What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Peyrin
Google Scholar
ORCID:
0000-0002-2690-9197
94
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Corrigendum to Fast AES-Based Universal Hash Functions and MACs.
Augustin Bariant
Jules Baudrin
Gaëtan Leurent
Clara Pernot
Léo Perrin
Thomas Peyrin
2025
conf/ctrsa
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.
Emanuele Bellini
David Gérault
Juan Grados
Thomas Peyrin
2025
conf/crypto
Unlocking Mix-Basis Potential: Geometric Approach for Combined Attacks.
Kai Hu
Chi Zhang
Chengcheng Chang
Jiashu Zhang
Meiqin Wang
Thomas Peyrin
2025
journals/tosc
Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers.
Thomas Peyrin
Quan Quan Tan
Hongyi Zhang
Chunning Zhou
2024
journals/cic
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
Benoît Cogliati
Jérémy Jean
Thomas Peyrin
Yannick Seurin
2024
journals/tosc
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
Augustin Bariant
Jules Baudrin
Gaëtan Leurent
Clara Pernot
Léo Perrin
Thomas Peyrin
2023
journals/tches
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis.
Trevor Yap
Adrien Benamira
Shivam Bhasin
Thomas Peyrin
2023
journals/tosc
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP.
Emanuele Bellini
David Gérault
Juan Grados
Rusydi H. Makarim
Thomas Peyrin
2023
conf/ctrsa
Fully Automated Differential-Linear Attacks Against ARX Ciphers.
Emanuele Bellini
David Gérault
Juan Grados
Rusydi H. Makarim
Thomas Peyrin
2023
conf/asiacrypt
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
Kai Hu
Thomas Peyrin
Quan Quan Tan
Trevor Yap
2022
journals/tosc
Mind Your Path: On (Key) Dependencies in Differential Characteristics.
Thomas Peyrin
Quan Quan Tan
2022
journals/tosc
Exploring Integrity of AEADs with Faults: Definitions and Constructions.
Sayandeep Saha
Mustafa Khairallah
Thomas Peyrin
2022
conf/sacrypt
Finding All Impossible Differentials When Considering the DDT.
Kai Hu
Thomas Peyrin
Meiqin Wang
2021
journals/tches
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.
Alexandre Adomnicai
Thomas Peyrin
2021
journals/tosc
Exploring Differential-Based Distinguishers and Forgeries for ASCON.
David Gérault
Thomas Peyrin
Quan Quan Tan
2021
journals/joc
The Deoxys AEAD Family.
Jérémy Jean
Ivica Nikolic
Thomas Peyrin
Yannick Seurin
2021
conf/ctrsa
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Anupam Chattopadhyay
Mustafa Khairallah
Gaëtan Leurent
Zakaria Najm
Thomas Peyrin
Vesselin Velichkov
2021
conf/eurocrypt
A Deeper Look at Machine Learning-Based Cryptanalysis.
Adrien Benamira
David Gérault
Thomas Peyrin
Quan Quan Tan
2021
conf/asiacrypt
DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
Anubhab Baksi
Shivam Bhasin
Jakub Breier
Mustafa Khairallah
Thomas Peyrin
Sumanta Sarkar
Siang Meng Sim
2020
journals/tches
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M.
Alexandre Adomnicai
Zakaria Najm
Thomas Peyrin
2020
journals/tches
Improved Heuristics for Short Linear Programs.
Quan Quan Tan
Thomas Peyrin
2020
journals/tosc
SKINNY-AEAD and SKINNY-Hash.
Christof Beierle
Jérémy Jean
Stefan Kölbl
Gregor Leander
Amir Moradi
Thomas Peyrin
Yu Sasaki
Pascal Sasdrich
Siang Meng Sim
2020
journals/tosc
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms.
Tetsu Iwata
Mustafa Khairallah
Kazuhiko Minematsu
Thomas Peyrin
2020
journals/tosc
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
Dahmun Goudarzi
Jérémy Jean
Stefan Kölbl
Thomas Peyrin
Matthieu Rivain
Yu Sasaki
Siang Meng Sim
2020
conf/uss
SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
Gaëtan Leurent
Thomas Peyrin
2020
conf/crypto
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers.
Thomas Peyrin
Haoyang Wang
2019
journals/tosc
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.
Haoyang Wang
Thomas Peyrin
2019
conf/ccs
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks.
Mustafa Khairallah
Xiaolu Hou
Zakaria Najm
Jakub Breier
Shivam Bhasin
Thomas Peyrin
2019
conf/eurocrypt
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.
