Suivre
Thomas Peyrin
Thomas Peyrin
Adresse e-mail validée de ntu.edu.sg - Page d'accueil
Titre
Citée par
Citée par
Année
The LED Block Cipher
J Guo, T Peyrin, A Poschmann, M Robshaw
Cryptographic Hardware and Embedded Systems–CHES 2011, 2011
12302011
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
8392016
The PHOTON Family of Lightweight Hash Functions
J Guo, T Peyrin, A Poschmann
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
7632011
GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
6162017
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
J Jean, I Nikolić, T Peyrin
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
3112014
Super-Sbox cryptanalysis: improved attacks for AES-like permutations
H Gilbert, T Peyrin
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
2532010
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
2202018
Security challenges in automotive hardware/software architecture design
F Sagstetter, M Lukasiewycz, S Steinhorst, M Wolf, A Bouard, WR Harris, ...
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 458-463, 2013
1852013
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124, 2016
149*2016
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
145*2020
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
1402016
Hash functions and the (amplified) boomerang attack
A Joux, T Peyrin
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
1402007
Lightweight MDS involution matrices
SM Sim, K Khoo, F Oggier, T Peyrin
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
1312015
Optimizing implementations of lightweight building blocks
J Jean, T Peyrin, SM Sim, J Tourteaux
Cryptology ePrint Archive, 2017
1262017
A deeper look at machine learning-based cryptanalysis
A Benamira, D Gerault, T Peyrin, QQ Tan
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
1142021
{SHA-1} is a shambles: First {Chosen-Prefix} collision on {SHA-1} and application to the {PGP} web of trust
G Leurent, T Peyrin
29th USENIX Security Symposium (USENIX Security 20), 1839-1856, 2020
1062020
FOAM: searching for hardware-optimal SPN structures and components with a fair comparison
K Khoo, T Peyrin, AY Poschmann, H Yap
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
1052014
Sha-3 proposal: ECHO
R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ...
Submission to NIST, 2008
105*2008
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
PA Fouque, J Jean, T Peyrin
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1022013
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
F Mendel, T Peyrin, C Rechberger, M Schläffer
Selected Areas in Cryptography, 16-35, 2009
1022009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20