Attacks against HMAC and NMAC”
in Advances in Cryptology - CRYPTO 2014
- T. Peyrin, L. Wang, “Generic Universal Forgery Attack on Iterative Hash-based MACs”
in Advances in Cryptology - EUROCRYPT 2014
- I. Dinur, J. Jean, “Cryptanalysis of FIDES”
in Fast Software Encryption - FSE 2014
- T. Iwata, L. Wang, “Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs”
in Fast Software Encryption - FSE 2014
- J. Guo, Y. Sasaki, L. Wang, M. Wang, L. Wen, “Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds”
in Fast Software Encryption - FSE 2014
- T. Iwata, K. Minematsu, J. Guo, S. Morioka, “CLOC: Authenticated Encryption for Short Input”
in Fast Software Encryption - FSE 2014
- J. Guo, P. Karpman, I. Nikolić, L. Wang, S. Wu, “Analysis of BLAKE2”
in RSA Conference Cryptographers’ Track - CT-RSA 2014
- Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, K. Ohta , “An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl”
in RSA Conference Cryptographers’ Track - CT-RSA 2014
2013
- P-A. Fouque, P. Karpman, “Security Amplification against Meet-in-the-Middle Attacks Using Whitening”
in IMA CC 2013
- G. Leurent, T. Peyrin, L. Wang, “New Generic Attacks Against Hash-based MACs”
in Advances in Cryptology - ASIACRYPT 2013
- F. Mendel, T. Peyrin, M. Schläffer, L. Wang, S. Wu, “Improved Cryptanalysis of Reduced RIPEMD-160”
in Advances in Cryptology - ASIACRYPT 2013
- M. Iwamoto, T. Peyrin, Y. Sasaki, “Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful”
in Advances in Cryptology - ASIACRYPT 2013
- J. Guo, Y. Sasaki, L. Wang, S. Wu, “Cryptanalysis of HMAC/NMAC-Whirlpool”
in Advances in Cryptology - ASIACRYPT 2013
- Y. Sasaki, L. Wang, “Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5”
in Selected Areas of Cryptography - SAC 2013
- J. Jean, M. Naya-Plasencia, T. Peyrin, “Multiple Limited-Birthday Distinguishers and Applications”
in Selected Areas of Cryptography - SAC 2013
- R. Benadjila, J. Guo, V. Lomné, T. Peyrin, “Implementing Lightweight Block Ciphers on x86 Architectures”
in Selected Areas of Cryptography - SAC 2013
- P.-A. Fouque, J. Jean, T. Peyrin, “Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128”
in Advances in Cryptology - CRYPTO 2013
- F. Landelle, T. Peyrin, “Cryptanalysis of Full RIPEMD-128”
in Advances in Cryptology - EUROCRYPT 2013 - Invited to JoC
- F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann, S. Chakraborty, “Security Challenges in Automotive Hardware/Software Architecture Design”
in Design, Automation & Test in Europe - DATE 2013
- J. Jean, I. Nikolic, T. Peyrin, L. Wang, S. Wu, “Security Analysis of PRINCE”
in Fast Software Encryption - FSE 2013
- I. Nikolić, L. Wang, S. Wu, “Cryptanalysis of Round-Reduced LED”
in Fast Software Encryption - FSE 2013
- A. Biryukov, I. Nikolić, “Complementing Feistel Ciphers”
in Fast Software Encryption - FSE 2013
- Y. Sasaki, L. Wang, “Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs”
in International Conference on Information Security and Cryptology - ICISC 2013
- Y. Naito, Y. Sasaki, L. Wang, K. Yasuda, “Generic State-Recovery and Forgery Attacks on ChopMD-MAC and NMAC/HMAC”
in International Workshop on Security - IWSEC 2013
- Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang , M. Iwamoto, K. Ohta, K. Sakiyama, “Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL”
in International Conference on Security and Cryptography - SECRYPT 2013
2012
- T. Peyrin, Y. Sasaki, L. Wang, “Generic Related-key Attacks for HMAC”
in Advances in Cryptology - ASIACRYPT 2012
- Y. Sasaki, L. Wang, S. Wu, W.L. Wu, “Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks”
in Advances in Cryptology - ASIACRYPT 2012
- J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan, “SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks”
in Progress in Cryptology - AFRICACRYPT 2012
- L. Wei, T. Peyrin, P. Sokołowski, S. Ling, J. Pieprzyk, H. Wang, “On the (In)Security of IDEA in Various Hashing Modes”
in Fast Software Encryption - FSE 2012
- J. Jean, M. Naya-Plasencia, T. Peyrin, “Improved Rebound Attack on the Finalist Grøstl”
in Fast Software Encryption - FSE 2012 - Best Paper Award
- M. Naya-Plasencia, T. Peyrin, “Practical Cryptanalysis of ARMADILLO2”
in Fast Software Encryption - FSE 2012
- A. Duc, J. Guo, T. Peyrin, L.Wei, “Unaligned Rebound Attack: Application to Keccak”
in Fast Software Encryption - FSE 2012
- Y. Sasaki, L. Wang, “Comprehensive Study of Integral Analysis on 22-Round LBlock”
in International Conference on Information Security and Cryptology - ICISC 2012