David GERAULT
Title
Cited by
Cited by
Year
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR Transactions on Symmetric Cryptology 2017 (1), 281--306, 2017
492017
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gerault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
382017
Constraint programming models for chosen key differential cryptanalysis
D Gerault, M Minier, C Solnon
International Conference on Principles and Practice of Constraint …, 2016
382016
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
262018
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
232016
Related-key cryptanalysis of Midori
D Gérault, P Lafourcade
International Conference on Cryptology in India, 287-304, 2016
212016
Survey of distance bounding protocols and threats
A Brelurut, D Gerault, P Lafourcade
International symposium on foundations and practice of security, 29-49, 2015
182015
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
142017
Processing and characterization of new passive and active oxysulfide glasses in the Ge–Ga–Sb–S–O system
L Petit, J Abel, T Anderson, J Choi, V Nazabal, V Moizan, M Couzi, ...
Journal of Solid State Chemistry 182 (10), 2646-2655, 2009
92009
Computing AES related-key differential characteristics with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Artificial Intelligence 278, 103183, 2020
82020
Using constraint programming to solve a cryptanalytic problem
D Gerault, M Minier, C Solnon
IJCAI 2017-International Joint Conference on Artificial Intelligence (Sister …, 2017
82017
Security analysis of contactless communication protocols
D Gerault
Université Clermont Auvergne, 2018
52018
A deeper look at machine learning-based cryptanalysis
A Benamira, D Gerault, T Peyrin, QQ Tan
Annual International Conference on the Theory and Applications of …, 2021
22021
From relay attacks to distance-bounding protocols
G Avoine, I Boureanu, D Gérault, GP Hancke, P Lafourcade, C Onete
Security of ubiquitous computing systems, 113-130, 2021
22021
Breaking and fixing the HB+ DB protocol
I Boureanu, D Gerault, P Lafourcade, C Onete
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
22017
Combining solvers to solve a cryptanalytic problem
D Gerault, P Lafourcade, M Minier, C Solnon
CP 2017-Doctoral program 9, 104, 2017
22017
Verifiable and private oblivious polynomial evaluation
H Gajera, M Giraud, D Gérault, ML Das, P Lafourcade
IFIP International Conference on Information Security Theory and Practice, 49-65, 2019
12019
Distance bounding under different assumptions: opinion
D Gerault, I Boureanu
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
12019
Implementation-Level Corruptions in Distance Bounding-Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass-.
I Boureanu, D Gerault, P Lafourcade
IACR Cryptol. ePrint Arch. 2018, 1243, 2018
12018
Boxdb: Realistic adversary model for distance bounding
I Boureanu, D Gerault, P Lafourcade
Cryptology ePrint Archive, Report 2018/1243, 2018. https://eprint. iacr. org …, 0
1
The system can't perform the operation now. Try again later.
Articles 1–20