2019

Journals

  • P. Ravi, S. S. Gupta, A. Chattopadhyay, M. Khairallah, Z. Najm, S. Bhasin, “Security is an Architectural Design Constraint
    in The Journal of Microprocessors and Microsystems - 2019
  • H. Wang, T. Peyrin, “Boomerang Switch in Multiple Rounds - Application to AES Variants and Deoxys
    in IACR Transactions on Symmetric Cryptology ToSC 2019-1 / Fast Software Encryption - FSE 2019

International Conferences and Workshops

  • D. Gerault, I. Boureanu, “Distance bounding under different assumptions: opinion
    in ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2019
  • D. Gerault, I. Boureanu, “Here and there at once, with my mobile phone!
    in International Conference on Security and Cryptography - Secrypt 2019
  • M. Khairallah, S. Bhasin, A. Chattopadhyay, “On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
    in IEEE International Workshop on Advances in Sensors and Interfaces - IWASI 2019
  • M. Khairallah, X. Hou, Z. Najm, J. Breier, S. Bhasin, T. Peyrin, “SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
    in ACM ASIA Conference on Computer and Communications Security - AsiaCCS 2019
  • G. Leurent, T. Peyrin, “From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
    in Advances in Cryptology - EUROCRYPT 2019

2018

Journals

  • P. Derbez, T. Iwata, L. Sun, S. Sun, Y. Todo, H. Wang, M. Wang, “Cryptanalysis of AES-PRF and Its Dual
    in IACR Transactions on Symmetric Cryptology ToSC 2018-2 / Fast Software Encryption - FSE 2019

International Conferences and Workshops

  • M. Khairallah, Z. Najm, A. Chattopadhyay, T. Peyrin, “Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey
    in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018
  • Z. Najm, M. J. S. Flórez, F. Regazzoni, “Session details: Security threats caused by novel technologies
    in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018
  • C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, “Boomerang Connectivity Table: a New Cryptanalysis Tool
    in Advances in Cryptology - EUROCRYPT 2018
  • A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, “Protecting Block Ciphers against Differential Fault Attacks without Re-keying
    in IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2018
  • Z. Najm, D. Jap, B. Jungk, S. Picek, S. Bhasin, “On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers
    in IEEE Asia Pacific Conference on Circuits and Systems - APCCAS 2018
  • P. Ravi, B. Jungk, D. Jap, Z. Najm, S. Bhasin, “Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC
    in IEEE International Conference on Digital Signal Processing - DSL 2018
  • A. Baksi, V. Pudi, S. Mandal, A. Chattopadhyay, “Lightweight ASIC Implementation of AEGIS-128
    in IEEE Computer Society Annual Symposium on VLSI - ISVLSI 2018
  • M. A. Elmohr, S. Kumar, M. Khairallah, A. Chattopadhyay, “A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption
    in IEEE Computer Society Annual Symposium on VLSI - ISVLSI 2018
  • M. Khairallah, R. Sadhukhan, R. Samanta, J. Breier, S. Bhasin, R. S. Chakraborty, A. Chattopadhyay, D. Mukhopadhyay, “DFARPA: Differential fault attack resistant physical design automation
    in Design, Automation and Test in Europe - DATE 2018
  • M. Khairallah, A. Chattopadhyay, B. Mandal, S. Maitra, “On Hardware Implementation of Tang-Maitra Boolean Functions
    in WAIFI 2018
  • D. Toh, J. Teo, K. Khoo, S. M. Sim, “Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count
    in AFRICACRYPT 2018

2017

Journals

  • J. Jean, T. Peyrin, S. M. Sim, “Optimizing Implementations of Lightweight Building Blocks
    in IACR Transactions on Symmetric Cryptology ToSC 2017-4 / Fast Software Encryption - FSE 2018
  • S. Bhasin, D. Jap, T. Peyrin, “Practical Evaluation of FSE 2016 Customized Encoding Countermeasure
    in IACR Transactions on Symmetric Cryptology ToSC 2017-3 / Fast Software Encryption - FSE 2018
  • C. Cid, T. Huang, T. Peyrin, Y. Sasaki, L. Song, “Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
    in IACR Transactions on Symmetric Cryptology ToSC 2017-3 / Fast Software Encryption - FSE 2018
  • K. Khoo, E. Lee, T. Peyrin, S. M. Sim, “Human-readable Proof of the Related-Key Security of AES-128
    in IACR Transactions on Symmetric Cryptology ToSC 2017-2 / Fast Software Encryption - FSE 2018
  • S. Sarkar, S. Maitra, A. Baksi, “Observing Biases in the State: Case Studies with Trivium and Trivia-SC
    in Designs, Codes and Cryptography - 2017

