Gaëtan Leurent

Orcid: 0000-0001-5903-9055

Affiliations:
  • Inria, Paris, France


According to our database1, Gaëtan Leurent authored at least 81 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
New Representations of the AES Key Schedule.
J. Cryptol., March, 2025

2024
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation.
IACR Trans. Symmetric Cryptol., 2024

Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
IACR Trans. Symmetric Cryptol., 2024

Improving Generic Attacks Using Exceptional Functions.
IACR Cryptol. ePrint Arch., 2024

Cryptanalysis of Algebraic Verifiable Delay Functions.
IACR Cryptol. ePrint Arch., 2024

Improved Boomerang Attacks on 6-Round AES.
IACR Cryptol. ePrint Arch., 2024

Symmetric Cryptanalysis Beyond Primitives.
, 2024

2023
Partial Sums Meet FFT: Improved Attack on 6-Round AES.
IACR Cryptol. ePrint Arch., 2023

2022
Algebraic Attacks against Some Arithmetization-Oriented Primitives.
IACR Trans. Symmetric Cryptol., 2022

Truncated Boomerang Attacks and Application to AES-based Ciphers.
IACR Cryptol. ePrint Arch., 2022

Practical key recovery attacks on FlexAEAD.
Des. Codes Cryptogr., 2022

2021
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
J. Cryptol., 2021

Clustering Effect in Simon and Simeck.
IACR Cryptol. ePrint Arch., 2021

Quantum Linearization Attacks.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
IACR Cryptol. ePrint Arch., 2021

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Preface to Volume 2020, Issue 1.
IACR Trans. Symmetric Cryptol., 2020

Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
IACR Trans. Symmetric Cryptol., 2020

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

Cryptanalysis of Forkciphers.
IACR Trans. Symmetric Cryptol., 2020

Generic Attacks on Hash Combiners.
J. Cryptol., 2020

SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
IACR Cryptol. ePrint Arch., 2020

New results on Gimli: full-permutation distinguishers and improved collisions.
IACR Cryptol. ePrint Arch., 2020

QCB: Efficient Quantum-secure Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

2019
Universal Forgery Attack against GCM-RUP.
IACR Cryptol. ePrint Arch., 2019

Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem.
IACR Cryptol. ePrint Arch., 2019

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1.
IACR Cryptol. ePrint Arch., 2019

Lightweight MACs from Universal Hash Functions.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2018
MDS Matrices with Lightweight Circuits.
IACR Trans. Symmetric Cryptol., 2018

The Missing Difference Problem, and its Applications to Counter Mode Encryption.
IACR Cryptol. ePrint Arch., 2018

Generic Attacks against Beyond-Birthday-Bound MACs.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of MORUS.
IACR Cryptol. ePrint Arch., 2018

2017
Improved Generic Attacks Against Hash-Based MACs and HAIFA.
Algorithmica, 2017

2016
Quantum Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2016

Key Recovery Attack against 2.5-round pi-Cipher.
IACR Cryptol. ePrint Arch., 2016

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN.
IACR Cryptol. ePrint Arch., 2016

Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Breaking Symmetric Cryptosystems Using Quantum Period Finding.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
The Sum Can Be Weaker Than Each Part.
IACR Cryptol. ePrint Arch., 2015

Differential and Linear Cryptanalysis of ARX with Partitioning - Application to FEAL and Chaskey.
IACR Cryptol. ePrint Arch., 2015

Collision Attacks against CAESAR Candidates - Forgery and Key-Recovery against AEZ and Marble.
IACR Cryptol. ePrint Arch., 2015

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version).
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Feistel Networks with Secret Round Functions.
IACR Cryptol. ePrint Arch., 2015

Differential Forgery Attack Against LAC.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Construction of Lightweight S-Boxes Using Feistel and MISTY Structures.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

2014
New Generic Attacks Against Hash-based MACs.
IACR Cryptol. ePrint Arch., 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014

LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

SPRING: Fast Pseudorandom Functions from Rounded Ring Products.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Hardware Implementation and Side-Channel Analysis of Lapin.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2012
Time-memory Trade-offs for Near-collisions.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of WIDEA.
IACR Cryptol. ePrint Arch., 2012

Construction of Differential Characteristics in ARX Designs - Application to Skein.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of the "Kindle" Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Narrow-Bicliques: Cryptanalysis of Full IDEA.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Boomerang Attacks on Hash Function Using Auxiliary Differentials.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Analysis of Differential Attacks in ARX Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
New Insights on Impossible Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Near-Collisions on the Compression Function of BMW.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Quantum Preimage and Collision Attacks on CubeHash.
IACR Cryptol. ePrint Arch., 2010

Security Analysis of SIMD.
IACR Cryptol. ePrint Arch., 2010

Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round <i>Lesamnta</i> and <i>SHAvite-3</i><sub>512</sub>.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Another Look at Complementation Properties.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Practical Key Recovery Attack against Secret-IV Edon-.
Proceedings of the Topics in Cryptology, 2010

Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Proceedings of the Progress in Cryptology, 2010

2009
Cryptanalysis of ESSENCE.
IACR Cryptol. ePrint Arch., 2009

Practical Key Recovery Attack against Secret-prefix Edon-R.
IACR Cryptol. ePrint Arch., 2009

Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3<sub>512</sub>.
IACR Cryptol. ePrint Arch., 2009

Practical Electromagnetic Template Attack on HMAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication.
Int. J. Appl. Cryptogr., 2008

How Risky is the Random-Oracle Model?
IACR Cryptol. ePrint Arch., 2008

MD4 is Not One-Way.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
Proceedings of the Topics in Cryptology, 2008

2007
Automatic Search of Differential Path in MD4.
IACR Cryptol. ePrint Arch., 2007

Message Freedom in MD4 and MD5 Collisions: Application to APOP.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Proceedings of the Advances in Cryptology, 2007

2005
An Analysis of the XSL Algorithm.
Proceedings of the Advances in Cryptology, 2005


  Loading...