2024

  • T. Yap and D. Jap, “Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack” in Applied Cryptography and Network Security Workshops - ACNS 2024
  • B. Cogliati, J. Jean, T. Peyrin and Y. Seurin, “A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers
    in IACR Communications in Cryptology CiC 2024-2
  • Z. Xu, J. Cui, K. Hu and M. Wang, “Integral Attack on the Full FUTURE Block Cipher
    in TSINGHUA SCIENCE AND TECHNOLOGY
  • A. Bariant, J. Baudrin, G. Leurent, C. Pernot, L. Perrin and T. Peyrin, “Fast AES-based Universal Hash Functions and MACs - Featuring LeMac and PetitMac
    in IACR Transactions on Symmetric Cryptology ToSC 2024-2 / Fast Software Encryption - FSE 2025
  • K. Hu, “Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings – with a Break-Fix Strategy
    in IACR Transactions on Symmetric Cryptology ToSC 2024-2 / Fast Software Encryption - FSE 2025
  • Z. Niu, K. Hu, S. Sun, Z. Zhang and M. Wan, “Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations
    in Advances in Cryptology - CRYPTO 2024
  • R. Bhaumik, B. Chakraborty, W. Choi, A. Dutta, J. Govinden and Y. Shen, “The Committing Security of MACs with Applications to Generic Composition
    in Advances in Cryptology - CRYPTO 2024
  • A. Benamira, T. Peyrin, T. Yap, T. Guérand and B. Hooi, “Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form
    in International Joint Conference on Artificial Intelligence - IJCAI 2024
  • H. Li, H. Zhang, G. Liu, K. Hu and W. Qiu, “AlgSAT — a SAT Method for Verification of Differential Trails from an Algebraic Perspective
    in Information Security and Privacy - ACISP 2024
  • B. Chakraborty, C. Dhar and M. Nandi, “Tight Multi-user Security of Ascon and Its Large Key Extension
    in Information Security and Privacy - ACISP 2024
  • J. He, K. Hu, M. Wang and H. Lei, “Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium
    in Advances in Cryptology - EUROCRYPT 2024

2023

  • H. Lei, J. He, K. Hu and M. Wang, “More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities
    in Selected Areas in Cryptography - SAC 2023
  • B. Chakraborty, N. Datta and M. Nandi, “Designing Full-Rate Sponge based AEAD modes
    in Advances in Cryptology - INDOCRYPT 2023
  • T. Yap, S. Picek and S. Bhasin, “Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis
    in Workshop on Attacks and Solutions in Hardware Security - ASHES 2023
  • B. Chakraborty, C. Dhar and M. Nandi, “Exact Security Analysis of ASCON
    in Advances in Cryptology - ASIACRYPT 2023
  • K. Hu, T. Peyrin, Q.Q. Tan and T. Yap, “Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective
    in Advances in Cryptology - ASIACRYPT 2023
  • A. Benamira, T. Guérand and T. Peyrin, “A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making
    in International Conference on AI in Medicine - iAIM 2023
  • A. Benamira, T. Guérand, T. Peyrin and H. Soegeng, “Neural Network-Based Rule Models With Truth Tables
    in European Conference on Artificial Intelligence - ECAI 2023
  • E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin, “Boosting differential-linear cryptanalysis of ChaCha7 with MILP
    in IACR Transactions on Symmetric Cryptology ToSC 2023-2 / Fast Software Encryption - FSE 2024
  • E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin, “Fully Automated Differential-Linear Attacks against ARX Ciphers
    in Topics in Cryptology - CT-RSA 2023
  • T. Yap, A. Benamira, S. Bhasin and T. Peyrin, “Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
    in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2023-2 / Cryptographic Hardware and Embedded Systems - CHES 2023
  • S. Saha, P. Ravi, D. Jap and S. Bhasin, “Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP
    in Design, Automation and Test in Europe Conference - DATE 2023
  • A. Chakraborty, S. Bhattacharya, S. Saha and D. Mukhopadhyay, “Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches
    in IEEE International Symposium on High-Performance Computer Architecture - HPCA 2023

