Suivre
David GERAULT
Titre
Citée par
Citée par
Année
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology, 281-306, 2017
662017
Constraint programming models for chosen key differential cryptanalysis
D Gerault, M Minier, C Solnon
International Conference on Principles and Practice of Constraint …, 2016
532016
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
422017
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
332018
A deeper look at machine learning-based cryptanalysis
A Benamira, D Gerault, T Peyrin, QQ Tan
Annual International Conference on the Theory and Applications of …, 2021
272021
Related-key cryptanalysis of midori
D Gérault, P Lafourcade
International Conference on Cryptology in India, 287-304, 2016
262016
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
262016
Survey of distance bounding protocols and threats
A Brelurut, D Gerault, P Lafourcade
International symposium on foundations and practice of security, 29-49, 2015
242015
Computing AES related-key differential characteristics with constraint programming
D Gerault, P Lafourcade, M Minier, C Solnon
Artificial intelligence 278, 103183, 2020
192020
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
162017
Using constraint programming to solve a cryptanalytic problem
D Gerault, M Minier, C Solnon
IJCAI 2017-International Joint Conference on Artificial Intelligence (Sister …, 2017
92017
Security analysis of contactless communication protocols
D Gerault
Université Clermont Auvergne [2017-2020], 2018
62018
Combining solvers to solve a cryptanalytic problem
D Gerault, P Lafourcade, M Minier, C Solnon
CP 2017-Doctoral program 9, 104, 2017
42017
From relay attacks to distance-bounding protocols
G Avoine, I Boureanu, D Gérault, GP Hancke, P Lafourcade, C Onete
Security of ubiquitous computing systems, 113-130, 2021
32021
Fine-grained and application-ready distance-bounding security
I Boureanu, D Gerault, P Lafourcade
Cryptology ePrint Archive, 2018
32018
Breaking and Fixing the HB+ DB protocol
I Boureanu, D Gerault, P Lafourcade, C Onete
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
32017
Exploring Differential-Based Distinguishers and Forgeries for ASCON
D Gerault, T Peyrin, QQ Tan
Cryptology ePrint Archive, 2021
22021
Verifiable and private oblivious polynomial evaluation
H Gajera, M Giraud, D Gerault, ML Das, P Lafourcade
IFIP International Conference on Information Security Theory and Practice, 49-65, 2019
22019
Mechanised Models and Proofs for Distance-Bounding
I Boureanu, CC Drăgan, F Dupressoir, D Gérault, P Lafourcade
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
12021
Distance bounding under different assumptions: opinion
D Gerault, I Boureanu
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
12019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20