Etan

Results: 183



#Item
11Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group   Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
12Breaking Symmetric Cryptosystems using Quantum Period Finding Marc Kaplan1,2 , Ga¨etan Leurent3 Anthony Leverrier3 , and Mar´ıa Naya-Plasencia3 1

Breaking Symmetric Cryptosystems using Quantum Period Finding Marc Kaplan1,2 , Ga¨etan Leurent3 Anthony Leverrier3 , and Mar´ıa Naya-Plasencia3 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
13Improved Generic Attacks Against Hash-based MACs and HAIFA? Itai Dinur1 and Ga¨etan Leurent2 1  ´

Improved Generic Attacks Against Hash-based MACs and HAIFA? Itai Dinur1 and Ga¨etan Leurent2 1 ´

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
14Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France  Abstract. In this work we study the security of Chaskey, a recent

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
15SPRING: Fast Pseudorandom Functions from Rounded Ring Products Abhishek Banerjee1? , Hai Brenner2?? , Ga¨etan Leurent3 , Chris Peikert1? ? ? , and Alon Rosen2† 1

SPRING: Fast Pseudorandom Functions from Rounded Ring Products Abhishek Banerjee1? , Hai Brenner2?? , Ga¨etan Leurent3 , Chris Peikert1? ? ? , and Alon Rosen2† 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
16Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
17The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
18FPGA implementations of SPRING And their Countermeasures against Side-Channel Attacks Hai Brenner1 , Lubos Gaspar2 , Ga¨etan Leurent3 , Alon Rosen1 , Fran¸cois-Xavier Standaert2 1

FPGA implementations of SPRING And their Countermeasures against Side-Channel Attacks Hai Brenner1 , Lubos Gaspar2 , Ga¨etan Leurent3 , Alon Rosen1 , Fran¸cois-Xavier Standaert2 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
19

PDF Document

Add to Reading List

Source URL: www.etan.org

- Date: 2013-01-27 14:42:37
    20

    PDF Document

    Add to Reading List

    Source URL: www.etan.org

    - Date: 2013-01-27 14:43:24