2022

  • S. Sinha, S. Saha, M. Alam, V. Agarwal, A. Chatterjee, A. Mishra, D. Khazanchi and D. Mukhopadhyay, “Exploring Bitslicing Architectures for Enabling FHE-Assisted Machine Learning
    in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - 2022
  • R. Sadhukhan, S. Saha and D. Mukhopadhyay, “AntiSIFA-CAD: A Framework to Thwart SIFA at the Layout Level
    in ACM/IEEE International Conference on Computer-Aided Design - ICCAD 2022
  • M. Khairallah and S. Bhasin, “Hardware Implementation of Masked SKINNY SBox with Application to AEAD
    in International Conference on Security, Privacy and Applied Cryptographic Engineering - SPACE 2022
  • J. He, K. Hu, B. Preneel and M. Wang, “Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies
    in Advances in Cryptology - ASIACRYPT 2022
  • J. Cui, K. Hu, M. Wang and P. Wei, “On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC
    in Advances in Cryptology - ASIACRYPT 2022
  • A. Benamira, T. Peyrin and B. Hooi, “Truth-Table Net: A New Convolutional Architecture Encodable By Design Into SAT Formulas
    in Workshop on Adversarial Robustness in the Real World - AROW 2022
  • S. Saha, M. Khairallah and T. Peyrin, “Exploring Integrity of AEADs with Faults: Definitions and Constructions
    in IACR Transactions on Symmetric Cryptology ToSC 2022-4 / Fast Software Encryption - FSE 2023
  • Q.Q. Tan and T. Peyrin, “Mind You Path: on (Key) Dependencies in Differential Characteristics
    in IACR Transactions on Symmetric Cryptology ToSC 2022-4 / Fast Software Encryption - FSE 2023 - Best Paper Award
  • M. Khairallah, “Security of COFB against Chosen Ciphertext Attacks
    in IACR Transactions on Symmetric Cryptology ToSC 2022-1 / Fast Software Encryption - FSE 2022
  • K. Hu, T. Peyrin and M. Wang, “Finding All Impossible Differentials When Considering the DDT
    in Selected Areas in Cryptography - SAC 2022

2021

  • A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, S. Sarkar and S. M. Sim, “DEFAULT: Cipher Level Resistance Against Differential Fault Attack
    in Advances in Cryptology - ASIACRYPT 2021
  • D. Gerault, T. Peyrin and Q. Q. Tan, “Exploring Differential-Based Distinguishers and Forgeries for ASCON
    in IACR Transactions on Symmetric Cryptology ToSC 2021-3 / Fast Software Encryption - FSE 2022
  • J. Jean, I. Nikolic, T. Peyrin and Y. Seurin, “The Deoxys AEAD Family
    in Journal of Cryptology - 2021
  • A. Chattopadhyay, M. Khairallah, G. Leurent, Z. Najm, T. Peyrin and V. Velichkov, “On The Cost of ASIC Hardware Crackers: A SHA-1 Case Study
    in Topics in Cryptology - CT-RSA 2021
  • A. Benamira, D. Gerault, T. Peyrin and Q. Q. Tan, “A Deeper Look at Machine Learning-Based Cryptanalysis
    in Advances in Cryptology - EUROCRYPT 2021
  • A. Adomnicai and T. Peyrin, “Fixslicing AES-like Ciphers - New bitsliced AES speed records on ARM-Cortex M and RISC-V
    in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2021-1 / Cryptographic Hardware and Embedded Systems - CHES 2021

