Ga

Results: 22274



#Item
11Cryptography / Data Encryption Standard / Lucifer / ICE / Block cipher / Feistel cipher / MISTY1 / NC

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version? )?? Anne Canteaut, S´ebastien Duval, and Ga¨etan Leurent Inria, project-team SECRET, France {Anne.Canteaut, Sebastien.Duval, Gaetan.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
12Cryptography / Block ciphers / Differential cryptanalysis / Q / Data Encryption Standard / ICE / S-box / ARIA / VEST / NOEKEON / Advanced Encryption Standard / Substitutionpermutation network

LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations Vincent Grosso1 , Ga¨etan Leurent1,2 , Fran¸cois-Xavier Standaert1 , Kerem Varici1 1 ICTEAM/ELEN/Crypto Group, Universit´e catholique de L

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
13Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1

Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
14Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
15Cryptography / Quantum information science / Emerging technologies / Quantum computing / Quantum cryptography / Quantum algorithm / Block cipher / Quantum mechanics / Post-quantum cryptography / Quantum key distribution / Feistel cipher / Data Encryption Standard

Breaking Symmetric Cryptosystems using Quantum Period Finding Marc Kaplan1,2 , Ga¨etan Leurent3 Anthony Leverrier3 , and Mar´ıa Naya-Plasencia3 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
16Cryptography / Cryptographic hash functions / Error detection and correction / Hashing / Message authentication codes / HMAC / Hash function / SHA-2 / Preimage attack / SHA-1 / Streebog / SHA-3

Improved Generic Attacks Against Hash-based MACs and HAIFA? Itai Dinur1 and Ga¨etan Leurent2 1 ´

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
17Cryptography / Data Encryption Standard / Linear cryptanalysis / Differential cryptanalysis / Block cipher / Salsa20 / Cryptanalysis / Differential-linear attack / NC / Boomerang attack / Stream cipher / E0

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
18Mathematics / Algebra / Cryptography / Post-quantum cryptography / Polynomials / Lattice-based cryptography / Coding theory / SWIFFT / BCH code / Polynomial ring / Learning with errors / Binomial coefficient

SPRING: Fast Pseudorandom Functions from Rounded Ring Products Abhishek Banerjee1? , Hai Brenner2?? , Ga¨etan Leurent3 , Chris Peikert1? ? ? , and Alon Rosen2† 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
19Cryptography / Cryptographic protocols / Cryptographic hash functions / Secure communication / Transport Layer Security / Internet Standards / Cipher suite / Collision attack / MD5 / Man-in-the-middle attack / HMAC / OpenSSL

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
20Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
UPDATE