What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gaëtan Leurent
Google Scholar
ORCID:
0000-0001-5903-9055
74
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Corrigendum to Fast AES-Based Universal Hash Functions and MACs.
Augustin Bariant
Jules Baudrin
Gaëtan Leurent
Clara Pernot
Léo Perrin
Thomas Peyrin
2025
journals/joc
New Representations of the AES Key Schedule.
Gaëtan Leurent
Clara Pernot
2025
conf/eurocrypt
Cryptanalysis of Full SCARF.
Antonio Flórez-Gutiérrez
Eran Lambooij
Gaëtan Leurent
Håvard Raddum
Tyge Tiessen
Michiel Verbauwhede
2025
conf/crypto
Transistor: a TFHE-Friendly Stream Cipher.
Jules Baudrin
Sonia Belaïd
Nicolas Bon
Christina Boura
Anne Canteaut
Gaëtan Leurent
Pascal Paillier
Léo Perrin
Matthieu Rivain
Yann Rotella
Samuel Tap
2024
journals/tosc
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation.
Gaëtan Leurent
Clara Pernot
2024
journals/tosc
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
Augustin Bariant
Jules Baudrin
Gaëtan Leurent
Clara Pernot
Léo Perrin
Thomas Peyrin
2024
conf/crypto
Improving Generic Attacks Using Exceptional Functions.
Xavier Bonnetain
Rachelle Heim Boissier
Gaëtan Leurent
André Schrottenloher
2024
conf/crypto
Cryptanalysis of Algebraic Verifiable Delay Functions.
Alex Biryukov
Ben Fisch
Gottfried Herold
Dmitry Khovratovich
Gaëtan Leurent
María Naya-Plasencia
Benjamin Wesolowski
2024
conf/eurocrypt
Partial Sums Meet FFT: Improved Attack on 6-Round AES.
Orr Dunkelman
Shibam Ghosh
Nathan Keller
Gaëtan Leurent
Avichai Marmor
Victor Mollimard
2023
conf/eurocrypt
Truncated Boomerang Attacks and Application to AES-Based Ciphers.
Augustin Bariant
Gaëtan Leurent
2022
journals/tosc
Algebraic Attacks against Some Arithmetization-Oriented Primitives.
Augustin Bariant
Clémence Bouvier
Gaëtan Leurent
Léo Perrin
2021
journals/joc
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
Antonio Flórez-Gutiérrez
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
André Schrottenloher
Ferdinand Sibleyras
2021
conf/ctrsa
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Anupam Chattopadhyay
Mustafa Khairallah
Gaëtan Leurent
Zakaria Najm
Thomas Peyrin
Vesselin Velichkov
2021
conf/eurocrypt
New Representations of the AES Key Schedule.
Gaëtan Leurent
Clara Pernot
2021
conf/eurocrypt
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
Christof Beierle
Patrick Derbez
Gregor Leander
Gaëtan Leurent
Håvard Raddum
Yann Rotella
David Rupprecht
Lukas Stennes
2021
conf/asiacrypt
QCB: Efficient Quantum-Secure Authenticated Encryption.
Ritam Bhaumik
Xavier Bonnetain
André Chailloux
Gaëtan Leurent
María Naya-Plasencia
André Schrottenloher
Yannick Seurin
2021
conf/asiacrypt
Quantum Linearization Attacks.
Xavier Bonnetain
Gaëtan Leurent
María Naya-Plasencia
André Schrottenloher
2021
conf/asiacrypt
Clustering Effect in Simon and Simeck.
Gaëtan Leurent
Clara Pernot
André Schrottenloher
2020
journals/tosc
Preface to Volume 2020, Issue 1.
Gaëtan Leurent
Yu Sasaki
2020
journals/tosc
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
Itai Dinur
Gaëtan Leurent
2020
journals/tosc
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
Anne Canteaut
Sébastien Duval
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Thomas Pornin
André Schrottenloher
2020
journals/tosc
Cryptanalysis of Forkciphers.