2020

  • J. Breier, M. Khairallah, X. Hou and Y. Liu, “A Countermeasure Against Statistical Ineffective Fault Analysis
    in IEEE Transactions on Circuits and Systems II: Express Briefs - 2020
  • T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin, “New Results on Romulus
    in NIST Lightweight Cryptography Workshop - NIST LWC 2020
  • C. Guo, M. Khairallah and T. Peyrin, “AET-LR: Rate-1 Leakage-Resilient AEAD based on the Romulus Family
    in NIST Lightweight Cryptography Workshop - NIST LWC 2020
  • A. Adomnicai and T. Peyrin, “Fixslicing - Application to Some NIST LWC Round 2 Candidates
    in NIST Lightweight Cryptography Workshop - NIST LWC 2020
  • G. Leurent and T. Peyrin, “From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
    in USENIX Security Symposium - USENIX Security 2020
  • T. Peyrin and H. Wang, “SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
    in Advances in Cryptology - CRYPTO 2020
  • L. Sun, D. Gerault, A. Benamira and T. Peyrin, “NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis
    in International Symposium on Cyber Security Cryptology and Machine Learning - CSCML 2020
  • C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich and S. M. Sim, “SKINNY-AEAD and SKINNY-Hash
    in IACR Transactions on Symmetric Cryptology ToSC 2020-LWC / Fast Software Encryption - FSE 2020
  • D. Goudarzi, J. Jean, S. Kölbl, T. Peyrin, M. Rivain, Y. Sasaki and S. M. Sim, “Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
    in IACR Transactions on Symmetric Cryptology ToSC 2020-LWC / Fast Software Encryption - FSE 2020
  • T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin, “Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
    in IACR Transactions on Symmetric Cryptology ToSC 2020-1 / Fast Software Encryption - FSE 2020
  • A. Adomnicai, Z. Najm and T. Peyrin, “Fixslicing: A New GIFT Representation
    in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2020-3 / Cryptographic Hardware and Embedded Systems - CHES 2020
  • Q. Q. Tan and T. Peyrin, “Improved Heuristics for Short Linear Programs
    in IACR Transactions on Cryptographic Hardware and Embedded Systems TCHES 2020-1 / Cryptographic Hardware and Embedded Systems - CHES 2020

2019

  • M. Khairallah, S. Bhasin and K. M. Abdellatif, “On Comparison of Countermeasures against Statistical Ineffective Fault Attacks
    in IEEE International Conference on Microelectronics - ICM 2019
  • V. B. Y. Kumar, S. Deb, R. Kumar, M. Khairallah, A. Chattopadhyay and A. Mendelson, “Recruiting Fault Tolerance Techniques for Microprocessor Security
    in IEEE Asian Test Symposium - ATS 2019
  • P. Ravi, S. S. Gupta, A. Chattopadhyay, M. Khairallah, Z. Najm, S. Bhasin, “Security is an Architectural Design Constraint
    in The Journal of Microprocessors and Microsystems - 2019
  • M. Khairallah, “Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
    in IACR Transactions on Symmetric Cryptology ToSC 2019-4 / Fast Software Encryption - FSE 2020
  • H. Wang, T. Peyrin, “Boomerang Switch in Multiple Rounds - Application to AES Variants and Deoxys
    in IACR Transactions on Symmetric Cryptology ToSC 2019-1 / Fast Software Encryption - FSE 2019
  • D. Gerault, I. Boureanu, “Distance bounding under different assumptions: opinion
    in ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2019
  • D. Gerault, I. Boureanu, “Here and there at once, with my mobile phone!
    in International Conference on Security and Cryptography - Secrypt 2019
  • M. Khairallah, S. Bhasin, A. Chattopadhyay, “On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
    in IEEE International Workshop on Advances in Sensors and Interfaces - IWASI 2019
  • M. Khairallah, X. Hou, Z. Najm, J. Breier, S. Bhasin, T. Peyrin, “SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
    in ACM ASIA Conference on Computer and Communications Security - AsiaCCS 2019
  • G. Leurent, T. Peyrin, “From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
    in Advances in Cryptology - EUROCRYPT 2019

