What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Henri Gilbert
Google Scholar
41
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/eurocrypt
Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics.
Henri Gilbert
Rachelle Heim Boissier
Louiza Khati
Yann Rotella
2023
conf/asiacrypt
Cryptanalysis of Elisabeth-4.
Henri Gilbert
Rachelle Heim Boissier
Jérémy Jean
Jean-René Reinhard
2019
journals/joc
Cryptanalysis of NORX v2.0.
Colin Chaigneau
Thomas Fuhr
Henri Gilbert
Jérémy Jean
Jean-René Reinhard
2019
conf/ctrsa
Assessment of the Key-Reuse Resilience of NewHope.
Aurélie Bauer
Henri Gilbert
Guénaël Renault
Mélissa Rossi
2018
journals/tosc
Key-Recovery Attacks on Full Kravatte.
Colin Chaigneau
Thomas Fuhr
Henri Gilbert
Jian Guo
Jérémy Jean
Jean-René Reinhard
Ling Song
2017
journals/tosc
Cryptanalysis of NORX v2.0.
Colin Chaigneau
Thomas Fuhr
Henri Gilbert
Jérémy Jean
Jean-René Reinhard
2016
journals/tosc
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
Colin Chaigneau
Henri Gilbert
2015
conf/crypto
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes.
Henri Gilbert
Jérôme Plût
Joana Treger
2015
conf/ctrsa
Format Oracles on OpenPGP.
Florian Maury
Jean-René Reinhard
Olivier Levillain
Henri Gilbert
2014
conf/fse
Multiple Differential Cryptanalysis of Round-Reduced PRINCE.
Anne Canteaut
Thomas Fuhr
Henri Gilbert
María Naya-Plasencia
Jean-René Reinhard
2014
conf/asiacrypt
A Simplified Representation of AES.
Henri Gilbert
2013
conf/asiacrypt
New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography.
Gilles Macario-Rat
Jérôme Plût
Henri Gilbert
2011
conf/sacrypt
Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3.
Thomas Fuhr
Henri Gilbert
Jean-René Reinhard
Marion Videau
2010
conf/fse
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.
Henri Gilbert
Thomas Peyrin
2010
conf/fse
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher.
Olivier Billet
Jonathan Etrog
Henri Gilbert
2009
conf/ccs
An efficient forward private RFID protocol.
Côme Berbain
Olivier Billet
Jonathan Etrog
Henri Gilbert
2008
conf/fc
Good Variants of HB<sup>+</sup> Are Hard to Find.
Henri Gilbert
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/eurocrypt
HB<sup>#</sup>: Increasing the Security and Efficiency of HB<sup>+</sup>.
Henri Gilbert
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/sacrypt
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers.
Côme Berbain
Henri Gilbert
Antoine Joux
2007
conf/fse
On the Security of IV Dependent Stream Ciphers.
Côme Berbain
Henri Gilbert
2007
conf/ccs
Compact FPGA implementations of QUAD.
David Arditti
Côme Berbain
Olivier Billet
Henri Gilbert
2006
conf/fse
Cryptanalysis of Grain.
Côme Berbain
Henri Gilbert
Alexander Maximov
2006
conf/eurocrypt
QUAD: A Practical Stream Cipher with Provable Security.
Côme Berbain
Henri Gilbert
Jacques Patarin
2006
conf/asiacrypt
Combining Compression Functions and Block Cipher-Based Hash Functions.
Thomas Peyrin
Henri Gilbert
Frédéric Muller
Matthew J. B. Robshaw
2006
conf/sacrypt
Efficient Implementations of Multivariate Quadratic Systems.
Côme Berbain
Olivier Billet
Henri Gilbert
2005
conf/ctrsa
Resistance of SNOW 2.0 Against Algebraic Attacks.
Olivier Billet
Henri Gilbert
2004
conf/sacrypt
Cryptanalysis of a White Box AES Implementation.
Olivier Billet
Henri Gilbert
Charaf Ech-Chatbi
2003
conf/fse
The Security of "One-Block-to-Many" Modes of Operation.
Henri Gilbert
2003
conf/asiacrypt
A Traceable Block Cipher.
Olivier Billet
Henri Gilbert
2003
conf/sacrypt
Security Analysis of SHA-256 and Sisters.
Henri Gilbert
Helena Handschuh
2002
conf/eurocrypt
Cryptanalysis of SFLASH.
Henri Gilbert
Marine Minier
2001
conf/fse
New Results on the Pseudorandomness of Some Blockcipher Constructions.
Henri Gilbert
Marine Minier
2001
conf/fse
The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free.
Christophe Debaert
Henri Gilbert
2000
conf/fse
Stochastic Cryptanalysis of Crypton.
Marine Minier
Henri Gilbert
2000
conf/fse
A Statistical Attack on RC6.
Henri Gilbert
Helena Handschuh
Antoine Joux
Serge Vaudenay
1997
conf/fse
x<sup>2</sup> Cryptanalysis of the SEAL Encryption Algorithm.
Helena Handschuh
Henri Gilbert
1994
conf/crypto
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem.
Henri Gilbert
Pascal Chauvaud
1992
conf/crypto
On the Security of the Permuted Kernel Identification Scheme.
Thierry Baritaud
Mireille Campana
Pascal Chauvaud
Henri Gilbert
1992
conf/eurocrypt
FFT Hashing is not Collision-free.
Thierry Baritaud
Henri Gilbert
Marc Girault
1991
conf/crypto
A Known Plaintext Attack of FEAL-4 and FEAL-6.
Anne Tardy-Corfdir
Henri Gilbert
1990
conf/crypto
A Statistical Attack of the FEAL-8 Cryptosystem.
Henri Gilbert
Guy Chassé
Coauthors
Alexander Maximov
(1)
Anne Canteaut
(1)
Anne Tardy-Corfdir
(1)
Antoine Joux
(2)
Aurélie Bauer
(1)
Charaf Ech-Chatbi
(1)
Christophe Debaert
(1)
Colin Chaigneau
(4)
Côme Berbain
(7)
David Arditti
(1)
Florian Maury
(1)
Frédéric Muller
(1)
Gilles Macario-Rat
(1)
Guénaël Renault
(1)
Guy Chassé
(1)
Helena Handschuh
(3)
Henri Gilbert
(41)
Jacques Patarin
(1)
Jean-René Reinhard
(7)
Jérémy Jean
(4)
Jérôme Plût
(2)
Jian Guo
(1)
Joana Treger
(1)
Jonathan Etrog
(2)
Ling Song
(1)
Louiza Khati
(1)
Marc Girault
(1)
María Naya-Plasencia
(1)
Marine Minier
(3)
Marion Videau
(1)
Matthew J. B. Robshaw
(3)
Mélissa Rossi
(1)
Mireille Campana
(1)
Olivier Billet
(7)
Olivier Levillain
(1)
Pascal Chauvaud
(2)
Rachelle Heim Boissier
(2)
Serge Vaudenay
(1)
Thierry Baritaud
(2)
Thomas Fuhr
(5)
Thomas Peyrin
(2)
Yann Rotella
(1)
Yannick Seurin
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to