International Conferences and Workshops

  • M. Khairallah, A. Chattopadhyay, T. Peyrin, “Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    in INDOCRYPT 2017
  • J. Jean, A. Moradi, T. Peyrin, P. Sasdrich. “Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
    in Cryptographic Hardware and Embedded Systems - CHES 2017
  • S. Banik, S.K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim, Y. Todo. “GIFT: A Small Present
    in Cryptographic Hardware and Embedded Systems - CHES 2017
  • T. Iwata, K. Minematsu, T. Peyrin, Y. Seurin, “ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
    in Advances in Cryptology - CRYPTO 2017
  • R. Ankele, S. Banik, A. Chakraborti, E. List, F. Mendel, S. M. Sim, G. Wang, “Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
    in ACNS 2017
  • S. V. D. Kumar, S. Patranabis, J. Breier, D. Mukhopadhyay, S. Bhasin, A. Chattopadhyay, A. Baksi, “A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20
    in FDTC 2017

2016

Journals

  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    in IACR Transactions on Symmetric Cryptology ToSC 2016-2 / Fast Software Encryption - FSE 2017
  • J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim, “Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
    in IACR Transactions on Symmetric Cryptology ToSC 2016-1 / Fast Software Encryption - FSE 2017
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Extended meet-in-the-middle attacks on some Feistel constructions
    in Designs, Codes and Cryptography - 2016
  • J. Jean, I. Nikolić, Y. Sasaki, L. Wang, “Practical Forgeries and Distinguishers against PAES
    in IEICE Transactions - 2016
  • Y. Sasaki, L. Wang, “Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
    in IEICE Transactions - 2016
  • Y. Sasaki, L. Wang, “Message Extension Attack against Authenticated Encryptions: Application to PANDA
    in IEICE Transactions - 2016
  • F. Landelle, T. Peyrin, “Cryptanalysis of Full RIPEMD-128
    in Journal of Cryptology - 2016
  • T. Pandit, S.K. Pandey, R. Barua, “* Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version)*”
    in JISIS - 2016

International Conferences and Workshops

  • I. Nikolić, Y. Sasaki, “A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
    in Advances in Cryptology - ASIACRYPT 2016
  • P-A. Fouque, P. Karpman, P. Kirchner, B. Minaud, “Efficient and Provable White-Box Primitives
    in Advances in Cryptology - ASIACRYPT 2016
  • C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, S. M. Sim, “The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
    in Advances in Cryptology - CRYPTO 2016
  • T. Peyrin, Y. Seurin, “Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
    in Advances in Cryptology - CRYPTO 2016
  • M. Stevens, P. Karpman, T. Peyrin, “Freestart collision on full SHA-1
    in Advances in Cryptology - EUROCRYPT 2016
  • M. Liu, S. M. Sim, “Lightweight MDS Generalized Circulant Matrices
    in Fast Software Encryption - FSE 2016
  • J. Jean, I. Nikolić, “Efficient Design Strategies Based on the AES Round Function
    in Fast Software Encryption - FSE 2016
  • S. Sarkar, S. M. Sim, “A deeper understanding of the XOR count distribution in the context of lightweight cryptography
    in AFRICACRYPT 2016
  • A. Chattopadhyay, A. Baksi. “Low-Quantum Cost Circuit Constructions for Adder and Symmetric Boolean Functions
    in ISCAS (Special Session) 2016
  • J. Breier, D. Jap, S. Bhasin. “The Other Side of the Coin: Analyzing Software Encoding Schemes against Fault Injection Attacks
    in HOST 2016
  • D. Jap, W. He, S. Bhasin. “Supervised and Unsupervised Machine Learning for Side-Channel based Trojan Detection
    in ASAP 2016
  • K.C. Gupta, S.K. Pandey, I.G. Ray, “Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes.
    in INDOCRYPT 2016

2015

Journals

  • T. Peyrin, “Collision Attack on Grindahl
    in Journal of Cryptology - 2015
  • I. Nikolić, L. Wang, S. Wu, “The parallel-cut meet-in-the-middle attack
    in Cryptography and Communications - September 2015
  • Y. Sasaki, L. Wang, “Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015
  • Y. Sasaki, G. Wang, L. Wang, “Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015