2018

  • P. Derbez, T. Iwata, L. Sun, S. Sun, Y. Todo, H. Wang, M. Wang, “Cryptanalysis of AES-PRF and Its Dual
    in IACR Transactions on Symmetric Cryptology ToSC 2018-2 / Fast Software Encryption - FSE 2019
  • M. Khairallah, Z. Najm, A. Chattopadhyay, T. Peyrin, “Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey” in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018
  • Z. Najm, M. J. S. Flórez, F. Regazzoni, “Session details: Security threats caused by novel technologies
    in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018
  • C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, “Boomerang Connectivity Table: a New Cryptanalysis Tool
    in Advances in Cryptology - EUROCRYPT 2018
  • A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, “Protecting Block Ciphers against Differential Fault Attacks without Re-keying
    in IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2018
  • Z. Najm, D. Jap, B. Jungk, S. Picek, S. Bhasin, “On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers
    in IEEE Asia Pacific Conference on Circuits and Systems - APCCAS 2018
  • P. Ravi, B. Jungk, D. Jap, Z. Najm, S. Bhasin, “Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC
    in IEEE International Conference on Digital Signal Processing - DSL 2018
  • A. Baksi, V. Pudi, S. Mandal, A. Chattopadhyay, “Lightweight ASIC Implementation of AEGIS-128
    in IEEE Computer Society Annual Symposium on VLSI - ISVLSI 2018
  • M. A. Elmohr, S. Kumar, M. Khairallah, A. Chattopadhyay, “A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption
    in IEEE Computer Society Annual Symposium on VLSI - ISVLSI 2018
  • M. Khairallah, R. Sadhukhan, R. Samanta, J. Breier, S. Bhasin, R. S. Chakraborty, A. Chattopadhyay, D. Mukhopadhyay, “DFARPA: Differential fault attack resistant physical design automation
    in Design, Automation and Test in Europe - DATE 2018
  • M. Khairallah, A. Chattopadhyay, B. Mandal, S. Maitra, “On Hardware Implementation of Tang-Maitra Boolean Functions
    in WAIFI 2018
  • D. Toh, J. Teo, K. Khoo, S. M. Sim, “Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count
    in AFRICACRYPT 2018

2017

  • J. Jean, T. Peyrin, S. M. Sim, “Optimizing Implementations of Lightweight Building Blocks
    in IACR Transactions on Symmetric Cryptology ToSC 2017-4 / Fast Software Encryption - FSE 2018
  • S. Bhasin, D. Jap, T. Peyrin, “Practical Evaluation of FSE 2016 Customized Encoding Countermeasure
    in IACR Transactions on Symmetric Cryptology ToSC 2017-3 / Fast Software Encryption - FSE 2018
  • C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, “Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
    in IACR Transactions on Symmetric Cryptology ToSC 2017-3 / Fast Software Encryption - FSE 2018
  • K. Khoo, E. Lee, T. Peyrin, S. M. Sim, “Human-readable Proof of the Related-Key Security of AES-128
    in IACR Transactions on Symmetric Cryptology ToSC 2017-2 / Fast Software Encryption - FSE 2018
  • S. Sarkar, S. Maitra, A. Baksi, “Observing Biases in the State: Case Studies with Trivium and Trivia-SC
    in Designs, Codes and Cryptography - 2017
  • M. Khairallah, A. Chattopadhyay, T. Peyrin, “Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    in INDOCRYPT 2017
  • J. Jean, A. Moradi, T. Peyrin, P. Sasdrich. “Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
    in Cryptographic Hardware and Embedded Systems - CHES 2017
  • S. Banik, S.K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim, Y. Todo. “GIFT: A Small Present
    in Cryptographic Hardware and Embedded Systems - CHES 2017
  • T. Iwata, K. Minematsu, T. Peyrin, Y. Seurin, “ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
    in Advances in Cryptology - CRYPTO 2017
  • R. Ankele, S. Banik, A. Chakraborti, E. List, F. Mendel, S. M. Sim, G. Wang, “Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
    in Applied Cryptography and Network Security Workshops - ACNS 2017
  • S. V. D. Kumar, S. Patranabis, J. Breier, D. Mukhopadhyay, S. Bhasin, A. Chattopadhyay, A. Baksi, “A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20
    in FDTC 2017