Gaëtan Leurent
Thomas Peyrin
2018
conf/host
Protecting block ciphers against differential fault attacks without re-keying.
Anubhab Baksi
Shivam Bhasin
Jakub Breier
Mustafa Khairallah
Thomas Peyrin
2018
conf/eurocrypt
Boomerang Connectivity Table: A New Cryptanalysis Tool.
Carlos Cid
Tao Huang
Thomas Peyrin
Yu Sasaki
Ling Song
2017
journals/tosc
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
Carlos Cid
Tao Huang
Thomas Peyrin
Yu Sasaki
Ling Song
2017
journals/tosc
Optimizing Implementations of Lightweight Building Blocks.
Jérémy Jean
Thomas Peyrin
Siang Meng Sim
Jade Tourteaux
2017
journals/tosc
Human-readable Proof of the Related-Key Security of AES-128.
Khoongming Khoo
Eugene Lee
Thomas Peyrin
Siang Meng Sim
2017
journals/tosc
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure.
Shivam Bhasin
Dirmanto Jap
Thomas Peyrin
2017
conf/crypto
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
Tetsu Iwata
Kazuhiko Minematsu
Thomas Peyrin
Yannick Seurin
2017
conf/ches
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
Jérémy Jean
Amir Moradi
Thomas Peyrin
Pascal Sasdrich
2017
conf/ches
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Subhadeep Banik
Sumit Kumar Pandey
Thomas Peyrin
Yu Sasaki
Siang Meng Sim
Yosuke Todo
2016
journals/joc
Cryptanalysis of Full RIPEMD-128.
Franck Landelle
Thomas Peyrin
2016
conf/crypto
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
Christof Beierle
Jérémy Jean
Stefan Kölbl
Gregor Leander
Amir Moradi
Thomas Peyrin
Yu Sasaki
Pascal Sasdrich
Siang Meng Sim
2016
conf/crypto
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers.
Thomas Peyrin
Yannick Seurin
2016
conf/eurocrypt
Freestart Collision for Full SHA-1.
Marc Stevens
Pierre Karpman
Thomas Peyrin
2015
journals/joc
Collision Attack on Grindahl.
Thomas Peyrin
2015
conf/fse
Lightweight MDS Involution Matrices.
Siang Meng Sim
Khoongming Khoo
Frédérique E. Oggier
Thomas Peyrin
2015
conf/fse
Cryptanalysis of JAMBU.
Thomas Peyrin
Siang Meng Sim
Lei Wang
Guoyan Zhang
2015
conf/crypto
Known-Key Distinguisher on Full PRESENT.
Céline Blondeau
Thomas Peyrin
Lei Wang
2015
conf/crypto
Practical Free-Start Collision Attacks on 76-step SHA-1.
Pierre Karpman
Thomas Peyrin
Marc Stevens
2014
journals/joc
Improved Cryptanalysis of AES-like Permutations.
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2014
conf/crypto
Updates on Generic Attacks against HMAC and NMAC.
Jian Guo
Thomas Peyrin
Yu Sasaki
Lei Wang
2014
conf/ches
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.
Khoongming Khoo
Thomas Peyrin
Axel York Poschmann
Huihui Yap
2014
conf/eurocrypt
Generic Universal Forgery Attack on Iterative Hash-Based MACs.
Thomas Peyrin
Lei Wang
2014
conf/asiacrypt
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework.
Jérémy Jean
Ivica Nikolic
Thomas Peyrin
2014
conf/sacrypt
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Jian Guo
Jérémy Jean
Gaëtan Leurent
Thomas Peyrin
Lei Wang
2013
conf/fse
Security Analysis of PRINCE.
Jérémy Jean
Ivica Nikolic
Thomas Peyrin
Lei Wang
Shuang Wu
2013
conf/crypto
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128.
Pierre-Alain Fouque
Jérémy Jean
Thomas Peyrin
2013
conf/eurocrypt
Cryptanalysis of Full RIPEMD-128.
Franck Landelle
Thomas Peyrin
2013
conf/asiacrypt
Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful.
Mitsugu Iwamoto
Thomas Peyrin
Yu Sasaki
2013
conf/asiacrypt
Improved Cryptanalysis of Reduced RIPEMD-160.
Florian Mendel
Thomas Peyrin
Martin Schläffer
Lei Wang
Shuang Wu
2013
conf/asiacrypt
New Generic Attacks against Hash-Based MACs.
