Gaëtan Leurent
Gaëtan Leurent
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Breaking symmetric cryptosystems using quantum period finding
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN
K Bhargavan, G Leurent
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
LS-designs: Bitslice encryption for efficient masked software implementations
V Grosso, G Leurent, FX Standaert, K Varıcı
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH
K Bhargavan, G Leurent
Network and Distributed System Security Symposium--NDSS 2016, 2016
MD4 is not one-way
G Leurent
Fast Software Encryption, 412-428, 2008
An analysis of the XSL algorithm
C Cid, G Leurent
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
Quantum differential and linear cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
IACR Transactions on Symmetric Cryptology 2016 (1), 71-94, 2016
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
PA Fouque, G Leurent, P Nguyen
Advances in Cryptology-CRYPTO 2007, 13-30, 2007
Narrow-Bicliques: Cryptanalysis of Full IDEA.
D Khovratovich, G Leurent, C Rechberger
EUROCRYPT 7237, 392-410, 2012
How risky is the random-oracle model?
G Leurent, PQ Nguyen
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
Construction of lightweight S-boxes using Feistel and MISTY structures
A Canteaut, S Duval, G Leurent
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
SHA-1 is a shambles: First chosen-prefix collision on SHA-1 and application to the PGP web of trust
G Leurent, T Peyrin
Proceedings of the 29th USENIX Conference on Security Symposium, 1839-1856, 2020
Construction of differential characteristics in ARX designs application to Skein
G Leurent
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
Message freedom in MD4 and MD5 collisions: Application to APOP
G Leurent
Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007
SCREAM & iSCREAM side-channel resistant authenticated encryption with masking
V Grosso, G Leurent, FX Standaert, K Varici, F Durvaux, L Gaspar, ...
Submission to CAESAR, 2014
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020
From collisions to chosen-prefix collisions application to full SHA-1
G Leurent, T Peyrin
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
Analysis of differential attacks in ARX constructions
G Leurent
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
MDS matrices with lightweight circuits
S Duval, G Leurent
IACR Transactions on Symmetric Cryptology 2018 (2), 48-78, 2018
Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning
G Leurent
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20