2016

  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    in IACR Transactions on Symmetric Cryptology ToSC 2016-2 / Fast Software Encryption - FSE 2017
  • J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim, “Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
    in IACR Transactions on Symmetric Cryptology ToSC 2016-1 / Fast Software Encryption - FSE 2017
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Extended meet-in-the-middle attacks on some Feistel constructions
    in Designs, Codes and Cryptography - 2016
  • J. Jean, I. Nikolić, Y. Sasaki, L. Wang, “Practical Forgeries and Distinguishers against PAES
    in IEICE Transactions - 2016
  • Y. Sasaki, L. Wang, “Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
    in IEICE Transactions - 2016
  • Y. Sasaki, L. Wang, “Message Extension Attack against Authenticated Encryptions: Application to PANDA
    in IEICE Transactions - 2016
  • F. Landelle, T. Peyrin, “Cryptanalysis of Full RIPEMD-128
    in Journal of Cryptology - 2016
  • T. Pandit, S.K. Pandey, R. Barua, “* Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version)*” in JISIS - 2016
  • I. Nikolić, Y. Sasaki, “A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
    in Advances in Cryptology - ASIACRYPT 2016
  • P-A. Fouque, P. Karpman, P. Kirchner, B. Minaud, “Efficient and Provable White-Box Primitives
    in Advances in Cryptology - ASIACRYPT 2016
  • C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, S. M. Sim, “The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
    in Advances in Cryptology - CRYPTO 2016
  • T. Peyrin, Y. Seurin, “Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
    in Advances in Cryptology - CRYPTO 2016
  • M. Stevens, P. Karpman, T. Peyrin, “Freestart collision on full SHA-1
    in Advances in Cryptology - EUROCRYPT 2016
  • M. Liu, S. M. Sim, “Lightweight MDS Generalized Circulant Matrices
    in Fast Software Encryption - FSE 2016
  • J. Jean, I. Nikolić, “Efficient Design Strategies Based on the AES Round Function
    in Fast Software Encryption - FSE 2016
  • S. Sarkar, S. M. Sim, “A deeper understanding of the XOR count distribution in the context of lightweight cryptography
    in AFRICACRYPT 2016
  • A. Chattopadhyay, A. Baksi. “Low-Quantum Cost Circuit Constructions for Adder and Symmetric Boolean Functions
    in ISCAS (Special Session) 2016
  • J. Breier, D. Jap, S. Bhasin. “The Other Side of the Coin: Analyzing Software Encoding Schemes against Fault Injection Attacks
    in HOST 2016
  • D. Jap, W. He, S. Bhasin. “Supervised and Unsupervised Machine Learning for Side-Channel based Trojan Detection
    in ASAP 2016
  • K.C. Gupta, S.K. Pandey, I.G. Ray, “Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes.
    in INDOCRYPT 2016

2015

  • T. Peyrin, “Collision Attack on Grindahl
    in Journal of Cryptology - 2015
  • I. Nikolić, L. Wang, S. Wu, “The parallel-cut meet-in-the-middle attack
    in Cryptography and Communications - September 2015
  • Y. Sasaki, L. Wang, “Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015
  • Y. Sasaki, G. Wang, L. Wang, “Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015
  • I. Nikolić, Y. Sasaki, “Refinements of the k-tree Algorithm for the Generalized Birthday Problem
    in Advances in Cryptology - ASIACRYPT 2015
  • B. Minaud, P. Derbez, P-A. Fouque, P. Karpman, “Key-Recovery Attacks on ASASA
    in Advances in Cryptology - ASIACRYPT 2015 - Invited to JoC
  • J. Jean, Y. Sasaki, L. Wang, “Analysis of the CAESAR Candidate Silver
    in Selected Areas in Cryptography 2015 - SAC 2015
  • P. Karpman, “From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour
    in Information Security Conference - ISC 2015
  • C. Blondeau, T. Peyrin, L. Wang, “Known-key Distinguisher on Full PRESENT
    in Advances in Cryptology - CRYPTO 2015
  • P. Karpman, T. Peyrin, M. Stevens, “Practical Free-Start Collision Attacks on 76-step SHA-1
    in Advances in Cryptology - CRYPTO 2015
  • . Espitau, P-A. Fouque, P. Karpman, “Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
    in Advances in Cryptology - CRYPTO 2015
  • J. Jean, I. Nikolić, “Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
    in Fast Software Encryption - FSE 2015
  • D. Khovratovich, I. Nikolić, J. Pieprzyk, P. Sokolowski, R. Steinfeld, “Rotational Cryptanalysis of ARX Revisited
    in Fast Software Encryption - FSE 2015
  • S. M. Sim, K. Khoo, F. Oggier, T. Peyrin, “Lightweight MDS Involution Matrices
    in Fast Software Encryption - FSE 2015
  • T. Peyrin, S. M. Sim, L. Wang, G. Zhang, “Cryptanalysis of JAMBU
    in Fast Software Encryption - FSE 2015
  • G. Leurent, L. Wang, “The Sum Can Be Weaker Than Each Part
    in Advances in Cryptology - EUROCRYPT 2015