Gaëtan Leurent
Thomas Peyrin
Lei Wang
2013
conf/sacrypt
Multiple Limited-Birthday Distinguishers and Applications.
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2013
conf/sacrypt
Implementing Lightweight Block Ciphers on x86 Architectures.
Ryad Benadjila
Jian Guo
Victor Lomné
Thomas Peyrin
2012
conf/fse
Improved Rebound Attack on the Finalist Grøstl.
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2012
conf/fse
On the (In)Security of IDEA in Various Hashing Modes.
Lei Wei
Thomas Peyrin
Przemyslaw Sokolowski
San Ling
Josef Pieprzyk
Huaxiong Wang
2012
conf/fse
Unaligned Rebound Attack: Application to Keccak.
Alexandre Duc
Jian Guo
Thomas Peyrin
Lei Wei
2012
conf/fse
Practical Cryptanalysis of ARMADILLO2.
María Naya-Plasencia
Thomas Peyrin
2012
conf/asiacrypt
Generic Related-Key Attacks for HMAC.
Thomas Peyrin
Yu Sasaki
Lei Wang
2012
conf/africacrypt
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks.
Jiali Choy
Huihui Yap
Khoongming Khoo
Jian Guo
Thomas Peyrin
Axel Poschmann
Chik How Tan
2011
conf/fse
Analysis of Reduced-SHAvite-3-256 v2.
Marine Minier
María Naya-Plasencia
Thomas Peyrin
2011
conf/crypto
The PHOTON Family of Lightweight Hash Functions.
Jian Guo
Thomas Peyrin
Axel Poschmann
2011
conf/ches
The LED Block Cipher.
Jian Guo
Thomas Peyrin
Axel Poschmann
Matthew J. B. Robshaw
2010
conf/fse
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.
Henri Gilbert
Thomas Peyrin
2010
conf/fse
Cryptanalysis of ESSENCE.
María Naya-Plasencia
Andrea Röck
Jean-Philippe Aumasson
Yann Laigle-Chapuy
Gaëtan Leurent
Willi Meier
Thomas Peyrin
2010
conf/acisp
Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
Jean-Philippe Aumasson
Emilia Käsper
Lars R. Knudsen
Krystian Matusiewicz
Rune Steinsmo Ødegård
Thomas Peyrin
Martin Schläffer
2010
conf/crypto
Improved Differential Attacks for ECHO and Grøstl.
Thomas Peyrin
2010
conf/ches
Side-Channel Analysis of Six SHA-3 Candidates.
Olivier Benoît
Thomas Peyrin
2010
conf/asiacrypt
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT.
Eric Brier
Thomas Peyrin
2010
conf/africacrypt
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Praveen Gauravaram
Gaëtan Leurent
Florian Mendel
María Naya-Plasencia
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2009
conf/fse
Cryptanalysis of RadioGatún.
Thomas Fuhr
Thomas Peyrin
2009
conf/acisp
Inside the Hypercube.
Jean-Philippe Aumasson
Eric Brier
Willi Meier
María Naya-Plasencia
Thomas Peyrin
2009
conf/acns
Cryptanalysis of CubeHash.
Eric Brier
Thomas Peyrin
2009
conf/asiacrypt
Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
Eric Brier
Shahram Khazaei
Willi Meier
Thomas Peyrin
2009
conf/sacrypt
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Florian Mendel
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2008
conf/fse
Collisions on SHA-0 in One Hour.
Stéphane Manuel
Thomas Peyrin
2008
conf/provsec
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Emmanuel Bresson
Benoît Chevallier-Mames
Christophe Clavier
Aline Gouget
Pascal Paillier
Thomas Peyrin
2008
conf/asiacrypt
Slide Attacks on a Class of Hash Functions.
Michael Gorski
Stefan Lucks
Thomas Peyrin
2007
conf/fse
Cryptanalysis of FORK-256.
Krystian Matusiewicz
Thomas Peyrin
Olivier Billet
Scott Contini
Josef Pieprzyk
2007
conf/fse
Security Analysis of Constructions Combining FIL Random Oracles.
Yannick Seurin
Thomas Peyrin
2007
conf/acisp
On Building Hash Functions from Multivariate Quadratic Equations.
Olivier Billet
Matthew J. B. Robshaw
Thomas Peyrin
2007
conf/crypto
Hash Functions and the (Amplified) Boomerang Attack.
Antoine Joux
Thomas Peyrin
2007
conf/asiacrypt
Cryptanalysis of Grindahl.
