Léo Perrin

Orcid: 0000-0002-4722-7005

According to our database1, Léo Perrin authored at least 63 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
IACR Trans. Symmetric Cryptol., 2024

Security Analysis of XHASH8/12.
IACR Cryptol. ePrint Arch., 2024

Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2024

The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.
IACR Cryptol. ePrint Arch., 2024

2023
On the algebraic degree of iterated power functions.
Des. Codes Cryptogr., March, 2023

Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES.
IACR Trans. Symmetric Cryptol., 2023

Commutative Cryptanalysis Made Practical.
IACR Trans. Symmetric Cryptol., 2023

New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Supplementary code to "Trims and extensions of quadratic APN functions".
Dataset, January, 2022

Quadratic APN Extensions.
Dataset, January, 2022

Practical Cube Attack against Nonce-Misused Ascon.
IACR Trans. Symmetric Cryptol., 2022

Algebraic Attacks against Some Arithmetization-Oriented Primitives.
IACR Trans. Symmetric Cryptol., 2022

Recovering or Testing Extended-Affine Equivalence.
IEEE Trans. Inf. Theory, 2022

Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence.
IACR Cryptol. ePrint Arch., 2022

A further study of quadratic APN permutations in dimension nine.
Finite Fields Their Appl., 2022

Trims and extensions of quadratic APN functions.
Des. Codes Cryptogr., 2022

Constructing more quadratic APN functions with the QAM method.
Cryptogr. Commun., 2022

2021
Quadratic APN Extensions.
Dataset, August, 2021

MOE: Multiplication Operated Encryption with Trojan Resilience.
IACR Trans. Symmetric Cryptol., 2021

Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
J. Cryptol., 2021

2020
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
IACR Trans. Symmetric Cryptol., 2020

Lightweight AEAD and Hashing using the Sparkle Permutation Family.
IACR Trans. Symmetric Cryptol., 2020

Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
J. Cryptol., 2020

New results on Gimli: full-permutation distinguishers and improved collisions.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis Results on Spook.
IACR Cryptol. ePrint Arch., 2020

On the security of the Rescue hash function.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

Boomerang uniformity of popular S-box constructions.
Des. Codes Cryptogr., 2020

On subspaces of Kloosterman zeros and permutations of the form L<sub>1</sub>(x<sup>-1</sup>)+L<sub>2</sub>(x).
CoRR, 2020

On Subspaces of Kloosterman Zeros and Permutations of the Form L<sub>1(x<sup>-1</sup>)+L<sub>2(x)</sub></sub>.
Proceedings of the Arithmetic of Finite Fields - 8th International Workshop, 2020

Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Partitions in the S-Box of Streebog and Kuznyechik.
IACR Trans. Symmetric Cryptol., 2019

Triathlon of lightweight block ciphers for the Internet of things.
J. Cryptogr. Eng., 2019

Probability 1 Iterated Differential in the SNEIK Permutation.
IACR Cryptol. ePrint Arch., 2019

Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs.
IACR Cryptol. ePrint Arch., 2019

Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering.
IACR Cryptol. ePrint Arch., 2019

Alzette: A 64-bit ARX-box.
IACR Cryptol. ePrint Arch., 2019

Feistel Structures for MPC, and More.
IACR Cryptol. ePrint Arch., 2019

On CCZ-equivalence, extended-affine equivalence, and function twisting.
Finite Fields Their Appl., 2019

If a generalised butterfly is APN then it operates on 6 bits.
Cryptogr. Commun., 2019

Anomalies and Vector Space Search: Tools for S-Box Analysis.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2017
Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms.
PhD thesis, 2017

A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size 2<sup>4k+2</sup>.
IEEE Trans. Inf. Theory, 2017

Improvements to the Linear Layer of LowMC: A Faster Picnic.
IACR Cryptol. ePrint Arch., 2017

State of the Art in Lightweight Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2017

Symmetrically and Asymmetrically Hard Cryptography.
IACR Cryptol. ePrint Arch., 2017

2016
Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog.
IACR Trans. Symmetric Cryptol., 2016

Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs.
IACR Trans. Symmetric Cryptol., 2016

Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version).
IACR Cryptol. ePrint Arch., 2016

Algebraic Insights into the Secret Feistel Network (Full version).
IACR Cryptol. ePrint Arch., 2016

Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptol. ePrint Arch., 2016

A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 2<sup>4k+2</sup>.
IACR Cryptol. ePrint Arch., 2016

Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
IACR Cryptol. ePrint Arch., 2016

Algebraic Insights into the Secret Feistel Network.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob.
IACR Cryptol. ePrint Arch., 2015

On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Feistel Networks with Secret Round Functions.
IACR Cryptol. ePrint Arch., 2015

Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE.
IACR Cryptol. ePrint Arch., 2015

2014
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64.
IACR Cryptol. ePrint Arch., 2014

More differentially 6-uniform power functions.
Des. Codes Cryptogr., 2014


  Loading...