Articles avec mandats d'accès public - Thomas PeyrinEn savoir plus
Disponibles quelque part : 31
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
Exigences : German Research Foundation, National Research Foundation, Singapore
GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
Exigences : National Research Foundation, Singapore
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
Exigences : Chinese Academy of Sciences, National Natural Science Foundation of China
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124, 2016
Exigences : National Research Foundation, Singapore
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
Exigences : National Research Foundation, Singapore
Optimizing implementations of lightweight building blocks
J Jean, T Peyrin, SM Sim, J Tourteaux
Cryptology ePrint Archive, 2017
Exigences : National Research Foundation, Singapore
Joltik v1. 3
J Jean, I Nikolić, T Peyrin
CAESAR Round 2, 2015
Exigences : National Research Foundation, Singapore
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
T Iwata, K Minematsu, T Peyrin, Y Seurin
Annual international cryptology conference, 34-65, 2017
Exigences : National Research Foundation, Singapore
Skinny-aead and skinny-hash
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
IACR Transactions on Symmetric Cryptology, 88-131, 2020
Exigences : German Research Foundation
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives: Applications to AES, PRESENT and SKINNY
J Jean, A Moradi, T Peyrin, P Sasdrich
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
Exigences : National Research Foundation, Singapore
A security analysis of Deoxys and its internal tweakable block ciphers
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
IACR Transactions on Symmetric Cryptology, 73-107, 2017
Exigences : National Natural Science Foundation of China
Practical free-start collision attacks on 76-step SHA-1
P Karpman, T Peyrin, M Stevens
Annual Cryptology Conference, 623-642, 2015
Exigences : National Research Foundation, Singapore
Sundae-gift
S Banik, A Bogdanov, T Peyrin, Y Sasaki, SM Sim, E Tischhauser, Y Todo
Submission to Round 1, 157-161, 2019
Exigences : Fonds national suisse
The deoxys AEAD family
J Jean, I Nikolić, T Peyrin, Y Seurin
Journal of Cryptology 34 (3), 31, 2021
Exigences : National Research Foundation, Singapore
Inside the hypercube
JP Aumasson, E Brier, W Meier, M Naya-Plasencia, T Peyrin
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
Exigences : Fonds national suisse
Freestart collision for full SHA-1
M Stevens, P Karpman, T Peyrin
Cryptology ePrint Archive, 2015
Exigences : National Research Foundation, Singapore
Known-Key Distinguisher on Full PRESENT
C Blondeau, T Peyrin, L Wang
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
Exigences : National Natural Science Foundation of China, National Research Foundation …
The usage of counter revisited: Second-preimage attack on new russian standardized hash function
J Guo, J Jean, G Leurent, T Peyrin, L Wang
International Conference on Selected Areas in Cryptography, 195-211, 2014
Exigences : National Research Foundation, Singapore
Cryptanalysis of JAMBU
T Peyrin, SM Sim, L Wang, G Zhang
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
Exigences : National Research Foundation, Singapore
Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption
M Khairallah, A Chattopadhyay, T Peyrin
International Conference on Cryptology in India, 282-301, 2017
Exigences : National Research Foundation, Singapore
Les informations concernant la publication et le financement sont déterminées automatiquement par un programme informatique