Triathlon of lightweight block ciphers for the internet of things D Dinu, YL Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov Journal of Cryptographic Engineering 9 (3), 283-302, 2019 | 177 | 2019 |
State of the art in lightweight symmetric cryptography A Biryukov, L Perrin Cryptology ePrint Archive, 2017 | 145 | 2017 |
Design Strategies for ARX with Provable Bounds: Sparx and LAX D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov International Conference on the Theory and Application of Cryptology and …, 2016 | 131 | 2016 |
FELICS–fair evaluation of lightweight cryptographic systems D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin NIST Workshop on Lightweight Cryptography 128, 2015 | 79 | 2015 |
Feistel structures for MPC, and more MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ... European Symposium on Research in Computer Security, 151-171, 2019 | 60 | 2019 |
Reverse-engineering the S-box of Streebog, Kuznyechik and STRIBOBr1 A Biryukov, L Perrin, A Udovenko Annual international conference on the theory and applications of …, 2016 | 60 | 2016 |
Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem L Perrin, A Udovenko, A Biryukov Annual International Cryptology Conference, 93-122, 2016 | 43 | 2016 |
On reverse-engineering S-boxes with hidden design criteria or structure A Biryukov, L Perrin Annual Cryptology Conference, 116-140, 2015 | 43 | 2015 |
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE P Derbez, L Perrin International Workshop on Fast Software Encryption, 190-216, 2015 | 41 | 2015 |
Cryptanalysis of Feistel networks with secret round functions A Biryukov, G Leurent, L Perrin International Conference on Selected Areas in Cryptography, 102-121, 2015 | 40 | 2015 |
Differential analysis and meet-in-the-middle attack against round-reduced TWINE A Biryukov, P Derbez, L Perrin International Workshop on Fast Software Encryption, 3-27, 2015 | 40 | 2015 |
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security A Canteaut, S Duval, G Leurent, M Naya-Plasencia, L Perrin, T Pornin, ... | 37 | 2019 |
On CCZ-equivalence, extended-affine equivalence, and function twisting A Canteaut, L Perrin Finite Fields and Their Applications 56, 209-246, 2019 | 36 | 2019 |
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size A Canteaut, S Duval, L Perrin IEEE Transactions on Information Theory 63 (11), 7575-7591, 2017 | 32 | 2017 |
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... Annual International Cryptology Conference, 299-328, 2020 | 31 | 2020 |
More differentially 6-uniform power functions C Blondeau, L Perrin Designs, codes and cryptography 73 (2), 487-505, 2014 | 29 | 2014 |
Alzette: A 64-bit ARX-box C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ... Annual International Cryptology Conference, 419-448, 2020 | 24 | 2020 |
Multiset-algebraic cryptanalysis of reduced Kuznyechik, Khazad, and secret SPNs A Biryukov, D Khovratovich, LP Perrin IACR Transactions on Symmetric Cryptology 2016 (2), 226-247, 2016 | 22 | 2016 |
Lightweight cryptography lounge A Biryukov, L Perrin Accessed February 5, 2017, 2015 | 21* | 2015 |
Lightweight AEAD and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... IACR Transactions on Symmetric Cryptology, 208-261, 2020 | 19 | 2020 |