International Conferences and Workshops

  • I. Nikolić, Y. Sasaki, “Refinements of the k-tree Algorithm for the Generalized Birthday Problem
    in Advances in Cryptology - ASIACRYPT 2015
  • B. Minaud, P. Derbez, P-A. Fouque, P. Karpman, “Key-Recovery Attacks on ASASA
    in Advances in Cryptology - ASIACRYPT 2015 - (Invited to JoC)
  • J. Jean, Y. Sasaki, L. Wang, “Analysis of the CAESAR Candidate Silver
    in Selected Areas in Cryptography 2015 - SAC 2015
  • P. Karpman, “From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour
    in Information Security Conference - ISC 2015
  • C. Blondeau, T. Peyrin, L. Wang, “Known-key Distinguisher on Full PRESENT
    in Advances in Cryptology - CRYPTO 2015
  • P. Karpman, T. Peyrin, M. Stevens, “Practical Free-Start Collision Attacks on 76-step SHA-1
    in Advances in Cryptology - CRYPTO 2015
  • . Espitau, P-A. Fouque, P. Karpman, “Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
    in Advances in Cryptology - CRYPTO 2015
  • J. Jean, I. Nikolić, “Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
    in Fast Software Encryption - FSE 2015
  • D. Khovratovich, I. Nikolić, J. Pieprzyk, P. Sokolowski, R. Steinfeld, “Rotational Cryptanalysis of ARX Revisited
    in Fast Software Encryption - FSE 2015
  • S. M. Sim, K. Khoo, F. Oggier, T. Peyrin, “Lightweight MDS Involution Matrices
    in Fast Software Encryption - FSE 2015
  • T. Peyrin, S. M. Sim, L. Wang, G. Zhang, “Cryptanalysis of JAMBU
    in Fast Software Encryption - FSE 2015
  • G. Leurent, L. Wang, “The Sum Can Be Weaker Than Each Part
    in Advances in Cryptology - EUROCRYPT 2015

2014

Journals

  • J. Jean, M. Naya-Plasencia, T. Peyrin, “Improved Cryptanalysis of AES-like Permutations
    in Journal of Cryptology - July 2013
  • S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, “The Resistance of PRESENT-80 Against Related-Key Differential Attacks
    in Cryptography and Communications - September 2014
  • D. Khovratovich, I. Nikolić, C. Rechberger, “Rotational Rebound Attacks on Reduced Skein
    in Journal of Cryptology - July 2014
  • Y. Sasaki, L. Wang, “Comprehensive Study of Integral Analysis on LBlock
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014
  • Y. Sasaki, L. Wang, “Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160
    in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014

International Conferences and Workshops

  • N. Anandakumar, T. Peyrin, A. Poschmann, “A Very Compact FPGA Implementation of LED and PHOTON” - INDOCRYPT 2014
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, “Meet-in-the-Middle Attacks on Generic Feistel Constructions
    in Advances in Cryptology - ASIACRYPT 2014
  • S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, “Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
    in Advances in Cryptology - ASIACRYPT 2014
  • J. Jean, I. Nikolić, T. Peyrin, “Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
    in Advances in Cryptology - ASIACRYPT 2014
  • Y. Sasaki, L. Wang, “Message Extension Attack against Authenticated Encryptions: Application to PANDA” - CANS 2014
  • A. Biryukov, I. Nikolić, “Colliding Keys for SC2000-256
    in Selected Areas in Cryptography - SAC 2014
  • D. Augot, P-A. Fouque, P. Karpman, “Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
    in Selected Areas in Cryptography - SAC 2014
  • J. Jean, I. Nikolić, Y. Sasaki, L. Wang, “Practical Cryptanalysis of PAES
    in Selected Areas in Cryptography - SAC 2014
  • J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang, “The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
    in Selected Areas in Cryptography - SAC 2014
  • Y. Sasaki, L. Wang, “Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks” - SCN 2014
  • K. Khoo, T. Peyrin, A. Poschmann, H. Yap, “FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
    in Cryptographic Hardware and Embedded Systems - CHES 2014
  • J. Guo, T. Peyrin, Y. Sasaki, L. Wang, “Updates on Generic Attacks against HMAC and NMAC
    in Advances in Cryptology - CRYPTO 2014
  • T. Peyrin, L. Wang, “Generic Universal Forgery Attack on Iterative Hash-based MACs
    in Advances in Cryptology - EUROCRYPT 2014
  • I. Dinur, J. Jean, “Cryptanalysis of FIDES
    in Fast Software Encryption - FSE 2014
  • T. Iwata, L. Wang, “Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
    in Fast Software Encryption - FSE 2014
  • J. Guo, Y. Sasaki, L. Wang, M. Wang, L. Wen, “Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
    in Fast Software Encryption - FSE 2014
  • T. Iwata, K. Minematsu, J. Guo, S. Morioka, “CLOC: Authenticated Encryption for Short Input
    in Fast Software Encryption - FSE 2014
  • J. Guo, P. Karpman, I. Nikolić, L. Wang, S. Wu, “Analysis of BLAKE2
    in RSA Conference Cryptographers’ Track - CT-RSA 2014
  • Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, K. Ohta , “An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl
    in RSA Conference Cryptographers’ Track - CT-RSA 2014

