Pierre Karpman

According to our database1, Pierre Karpman authored at least 18 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes.
IACR Cryptol. ePrint Arch., 2022

2021
Computing the Characteristic Polynomial of Generic Toeplitz-like and Hankel-like Matrices.
Proceedings of the ISSAC '21: International Symposium on Symbolic and Algebraic Computation, 2021

Fast Verification of Masking Schemes in Characteristic Two.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2019
High-order private multiplication in characteristic two revisited.
IACR Cryptol. ePrint Arch., 2019

2018
Short Non-Malleable Codes from Related-Key Secure Block Ciphers.
IACR Trans. Symmetric Cryptol., 2018

Key-Recovery Attacks on ASASA.
J. Cryptol., 2018

New Instantiations of the CRYPTO 2017 Masking Schemes.
IACR Cryptol. ePrint Arch., 2018

2017
The first collision for full SHA-1.
IACR Cryptol. ePrint Arch., 2017

2016
Analyse de primitives symétriques. (Analysis of symmetric primitives).
PhD thesis, 2016

Efficient and Provable White-Box Primitives.
IACR Cryptol. ePrint Arch., 2016

2015
Freestart collision on full SHA-1.
IACR Cryptol. ePrint Arch., 2015

Practical Free-Start Collision Attacks on 76-step SHA-1.
IACR Cryptol. ePrint Arch., 2015

From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions.
IACR Cryptol. ePrint Arch., 2015

Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE.
IACR Cryptol. ePrint Arch., 2015

From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
IACR Cryptol. ePrint Arch., 2014

2013
Security Amplification against Meet-in-the-Middle Attacks Using Whitening.
IACR Cryptol. ePrint Arch., 2013

Analysis of BLAKE2.
IACR Cryptol. ePrint Arch., 2013


  Loading...