Thomas Peyrin
2006
conf/icisc
Cryptanalysis of T-Function-Based Hash Functions.
Frédéric Muller
Thomas Peyrin
2006
conf/asiacrypt
Combining Compression Functions and Block Cipher-Based Hash Functions.
Thomas Peyrin
Henri Gilbert
Frédéric Muller
Matthew J. B. Robshaw
2005
conf/sec
The Pairing Problem with User Interaction.
Thomas Peyrin
Serge Vaudenay
2005
conf/asiacrypt
Linear Cryptanalysis of the TSC Family of Stream Ciphers.
Frédéric Muller
Thomas Peyrin
Coauthors
Adrien Benamira
(2)
Alexandre Adomnicai
(2)
Alexandre Duc
(1)
Aline Gouget
(1)
Amir Moradi
(3)
Andrea Röck
(1)
Antoine Joux
(1)
Anubhab Baksi
(2)
Anupam Chattopadhyay
(1)
Augustin Bariant
(2)
Axel Poschmann
(3)
Axel York Poschmann
(1)
Benoît Chevallier-Mames
(1)
Benoît Cogliati
(1)
Carlos Cid
(2)
Céline Blondeau
(1)
Chengcheng Chang
(1)
Chi Zhang
(1)
Chik How Tan
(1)
Christian Rechberger
(2)
Christof Beierle
(2)
Christophe Clavier
(1)
Chunning Zhou
(1)
Clara Pernot
(2)
Dahmun Goudarzi
(1)
David Gérault
(5)
Dirmanto Jap
(1)
Emanuele Bellini
(3)
Emilia Käsper
(1)
Emmanuel Bresson
(1)
Eric Brier
(4)
Eugene Lee
(1)
Florian Mendel
(3)
Franck Landelle
(2)
Frédéric Muller
(3)
Frédérique E. Oggier
(1)
Gaëtan Leurent
(9)
Gregor Leander
(2)
Guoyan Zhang
(1)
Haoyang Wang
(2)
Henri Gilbert
(2)
Hongyi Zhang
(1)
Huaxiong Wang
(1)
Huihui Yap
(2)
Ivica Nikolic
(3)
Jade Tourteaux
(1)
Jakub Breier
(3)
Jean-Philippe Aumasson
(3)
Jérémy Jean
(14)
Jiali Choy
(1)
Jian Guo
(7)
Jiashu Zhang
(1)
Josef Pieprzyk
(2)
Juan Grados
(3)
Jules Baudrin
(2)
Kai Hu
(3)
Kazuhiko Minematsu
(2)
Khoongming Khoo
(4)
Krystian Matusiewicz
(2)
Lars R. Knudsen
(1)
Lei Wang
(9)
Lei Wei
(2)
Léo Perrin
(2)
Ling Song
(2)
Marc Stevens
(2)
María Naya-Plasencia
(8)
Marine Minier
(1)
Martin Schläffer
(4)
Matthew J. B. Robshaw
(3)
Matthieu Rivain
(1)
Meiqin Wang
(2)
Michael Gorski
(1)
Mitsugu Iwamoto
(1)
Mustafa Khairallah
(6)
Olivier Benoît
(1)
Olivier Billet
(2)
Pascal Paillier
(1)
Pascal Sasdrich
(3)
Pierre Karpman
(2)
Pierre-Alain Fouque
(1)
Praveen Gauravaram
(1)
Przemyslaw Sokolowski
(1)
Quan Quan Tan
(6)
Rune Steinsmo Ødegård
(1)
Rusydi H. Makarim
(2)
Ryad Benadjila
(1)
San Ling
(1)
Sayandeep Saha
(1)
Scott Contini
(1)
Serge Vaudenay
(1)
Shahram Khazaei
(1)
Shivam Bhasin
(5)
Shuang Wu
(2)
Siang Meng Sim
(9)
Stefan Kölbl
(3)
Stefan Lucks
(1)
Stéphane Manuel
(1)
Subhadeep Banik
(1)
Sumanta Sarkar
(1)
Sumit Kumar Pandey
(1)
Tao Huang
(2)
Tetsu Iwata
(2)
Thomas Fuhr
(1)
Thomas Peyrin
(94)
Trevor Yap
(2)
Vesselin Velichkov
(1)
Victor Lomné
(1)
Willi Meier
(3)
Xiaolu Hou
(1)
Yann Laigle-Chapuy
(1)
Yannick Seurin
(5)
Yosuke Todo
(1)
Yu Sasaki
(9)
Zakaria Najm
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to