2013

International Conferences and Workshops

  • P-A. Fouque, P. Karpman, “Security Amplification against Meet-in-the-Middle Attacks Using Whitening” - IMA CC 2013
  • G. Leurent, T. Peyrin, L. Wang, “New Generic Attacks Against Hash-based MACs
    in Advances in Cryptology - ASIACRYPT 2013
  • F. Mendel, T. Peyrin, M. Schläffer, L. Wang, S. Wu, “Improved Cryptanalysis of Reduced RIPEMD-160
    in Advances in Cryptology - ASIACRYPT 2013
  • M. Iwamoto, T. Peyrin, Y. Sasaki, “Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
    in Advances in Cryptology - ASIACRYPT 2013
  • J. Guo, Y. Sasaki, L. Wang, S. Wu, “Cryptanalysis of HMAC/NMAC-Whirlpool
    in Advances in Cryptology - ASIACRYPT 2013
  • Y. Sasaki, L. Wang, “Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
    in Selected Areas of Cryptography - SAC 2013
  • J. Jean, M. Naya-Plasencia, T. Peyrin, “Multiple Limited-Birthday Distinguishers and Applications
    in Selected Areas of Cryptography - SAC 2013
  • R. Benadjila, J. Guo, V. Lomné, T. Peyrin, “Implementing Lightweight Block Ciphers on x86 Architectures
    in Selected Areas of Cryptography - SAC 2013
  • P.-A. Fouque, J. Jean, T. Peyrin, “Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
    in Advances in Cryptology - CRYPTO 2013
  • F. Landelle, T. Peyrin, “Cryptanalysis of Full RIPEMD-128
    in Advances in Cryptology - EUROCRYPT 2013 - (Invited to JoC)
  • F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann, S. Chakraborty, “Security Challenges in Automotive Hardware/Software Architecture Design
    in Design, Automation & Test in Europe - DATE 2013
  • J. Jean, I. Nikolic, T. Peyrin, L. Wang, S. Wu, “Security Analysis of PRINCE
    in Fast Software Encryption - FSE 2013
  • I. Nikolić, L. Wang, S. Wu, “Cryptanalysis of Round-Reduced LED
    in Fast Software Encryption - FSE 2013
  • A. Biryukov, I. Nikolić, “Complementing Feistel Ciphers
    in Fast Software Encryption - FSE 2013
  • Y. Sasaki, L. Wang, “Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs
    in International Conference on Information Security and Cryptology - ICISC 2013
  • Y. Naito, Y. Sasaki, L. Wang, K. Yasuda, “Generic State-Recovery and Forgery Attacks on ChopMD-MAC and NMAC/HMAC
    in International Workshop on Security - IWSEC 2013
  • Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang , M. Iwamoto, K. Ohta, K. Sakiyama, “Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL
    in International Conference on Security and Cryptography - SECRYPT 2013

2012

International Conferences and Workshops

  • T. Peyrin, Y. Sasaki, L. Wang, “Generic Related-key Attacks for HMAC
    in Advances in Cryptology - ASIACRYPT 2012
  • Y. Sasaki, L. Wang, S. Wu, W.L. Wu, “Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
    in Advances in Cryptology - ASIACRYPT 2012
  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan, “SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
    in Progress in Cryptology - AFRICACRYPT 2012
  • L. Wei, T. Peyrin, P. Sokołowski, S. Ling, J. Pieprzyk, H. Wang, “On the (In)Security of IDEA in Various Hashing Modes
    in Fast Software Encryption - FSE 2012
  • J. Jean, M. Naya-Plasencia, T. Peyrin, “Improved Rebound Attack on the Finalist Grøstl
    in Fast Software Encryption - FSE 2012 - Best Paper Award
  • M. Naya-Plasencia, T. Peyrin, “Practical Cryptanalysis of ARMADILLO2
    in Fast Software Encryption - FSE 2012
  • A. Duc, J. Guo, T. Peyrin, L.Wei, “Unaligned Rebound Attack: Application to Keccak
    in Fast Software Encryption - FSE 2012
  • Y. Sasaki, L. Wang, “Comprehensive Study of Integral Analysis on 22-Round LBlock
    in International Conference on Information Security and Cryptology - ICISC 2012