Etan

Results: 183



#Item
1Cryptography / Message authentication codes / Error detection and correction / Cryptographic hash functions / Hashing / HMAC / Hash function / MD5 / GOST / SHA-1 / Checksum / UMAC

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
2Cryptography / Cryptographic hash functions / NIST hash function competition / Flynn's taxonomy / Parallel computing / SIMD / SHA-3 / Hash function / Block cipher / MerkleDamgrd construction / One-way compression function

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
3Cryptography / Block cipher modes of operation / Message authentication codes / Galois/Counter Mode / Cipher / Cryptographic hash functions / Block cipher / Stream cipher

Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
4Cryptography / Cryptographic hash functions / SHA-2 / Preimage attack / SHA-1 / MD5 / HMAC / Collision attack / Hash function / Collision resistance / Birthday attack / RIPEMD

The Sum Can Be Weaker Than Each Part? Ga¨etan Leurent1 and Lei Wang2 1 2

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
5Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Block cipher / CBC-MAC / Keystream / One-key MAC / Block size / Galois/Counter Mode / XXTEA

The Missing Difference Problem, and its Applications to Counter Mode Encryption? Ga¨etan Leurent and Ferdinand Sibleyras Inria, France {gaetan.leurent,ferdinand.sibleyras}@inria.fr

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
6Cryptography / Applied mathematics / Differential cryptanalysis / Data Encryption Standard / Block cipher / Truncated differential cryptanalysis / ICE / Cryptanalysis / Statistical hypothesis testing / Rebound attack / Differential-linear attack

Differential Forgery Attack against LAC Ga¨etan Leurent Inria, France Abstract. LAC is one of the candidates to the CAESAR competition.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
7Mathematics / Multiplication / Multiplication algorithm / Advanced Encryption Standard / Polynomial / Abstract algebra / Polynomials / Error detection and correction / Finite fields

Hardware Implementation and Side-Channel Analysis of Lapin Lubos Gaspar1 , Ga¨etan Leurent1,2 , and Fran¸cois-Xavier Standaert1 1 ICTEAM/ELEN/Crypto Group, Universit´e catholique de Louvain, Belgium.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
8Cryptography / Data Encryption Standard / Lucifer / ICE / Block cipher / Feistel cipher / MISTY1 / NC

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version? )?? Anne Canteaut, S´ebastien Duval, and Ga¨etan Leurent Inria, project-team SECRET, France {Anne.Canteaut, Sebastien.Duval, Gaetan.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
9Cryptography / Block ciphers / Differential cryptanalysis / Q / Data Encryption Standard / ICE / S-box / ARIA / VEST / NOEKEON / Advanced Encryption Standard / Substitutionpermutation network

LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations Vincent Grosso1 , Ga¨etan Leurent1,2 , Fran¸cois-Xavier Standaert1 , Kerem Varici1 1 ICTEAM/ELEN/Crypto Group, Universit´e catholique de L

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
10Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1

Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
UPDATE