Gaëtan Leurent
Orcid: 0000-0001-5903-9055Affiliations:
- Inria, Paris, France
According to our database1,
Gaëtan Leurent
authored at least 81 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
2024
IACR Trans. Symmetric Cryptol., 2024
IACR Trans. Symmetric Cryptol., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
2020
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Smart Card Research and Advanced Applications, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
2016
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Differential and Linear Cryptanalysis of ARX with Partitioning - Application to FEAL and Chaskey.
IACR Cryptol. ePrint Arch., 2015
Collision Attacks against CAESAR Candidates - Forgery and Key-Recovery against AEZ and Marble.
IACR Cryptol. ePrint Arch., 2015
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version).
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
2014
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round <i>Lesamnta</i> and <i>SHAvite-3</i><sub>512</sub>.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3<sub>512</sub>.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication.
Int. J. Appl. Cryptogr., 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Topics in Cryptology, 2008
2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007
2005