Suivre
Gaëtan Leurent
Gaëtan Leurent
Adresse e-mail validée de inria.fr - Page d'accueil
Titre
Citée par
Citée par
Année
Breaking symmetric cryptosystems using quantum period finding
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
Annual international cryptology conference, 207-237, 2016
2452016
LS-designs: Bitslice encryption for efficient masked software implementations
V Grosso, G Leurent, FX Standaert, K Varıcı
International Workshop on fast software encryption, 18-37, 2014
2122014
On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN
K Bhargavan, G Leurent
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2042016
MD4 is not one-way
G Leurent
Fast Software Encryption, 412-428, 2008
1312008
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH
K Bhargavan, G Leurent
Network and Distributed System Security Symposium--NDSS 2016, 2016
1262016
An analysis of the XSL algorithm
C Cid, G Leurent
International Conference on the Theory and Application of Cryptology and …, 2005
1142005
Quantum differential and linear cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
IACR Transactions on Symmetric Cryptology 2016 (1), 71-94, 2016
1002016
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
PA Fouque, G Leurent, PQ Nguyen
Annual International Cryptology Conference, 13-30, 2007
912007
Narrow-bicliques: cryptanalysis of full IDEA
D Khovratovich, G Leurent, C Rechberger
Annual International Conference on the Theory and Applications of …, 2012
842012
How risky is the random-oracle model?
G Leurent, PQ Nguyen
Annual International Cryptology Conference, 445-464, 2009
702009
Construction of differential characteristics in ARX designs application to Skein
G Leurent
Annual Cryptology Conference, 241-258, 2013
582013
Construction of lightweight S-boxes using Feistel and MISTY structures
A Canteaut, S Duval, G Leurent
International conference on selected areas in cryptography, 373-393, 2015
57*2015
Message freedom in MD4 and MD5 collisions: Application to APOP
G Leurent
International Workshop on Fast Software Encryption, 309-328, 2007
572007
SCREAM & iSCREAM side-channel resistant authenticated encryption with masking
V Grosso, G Leurent, FX Standaert, K Varici, F Durvaux, L Gaspar, ...
Candidate for the CAESAR Competition. See also http://perso. uclouvain. be …, 2014
54*2014
Analysis of differential attacks in ARX constructions
G Leurent
International Conference on the Theory and Application of Cryptology and …, 2012
522012
From collisions to chosen-prefix collisions application to full SHA-1
G Leurent, T Peyrin
Annual International Conference on the Theory and Applications of …, 2019
482019
{SHA-1} is a Shambles: First {Chosen-Prefix} Collision on {SHA-1} and Application to the {PGP} Web of Trust
G Leurent, T Peyrin
29th USENIX Security Symposium (USENIX Security 20), 1839-1856, 2020
452020
New generic attacks against hash-based MACs
G Leurent, T Peyrin, L Wang
International Conference on the Theory and Application of Cryptology and …, 2013
442013
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020
432020
Improved differential-linear cryptanalysis of 7-round chaskey with partitioning
G Leurent
Annual International Conference on the Theory and Applications of …, 2016
43*2016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20