2014

  • J. Jean, M. Naya-Plasencia, T. Peyrin, “Improved Cryptanalysis of AES-like Permutations
    in Journal of Cryptology - July 2013
  • S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, “The Resistance of PRESENT-80 Against Related-Key Differential Attacks
    in Cryptography and Communications - September 2014
  • D. Khovratovich, I. Nikolić, C. Rechberger, “Rotational Rebound Attacks on Reduced Skein
    in Journal of Cryptology - July 2014
  • Y. Sasaki, L. Wang, “Comprehensive Study of Integral Analysis on LBlock
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014
  • Y. Sasaki, L. Wang, “Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014
  • N. Anandakumar, T. Peyrin, A. Poschmann, “A Very Compact FPGA Implementation of LED and PHOTON
    in INDOCRYPT 2014
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Meet-in-the-Middle Attacks on Generic Feistel Constructions
    in Advances in Cryptology - ASIACRYPT 2014
  • S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, “Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
    in Advances in Cryptology - ASIACRYPT 2014
  • J. Jean, I. Nikolić, T. Peyrin, “Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
    in Advances in Cryptology - ASIACRYPT 2014
  • Y. Sasaki, L. Wang, “Message Extension Attack against Authenticated Encryptions: Application to PANDA
    in CANS 2014
  • A. Biryukov, I. Nikolić, “Colliding Keys for SC2000-256
    in Selected Areas in Cryptography - SAC 2014
  • D. Augot, P-A. Fouque, P. Karpman, “Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
    in Selected Areas in Cryptography - SAC 2014
  • J. Jean, I. Nikolić, Y. Sasaki, L. Wang, “Practical Cryptanalysis of PAES
    in Selected Areas in Cryptography - SAC 2014
  • J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang, “The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
    in Selected Areas in Cryptography - SAC 2014
  • Y. Sasaki, L. Wang, “Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
    in SCN 2014
  • K. Khoo, T. Peyrin, A. Poschmann, H. Yap, “FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
    in Cryptographic Hardware and Embedded Systems - CHES 2014
  • J. Guo, T. Peyrin, Y. Sasaki, L. Wang, “Updates on Generic Attacks against HMAC and NMAC
    in Advances in Cryptology - CRYPTO 2014
  • T. Peyrin, L. Wang, “Generic Universal Forgery Attack on Iterative Hash-based MACs
    in Advances in Cryptology - EUROCRYPT 2014
  • I. Dinur, J. Jean, “Cryptanalysis of FIDES
    in Fast Software Encryption - FSE 2014
  • T. Iwata, L. Wang, “Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
    in Fast Software Encryption - FSE 2014
  • J. Guo, Y. Sasaki, L. Wang, M. Wang, L. Wen, “Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
    in Fast Software Encryption - FSE 2014
  • T. Iwata, K. Minematsu, J. Guo, S. Morioka, “CLOC: Authenticated Encryption for Short Input
    in Fast Software Encryption - FSE 2014
  • J. Guo, P. Karpman, I. Nikolić, L. Wang, S. Wu, “Analysis of BLAKE2
    in RSA Conference Cryptographers’ Track - CT-RSA 2014
  • Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, K. Ohta , “An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl
    in RSA Conference Cryptographers’ Track - CT-RSA 2014

