What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Léo Perrin
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Corrigendum to Fast AES-Based Universal Hash Functions and MACs.
Augustin Bariant
Jules Baudrin
Gaëtan Leurent
Clara Pernot
Léo Perrin
Thomas Peyrin
2025
journals/tosc
On the Security of Split-and-Lookup-Based ZK-Friendly Primitives.
Antoine Bak
Léo Perrin
2025
conf/eurocrypt
ChiLow and ChiChi: New Constructions for Code Encryption.
Yanis Belkheyar
Patrick Derbez
Shibam Ghosh
Gregor Leander
Silvia Mella
Léo Perrin
Shahram Rasoolzadeh
Lukas Stennes
Siwei Sun
Gilles Van Assche
Damian Vizár
2025
conf/crypto
Transistor: a TFHE-Friendly Stream Cipher.
Jules Baudrin
Sonia Belaïd
Nicolas Bon
Christina Boura
Anne Canteaut
Gaëtan Leurent
Pascal Paillier
Léo Perrin
Matthieu Rivain
Yann Rotella
Samuel Tap
2025
journals/tosc
SoK: On Shallow Weak PRFs A Common Symmetric Building Block for MPC Protocols.
Christina Boura
Geoffroy Couteau
Léo Perrin
Yann Rotella
2025
journals/tosc
Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving Applications to Round-Reduced Monolith and Full-Round Skyscraper.
Antoine Bak
Guilhem Jazeron
Pierre Galissant
Léo Perrin
2024
journals/tosc
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
Augustin Bariant
Jules Baudrin
Gaëtan Leurent
Clara Pernot
Léo Perrin
Thomas Peyrin
2024
conf/crypto
The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.
Augustin Bariant
Aurélien Boeuf
Axel Lemoine
Irati Manterola Ayala
Morten Øygarden
Léo Perrin
Håvard Raddum
2023
journals/tosc
Commutative Cryptanalysis Made Practical.
Jules Baudrin
Patrick Felke
Gregor Leander
Patrick Neumann
Léo Perrin
Lukas Stennes
2023
journals/tosc
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES.
Aurélien Boeuf
Anne Canteaut
Léo Perrin
2023
conf/crypto
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode.
Clémence Bouvier
Pierre Briaud
Pyrros Chaidos
Léo Perrin
Robin Salen
Vesselin Velichkov
Danny Willems
2022
journals/tosc
Algebraic Attacks against Some Arithmetization-Oriented Primitives.
Augustin Bariant
Clémence Bouvier
Gaëtan Leurent
Léo Perrin
2022
journals/tosc
Practical Cube Attack against Nonce-Misused Ascon.
Jules Baudrin
Anne Canteaut
Léo Perrin
2021
journals/tosc
MOE: Multiplication Operated Encryption with Trojan Resilience.
Olivier Bronchain
Sebastian Faust
Virginie Lallemand
Gregor Leander
Léo Perrin
François-Xavier Standaert
2021
journals/joc
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
Antonio Flórez-Gutiérrez
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
André Schrottenloher
Ferdinand Sibleyras
2020
journals/tosc
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
Anne Canteaut
Sébastien Duval
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Thomas Pornin
André Schrottenloher
2020
journals/tosc
Lightweight AEAD and Hashing using the Sparkle Permutation Family.
Christof Beierle
Alex Biryukov
Luan Cardoso dos Santos
Johann Großschädl
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Qingju Wang
2020
journals/joc
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
Patrick Derbez
Léo Perrin
2020
conf/crypto
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Patrick Derbez
Paul Huynh
Virginie Lallemand
María Naya-Plasencia
Léo Perrin
André Schrottenloher
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2020
conf/crypto
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
Christof Beierle
Alex Biryukov
Luan Cardoso dos Santos
Johann Großschädl
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Qingju Wang
2020
conf/asiacrypt
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions.
Antonio Flórez-Gutiérrez
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
André Schrottenloher
Ferdinand Sibleyras
2019
journals/tosc
Partitions in the S-Box of Streebog and Kuznyechik.
Léo Perrin
2019
conf/esorics
Feistel Structures for MPC, and More.
