Folgen
Thomas Peyrin
Thomas Peyrin
Bestätigte E-Mail-Adresse bei ntu.edu.sg - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The LED Block Cipher
J Guo, T Peyrin, A Poschmann, M Robshaw
Cryptographic Hardware and Embedded Systems–CHES 2011, 2011
10302011
The PHOTON Family of Lightweight Hash Functions
J Guo, T Peyrin, A Poschmann
Annual cryptology conference, 222-239, 2011
6102011
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Annual International Cryptology Conference, 123-153, 2016
5312016
GIFT: A Small Present
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
International conference on cryptographic hardware and embedded systems, 321-345, 2017
3662017
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
J Jean, I Nikolić, T Peyrin
International Conference on the Theory and Application of Cryptology and …, 2014
2242014
Super-Sbox cryptanalysis: Improved attacks for AES-like permutations
H Gilbert, T Peyrin
International Workshop on Fast Software Encryption, 365-383, 2010
2222010
Security challenges in automotive hardware/software architecture design
F Sagstetter, M Lukasiewycz, S Steinhorst, M Wolf, A Bouard, WR Harris, ...
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 458-463, 2013
1472013
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124, 2016
125*2016
Hash functions and the (amplified) boomerang attack
A Joux, T Peyrin
Annual International Cryptology Conference, 244-263, 2007
1202007
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Annual International Conference on the Theory and Applications of …, 2018
1152018
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
1072016
Lightweight MDS involution matrices
SM Sim, K Khoo, F Oggier, T Peyrin
International Workshop on Fast Software Encryption, 471-493, 2015
1022015
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
F Mendel, T Peyrin, C Rechberger, M Schläffer
Selected Areas in Cryptography, 16-35, 2009
982009
Sha-3 proposal: ECHO
R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ...
Submission to NIST, 2008
98*2008
Freestart collision for full SHA-1
M Stevens, P Karpman, T Peyrin
Annual International Conference on the Theory and Applications of …, 2016
952016
Improved differential attacks for ECHO and Grøstl
T Peyrin
Annual Cryptology Conference, 370-392, 2010
872010
FOAM: searching for hardware-optimal SPN structures and components with a fair comparison
K Khoo, T Peyrin, AY Poschmann, H Yap
International Workshop on Cryptographic Hardware and Embedded Systems, 433-450, 2014
852014
Optimizing implementations of lightweight building blocks
J Jean, T Peyrin, SM Sim, J Tourteaux
Cryptology ePrint Archive, 2017
812017
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
PA Fouque, J Jean, T Peyrin
Annual Cryptology Conference, 183-203, 2013
792013
Unaligned rebound attack: application to Keccak
A Duc, J Guo, T Peyrin, L Wei
International Workshop on Fast Software Encryption, 402-421, 2012
692012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20