Triathlon of lightweight block ciphers for the internet of things D Dinu, YL Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering 9, 283-302, 2019
201 2019 State of the art in lightweight symmetric cryptography A Biryukov, L Perrin
Cryptology ePrint Archive, 2017
171 2017 Design Strategies for ARX with Provable Bounds: Sparx and LAX D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
151 2016 FELICS-fair evaluation of lightweight cryptographic systems D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin
NIST Workshop on Lightweight Cryptography 128, 2015
100 2015 Feistel structures for MPC, and more MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ...
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
82 2019 Reverse-engineering the S-box of Streebog, Kuznyechik and STRIBOBr1 A Biryukov, L Perrin, A Udovenko
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
73 2016 Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE P Derbez, L Perrin
Journal of Cryptology 33, 1184-1215, 2020
54 2020 Saturnin: a suite of lightweight symmetric algorithms for post-quantum security A Canteaut, S Duval, G Leurent, M Naya-Plasencia, L Perrin, T Pornin, ...
53 2019 On reverse-engineering S-boxes with hidden design criteria or structure A Biryukov, L Perrin
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
50 2015 Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem L Perrin, A Udovenko, A Biryukov
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
47 2016 Differential analysis and meet-in-the-middle attack against round-reduced TWINE A Biryukov, P Derbez, L Perrin
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
47 2015 Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
45 2020 Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX) C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
42 2020 Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ...
NIST round 2, 2019
42 2019 Cryptanalysis of Feistel networks with secret round functions A Biryukov, G Leurent, L Perrin
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
42 2016 Lightweight AEAD and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ...
IACR Transactions on Symmetric Cryptology, 208-261, 2020
41 2020 On CCZ-equivalence, extended-affine equivalence, and function twisting A Canteaut, L Perrin
Finite Fields and Their Applications 56, 209-246, 2019
40 2019 A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size A Canteaut, S Duval, L Perrin
IEEE Transactions on Information Theory 63 (11), 7575-7591, 2017
37 2017 More differentially 6-uniform power functions C Blondeau, L Perrin
Designs, codes and cryptography 73, 487-505, 2014
35 2014 Multiset-algebraic cryptanalysis of reduced Kuznyechik, Khazad, and secret SPNs A Biryukov, D Khovratovich, LP Perrin
IACR Transactions on Symmetric Cryptology 2016 (2), 226-247, 2016
24 2016