What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Patrick Derbez
Google Scholar
ORCID:
0000-0003-0478-8483
37
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Extending the Quasidifferential Framework: From Fixed-Key to Expected Differential Probability.
Christina Boura
Patrick Derbez
Baptiste Germon
2025
conf/eurocrypt
ChiLow and ChiChi: New Constructions for Code Encryption.
Yanis Belkheyar
Patrick Derbez
Shibam Ghosh
Gregor Leander
Silvia Mella
Léo Perrin
Shahram Rasoolzadeh
Lukas Stennes
Siwei Sun
Gilles Van Assche
Damian Vizár
2024
journals/tosc
Cryptanalysis of Full-Round BipBip.
Jinliang Wang
Christina Boura
Patrick Derbez
Kai Hu
Muzhou Li
Meiqin Wang
2024
journals/tosc
Key Committing Attacks against AES-based AEAD Schemes.
Patrick Derbez
Pierre-Alain Fouque
Takanori Isobe
Mostafizar Rahman
André Schrottenloher
2024
journals/tosc
Equivalence of Generalised Feistel Networks.
Patrick Derbez
Marie Euler
2024
conf/crypto
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
Hosein Hadipour
Patrick Derbez
Maria Eichlseder
2024
conf/acns
Alternative Key Schedules for the AES.
Christina Boura
Patrick Derbez
Margot Funk
2024
conf/eurocrypt
A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool.
Christina Boura
Nicolas David
Patrick Derbez
Rachelle Heim Boissier
María Naya-Plasencia
2023
journals/tosc
Related-Key Differential Analysis of the AES.
Christina Boura
Patrick Derbez
Margot Funk
2023
conf/crypto
Differential Meet-In-The-Middle Cryptanalysis.
Christina Boura
Nicolas David
Patrick Derbez
Gregor Leander
María Naya-Plasencia
2022
journals/tosc
Fast MILP Models for Division Property.
Patrick Derbez
Baptiste Lambin
2022
journals/tosc
Breaking HALFLOOP-24.
Marcus Dansarie
Patrick Derbez
Gregor Leander
Lukas Stennes
2022
conf/asiacrypt
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool.
Patrick Derbez
Marie Euler
Pierre-Alain Fouque
Phuong Hoa Nguyen
2021
conf/acns
Efficient Methods to Search for Best Differential Characteristics on SKINNY.
Stéphanie Delaune
Patrick Derbez
Paul Huynh
Marine Minier
Victor Mollimard
Charles Prud'homme
2021
conf/eurocrypt
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
Christof Beierle
Patrick Derbez
Gregor Leander
Gaëtan Leurent
Håvard Raddum
Yann Rotella
David Rupprecht
Lukas Stennes
2021
conf/sacrypt
A Simpler Model for Recovering Superpoly on Trivium.
Stéphanie Delaune
Patrick Derbez
Arthur Gontier
Charles Prud'homme
2020
journals/tosc
Fake Near Collisions Attacks.
Patrick Derbez
Pierre-Alain Fouque
Victor Mollimard
2020
journals/tosc
Increasing Precision of Division Property.
Patrick Derbez
Pierre-Alain Fouque
2020
journals/tosc
Catching the Fastest Boomerangs Application to SKINNY.
Stéphanie Delaune
Patrick Derbez
Mathieu Vavrille
2020
journals/joc
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
Patrick Derbez
Léo Perrin
2020
conf/crypto
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Patrick Derbez
Paul Huynh
Virginie Lallemand
María Naya-Plasencia
Léo Perrin
André Schrottenloher
2019
journals/tosc
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
Patrick Derbez
Pierre-Alain Fouque
Baptiste Lambin
Victor Mollimard
2019
conf/sacrypt
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition.
Patrick Derbez
Virginie Lallemand
Aleksei Udovenko
2018
journals/tches
On Recovering Affine Encodings in White-Box Implementations.
Patrick Derbez
Pierre-Alain Fouque
Baptiste Lambin
Brice Minaud
2018
journals/tosc
Cryptanalysis of AES-PRF and Its Dual.
Patrick Derbez
Tetsu Iwata
Ling Sun
Siwei Sun
Yosuke Todo
Haoyang Wang
Meiqin Wang
2018
journals/joc
Key-Recovery Attacks on ASASA.
Brice Minaud
Patrick Derbez
Pierre-Alain Fouque
Pierre Karpman
2018
conf/asiacrypt
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Danping Shi
Siwei Sun
Patrick Derbez
Yosuke Todo
Bing Sun
Lei Hu
2018
conf/sacrypt
Variants of the AES Key Schedule for Better Truncated Differential Bounds.
Patrick Derbez
Pierre-Alain Fouque
Jérémy Jean
Baptiste Lambin
2016
conf/fse
Note on Impossible Differential Attacks.
Patrick Derbez
2016
conf/crypto
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
Patrick Derbez
Pierre-Alain Fouque
2015
conf/fse
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
Patrick Derbez
Léo Perrin
2015
conf/fse
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE.
Alex Biryukov
Patrick Derbez
Léo Perrin
2015
conf/asiacrypt
Key-Recovery Attacks on ASASA.
Brice Minaud
Patrick Derbez
Pierre-Alain Fouque
Pierre Karpman
2013
conf/fse
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.
Patrick Derbez
Pierre-Alain Fouque
2013
conf/eurocrypt
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
Patrick Derbez
Pierre-Alain Fouque
Jérémy Jean
2011
conf/crypto
Automatic Search of Attacks on Round-Reduced AES and Applications.
Charles Bouillaguet
Patrick Derbez
Pierre-Alain Fouque
2011
conf/ches
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES.
Patrick Derbez
Pierre-Alain Fouque
Delphine Leresteux
Coauthors
Aleksei Udovenko
(1)
Alex Biryukov
(1)
André Schrottenloher
(2)
Arthur Gontier
(1)
Baptiste Germon
(1)
Baptiste Lambin
(4)
Bing Sun
(1)
Brice Minaud
(3)
Charles Bouillaguet
(1)
Charles Prud'homme
(2)
Christina Boura
(6)
Christof Beierle
(1)
Damian Vizár
(1)
Danping Shi
(1)
David Rupprecht
(1)
Delphine Leresteux
(1)
Gaëtan Leurent
(1)
Gilles Van Assche
(1)
Gregor Leander
(4)
Haoyang Wang
(1)
Håvard Raddum
(1)
Hosein Hadipour
(1)
Jérémy Jean
(2)
Jinliang Wang
(1)
Kai Hu
(1)
Lei Hu
(1)
Léo Perrin
(5)
Ling Sun
(1)
Lukas Stennes
(3)
Marcus Dansarie
(1)
Margot Funk
(2)
Maria Eichlseder
(1)
María Naya-Plasencia
(3)
Marie Euler
(2)
Marine Minier
(1)
Mathieu Vavrille
(1)
Meiqin Wang
(2)
Mostafizar Rahman
(1)
Muzhou Li
(1)
Nicolas David
(2)
Patrick Derbez
(37)
Paul Huynh
(2)
Phuong Hoa Nguyen
(1)
Pierre Karpman
(2)
Pierre-Alain Fouque
(14)
Rachelle Heim Boissier
(1)
Shahram Rasoolzadeh
(1)
Shibam Ghosh
(1)
Silvia Mella
(1)
Siwei Sun
(3)
Stéphanie Delaune
(3)
Takanori Isobe
(1)
Tetsu Iwata
(1)
Victor Mollimard
(3)
Virginie Lallemand
(2)
Yanis Belkheyar
(1)
Yann Rotella
(1)
Yosuke Todo
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to