Martin R. Albrecht
Lorenzo Grassi
Léo Perrin
Sebastian Ramacher
Christian Rechberger
Dragos Rotaru
Arnab Roy
Markus Schofnegger
2019
conf/asiacrypt
Anomalies and Vector Space Search: Tools for S-Box Analysis.
Xavier Bonnetain
Léo Perrin
Shizhu Tian
2017
conf/asiacrypt
Symmetrically and Asymmetrically Hard Cryptography.
Alex Biryukov
Léo Perrin
2016
journals/tosc
Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog.
Léo Perrin
Aleksei Udovenko
2016
journals/tosc
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs.
Alex Biryukov
Dmitry Khovratovich
Léo Perrin
2016
conf/fse
Algebraic Insights into the Secret Feistel Network.
Léo Perrin
Aleksei Udovenko
2016
conf/crypto
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Léo Perrin
Aleksei Udovenko
Alex Biryukov
2016
conf/eurocrypt
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
Alex Biryukov
Léo Perrin
Aleksei Udovenko
2016
conf/asiacrypt
Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Daniel Dinu
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Johann Großschädl
Alex Biryukov
2015
conf/fse
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
Patrick Derbez
Léo Perrin
2015
conf/fse
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE.
Alex Biryukov
Patrick Derbez
Léo Perrin
2015
conf/crypto
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure.
Alex Biryukov
Léo Perrin
2015
conf/sacrypt
Cryptanalysis of Feistel Networks with Secret Round Functions.
Alex Biryukov
Gaëtan Leurent
Léo Perrin
2014
conf/fse
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64.
Léo Perrin
Dmitry Khovratovich
Coauthors
Aleksei Udovenko
(7)
Alex Biryukov
(10)
André Schrottenloher
(4)
Anne Canteaut
(5)
Antoine Bak
(2)
Antonio Flórez-Gutiérrez
(2)
Arnab Roy
(1)
Augustin Bariant
(4)
Aurélien Boeuf
(2)
Axel Lemoine
(1)
Christian Rechberger
(1)
Christina Boura
(2)
Christof Beierle
(2)
Clara Pernot
(2)
Clémence Bouvier
(2)
Damian Vizár
(1)
Daniel Dinu
(1)
Danny Willems
(1)
Dmitry Khovratovich
(2)
Dragos Rotaru
(1)
Ferdinand Sibleyras
(2)
François-Xavier Standaert
(1)
Friedrich Wiemer
(1)
Gaëtan Leurent
(9)
Geoffroy Couteau
(1)
Gilles Van Assche
(1)
Gregor Leander
(4)
Guilhem Jazeron
(1)
Håvard Raddum
(1)
Irati Manterola Ayala
(1)
Itai Dinur
(1)
Johann Großschädl
(3)
Jules Baudrin
(5)
Léo Perrin
(37)
Lorenzo Grassi
(1)
Luan Cardoso dos Santos
(2)
Lukas Stennes
(2)
Maria Eichlseder
(1)
María Naya-Plasencia
(5)
Markus Schofnegger
(1)
Martin R. Albrecht
(1)
Matthieu Rivain
(1)
Morten Øygarden
(1)
Nicolas Bon
(1)
Olivier Bronchain
(1)
Pascal Paillier
(1)
Patrick Derbez
(5)
Patrick Felke
(1)
Patrick Neumann
(1)
Paul Huynh
(1)
Pierre Briaud
(1)
Pierre Galissant
(1)
Pyrros Chaidos
(1)
Qingju Wang
(2)
Robin Salen
(1)
Samuel Tap
(1)
Sebastian Faust
(1)
Sebastian Ramacher
(1)
Sébastien Duval
(1)
Shahram Rasoolzadeh
(1)
Shibam Ghosh
(1)
Shizhu Tian
(1)
Silvia Mella
(1)
Siwei Sun
(1)
Sonia Belaïd
(1)
Thomas Peyrin
(2)
Thomas Pornin
(1)
Tim Beyne
(1)
Vesselin Velichkov
(4)
Virginie Lallemand
(2)
Xavier Bonnetain
(1)
Yanis Belkheyar
(1)
Yann Rotella
(2)
Yosuke Todo
(1)
Yu Sasaki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to