2013

  • P-A. Fouque, P. Karpman, “Security Amplification against Meet-in-the-Middle Attacks Using Whitening
    in IMA CC 2013
  • G. Leurent, T. Peyrin, L. Wang, “New Generic Attacks Against Hash-based MACs
    in Advances in Cryptology - ASIACRYPT 2013
  • F. Mendel, T. Peyrin, M. Schläffer, L. Wang, S. Wu, “Improved Cryptanalysis of Reduced RIPEMD-160
    in Advances in Cryptology - ASIACRYPT 2013
  • M. Iwamoto, T. Peyrin, Y. Sasaki, “Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
    in Advances in Cryptology - ASIACRYPT 2013
  • J. Guo, Y. Sasaki, L. Wang, S. Wu, “Cryptanalysis of HMAC/NMAC-Whirlpool
    in Advances in Cryptology - ASIACRYPT 2013
  • Y. Sasaki, L. Wang, “Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
    in Selected Areas of Cryptography - SAC 2013
  • J. Jean, M. Naya-Plasencia, T. Peyrin, “Multiple Limited-Birthday Distinguishers and Applications
    in Selected Areas of Cryptography - SAC 2013
  • R. Benadjila, J. Guo, V. Lomné, T. Peyrin, “Implementing Lightweight Block Ciphers on x86 Architectures
    in Selected Areas of Cryptography - SAC 2013
  • P.-A. Fouque, J. Jean, T. Peyrin, “Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
    in Advances in Cryptology - CRYPTO 2013
  • F. Landelle, T. Peyrin, “Cryptanalysis of Full RIPEMD-128
    in Advances in Cryptology - EUROCRYPT 2013 - Invited to JoC
  • F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann, S. Chakraborty, “Security Challenges in Automotive Hardware/Software Architecture Design
    in Design, Automation & Test in Europe - DATE 2013
  • J. Jean, I. Nikolic, T. Peyrin, L. Wang, S. Wu, “Security Analysis of PRINCE
    in Fast Software Encryption - FSE 2013
  • I. Nikolić, L. Wang, S. Wu, “Cryptanalysis of Round-Reduced LED
    in Fast Software Encryption - FSE 2013
  • A. Biryukov, I. Nikolić, “Complementing Feistel Ciphers
    in Fast Software Encryption - FSE 2013
  • Y. Sasaki, L. Wang, “Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs
    in International Conference on Information Security and Cryptology - ICISC 2013
  • Y. Naito, Y. Sasaki, L. Wang, K. Yasuda, “Generic State-Recovery and Forgery Attacks on ChopMD-MAC and NMAC/HMAC
    in International Workshop on Security - IWSEC 2013
  • Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang , M. Iwamoto, K. Ohta, K. Sakiyama, “Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL
    in International Conference on Security and Cryptography - SECRYPT 2013

2012

  • T. Peyrin, Y. Sasaki, L. Wang, “Generic Related-key Attacks for HMAC
    in Advances in Cryptology - ASIACRYPT 2012
  • Y. Sasaki, L. Wang, S. Wu, W.L. Wu, “Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
    in Advances in Cryptology - ASIACRYPT 2012
  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan, “SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
    in Progress in Cryptology - AFRICACRYPT 2012
  • L. Wei, T. Peyrin, P. Sokołowski, S. Ling, J. Pieprzyk, H. Wang, “On the (In)Security of IDEA in Various Hashing Modes
    in Fast Software Encryption - FSE 2012
  • J. Jean, M. Naya-Plasencia, T. Peyrin, “Improved Rebound Attack on the Finalist Grøstl
    in Fast Software Encryption - FSE 2012 - Best Paper Award
  • M. Naya-Plasencia, T. Peyrin, “Practical Cryptanalysis of ARMADILLO2
    in Fast Software Encryption - FSE 2012
  • A. Duc, J. Guo, T. Peyrin, L.Wei, “Unaligned Rebound Attack: Application to Keccak
    in Fast Software Encryption - FSE 2012
  • Y. Sasaki, L. Wang, “Comprehensive Study of Integral Analysis on 22-Round LBlock
    in International Conference on Information Security and Cryptology - ICISC 2012