Augustin Bariant
Nicolas David
Gaëtan Leurent
2020
journals/tosc
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
Davide Bellizia
Francesco Berti
Olivier Bronchain
Gaëtan Cassiers
Sébastien Duval
Chun Guo
Gregor Leander
Gaëtan Leurent
Itamar Levi
Charles Momin
Olivier Pereira
Thomas Peters
François-Xavier Standaert
Balazs Udvarhelyi
Friedrich Wiemer
2020
journals/joc
Generic Attacks on Hash Combiners.
Zhenzhen Bao
Itai Dinur
Jian Guo
Gaëtan Leurent
Lei Wang
2020
conf/uss
SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
Gaëtan Leurent
Thomas Peyrin
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2020
conf/ctrsa
Universal Forgery Attack Against GCM-RUP.
Yanbin Li
Gaëtan Leurent
Meiqin Wang
Wei Wang
Guoyan Zhang
Yu Liu
2020
conf/asiacrypt
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions.
Antonio Flórez-Gutiérrez
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
André Schrottenloher
Ferdinand Sibleyras
2019
conf/crypto
Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.
Gaëtan Leurent
Ferdinand Sibleyras
2019
conf/eurocrypt
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.
Gaëtan Leurent
Thomas Peyrin
2018
journals/tosc
MDS Matrices with Lightweight Circuits.
Sébastien Duval
Gaëtan Leurent
2018
conf/crypto
Generic Attacks Against Beyond-Birthday-Bound MACs.
Gaëtan Leurent
Mridul Nandi
Ferdinand Sibleyras
2018
conf/eurocrypt
The Missing Difference Problem, and Its Applications to Counter Mode Encryption.
Gaëtan Leurent
Ferdinand Sibleyras
2018
conf/asiacrypt
Cryptanalysis of MORUS.
Tomer Ashur
Maria Eichlseder
Martin M. Lauridsen
Gaëtan Leurent
Brice Minaud
Yann Rotella
Yu Sasaki
Benoît Viguier
2016
journals/tosc
Quantum Differential and Linear Cryptanalysis.
Marc Kaplan
Gaëtan Leurent
Anthony Leverrier
María Naya-Plasencia
2016
conf/fse
Key Recovery Attack Against 2.5-Round \pi -Cipher.
Christina Boura
Avik Chakraborti
Gaëtan Leurent
Goutam Paul
Dhiman Saha
Hadi Soleimany
Valentin Suder
2016
conf/ccs
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN.
Karthikeyan Bhargavan
Gaëtan Leurent
2016
conf/crypto
Breaking Symmetric Cryptosystems Using Quantum Period Finding.
Marc Kaplan
Gaëtan Leurent
Anthony Leverrier
María Naya-Plasencia
2016
conf/ndss
Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH.
Karthikeyan Bhargavan
Gaëtan Leurent
2016
conf/eurocrypt
Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning.
Gaëtan Leurent
2015
conf/eurocrypt
The Sum Can Be Weaker Than Each Part.
Gaëtan Leurent
Lei Wang
2015
conf/asiacrypt
Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble.
Thomas Fuhr
Gaëtan Leurent
Valentin Suder
2015
conf/sacrypt
Cryptanalysis of Feistel Networks with Secret Round Functions.
Alex Biryukov
Gaëtan Leurent
Léo Perrin
2015
conf/sacrypt
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures.
Anne Canteaut
Sébastien Duval
Gaëtan Leurent
2015
conf/sacrypt
Differential Forgery Attack Against LAC.
Gaëtan Leurent
2014
conf/fse
SPRING: Fast Pseudorandom Functions from Rounded Ring Products.
Abhishek Banerjee
Hai Brenner
Gaëtan Leurent
Chris Peikert
Alon Rosen
2014
conf/fse
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Vincent Grosso
Gaëtan Leurent
François-Xavier Standaert
Kerem Varici
2014
conf/crypto
Improved Generic Attacks against Hash-Based MACs and HAIFA.
Itai Dinur
Gaëtan Leurent
2014
conf/ches
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Hai Brenner
Lubos Gaspar
Gaëtan Leurent
Alon Rosen
François-Xavier Standaert
2014
conf/ctrsa
Hardware Implementation and Side-Channel Analysis of Lapin.
Lubos Gaspar
Gaëtan Leurent
François-Xavier Standaert
2014
conf/sacrypt
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Jian Guo
Jérémy Jean
Gaëtan Leurent
Thomas Peyrin
Lei Wang
2013
conf/fse
Cryptanalysis of WIDEA.
Gaëtan Leurent
2013
conf/fse
Time-Memory Trade-Offs for Near-Collisions.
Gaëtan Leurent
2013
conf/crypto
Construction of Differential Characteristics in ARX Designs Application to Skein.
Gaëtan Leurent
2013
conf/asiacrypt
New Generic Attacks against Hash-Based MACs.
Gaëtan Leurent
Thomas Peyrin
Lei Wang
2012
conf/ctrsa
Boomerang Attacks on Hash Function Using Auxiliary Differentials.
Gaëtan Leurent
Arnab Roy
2012
conf/eurocrypt
Narrow-Bicliques: Cryptanalysis of Full IDEA.
Dmitry Khovratovich
Gaëtan Leurent
Christian Rechberger
2012
conf/asiacrypt
Analysis of Differential Attacks in ARX Constructions.
Gaëtan Leurent
2012
conf/sacrypt
Cryptanalysis of the "Kindle" Cipher.
Alex Biryukov
Gaëtan Leurent
Arnab Roy
2011
conf/fse
Practical Near-Collisions on the Compression Function of BMW.
Gaëtan Leurent
Søren S. Thomsen
2011
conf/sacrypt
New Insights on Impossible Differential Cryptanalysis.
Charles Bouillaguet
Orr Dunkelman
Pierre-Alain Fouque
Gaëtan Leurent
2010
conf/fse
Another Look at Complementation Properties.
Charles Bouillaguet
Orr Dunkelman
Gaëtan Leurent
Pierre-Alain Fouque
2010
conf/fse
Cryptanalysis of ESSENCE.
María Naya-Plasencia
Andrea Röck
Jean-Philippe Aumasson
Yann Laigle-Chapuy
Gaëtan Leurent
Willi Meier
Thomas Peyrin
2010
conf/ctrsa
Practical Key Recovery Attack against Secret-IV Edon-.
Gaëtan Leurent
2010
conf/africacrypt
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Praveen Gauravaram
Gaëtan Leurent
Florian Mendel
María Naya-Plasencia
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2010
conf/sacrypt
<sub>512</sub>.
Charles Bouillaguet
Orr Dunkelman
Gaëtan Leurent
Pierre-Alain Fouque
2010
conf/sacrypt
Security Analysis of SIMD.
Charles Bouillaguet
Pierre-Alain Fouque
Gaëtan Leurent
2009
conf/crypto
How Risky Is the Random-Oracle Model?
Gaëtan Leurent
Phong Q. Nguyen
2009
conf/ches
Practical Electromagnetic Template Attack on HMAC.
Pierre-Alain Fouque
Gaëtan Leurent
Denis Réal
Frédéric Valette
2008
conf/fse
MD4 is Not One-Way.
Gaëtan Leurent
2008
conf/ctrsa
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
Pierre-Alain Fouque
Gaëtan Leurent
2007
conf/fse
Message Freedom in MD4 and MD5 Collisions: Application to APOP.
Gaëtan Leurent
2007
conf/crypto
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Pierre-Alain Fouque
Gaëtan Leurent
Phong Q. Nguyen
2005
conf/asiacrypt
An Analysis of the XSL Algorithm.
Carlos Cid
Gaëtan Leurent
Coauthors
Abhishek Banerjee
(1)
Alex Biryukov
(3)
Alon Rosen
(2)
André Chailloux
(1)
André Schrottenloher
(7)
Andrea Röck
(1)
Anne Canteaut
(4)
Anthony Leverrier
(2)
Antonio Flórez-Gutiérrez
(3)
Anupam Chattopadhyay
(1)
Arnab Roy
(2)
Augustin Bariant
(5)
Avichai Marmor
(1)
Avik Chakraborti
(1)
Balazs Udvarhelyi
(1)
Ben Fisch
(1)
Benjamin Wesolowski
(1)
Benoît Viguier
(1)
Brice Minaud
(1)
Carlos Cid
(1)
Charles Bouillaguet
(4)
Charles Momin
(1)
Chris Peikert
(1)
Christian Rechberger
(2)
Christina Boura
(2)
Christof Beierle
(1)
Chun Guo
(1)
Clara Pernot
(6)
Clémence Bouvier
(1)
David Rupprecht
(1)
Davide Bellizia
(1)
Denis Réal
(1)
Dhiman Saha
(1)
Dmitry Khovratovich
(2)
Eran Lambooij
(1)
Ferdinand Sibleyras
(5)
Florian Mendel
(1)
Francesco Berti
(1)
François-Xavier Standaert
(4)
Frédéric Valette
(1)
Friedrich Wiemer
(2)
Gaëtan Cassiers
(1)
Gaëtan Leurent
(74)
Gottfried Herold
(1)
Goutam Paul
(1)
Gregor Leander
(3)
Guoyan Zhang
(1)
Hadi Soleimany
(1)
Hai Brenner
(2)
Håvard Raddum
(2)
Itai Dinur
(4)
Itamar Levi
(1)
Jean-Philippe Aumasson
(1)
Jérémy Jean
(1)
Jian Guo
(2)
Jules Baudrin
(3)
Karthikeyan Bhargavan
(2)
Kerem Varici
(1)
Lei Wang
(4)
Léo Perrin
(9)
Lubos Gaspar
(2)
Lukas Stennes
(1)
Marc Kaplan
(2)
Maria Eichlseder
(2)
María Naya-Plasencia
(11)
Martin M. Lauridsen
(1)
Martin Schläffer
(1)
Matthieu Rivain
(1)
Meiqin Wang
(1)
Michiel Verbauwhede
(1)
Mridul Nandi
(1)
Mustafa Khairallah
(1)
Nathan Keller
(1)
Nicolas Bon
(1)
Nicolas David
(1)
Olivier Bronchain
(1)
Olivier Pereira
(1)
Orr Dunkelman
(4)
Pascal Paillier
(1)
Patrick Derbez
(1)
Phong Q. Nguyen
(2)
Pierre-Alain Fouque
(7)
Praveen Gauravaram
(1)
Rachelle Heim Boissier
(1)
Ritam Bhaumik
(1)
Samuel Tap
(1)
Sébastien Duval
(4)
Shibam Ghosh
(1)
Sonia Belaïd
(1)
Søren S. Thomsen
(1)
Thomas Fuhr
(1)
Thomas Peters
(1)
Thomas Peyrin
(9)
Thomas Pornin
(1)
Tim Beyne
(1)
Tomer Ashur
(1)
Tyge Tiessen
(1)
Valentin Suder
(2)
Vesselin Velichkov
(1)
Victor Mollimard
(1)
Vincent Grosso
(1)
Wei Wang
(1)
Willi Meier
(1)
Xavier Bonnetain
(3)
Yanbin Li
(1)
Yann Laigle-Chapuy
(1)
Yann Rotella
(3)
Yannick Seurin
(1)
Yosuke Todo
(1)
Yu Liu
(1)
Yu Sasaki
(3)
Zakaria Najm
(1)
Zhenzhen Bao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to