Thomas Peyrin
Orcid: 0000-0002-2690-9197Affiliations:
- Nanyang Technological University, Singapore
According to our database1,
Thomas Peyrin
authored at least 113 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.
IACR Cryptol. ePrint Arch., 2024
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
IACR Commun. Cryptol., 2024
Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
2023
IACR Trans. Symmetric Cryptol., 2023
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
CoRR, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Truth-Table Net: A New Convolutional Architecture Encodable by Design into SAT Formulas.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
IACR Cryptol. ePrint Arch., 2020
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018
Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Design, Automation and Test in Europe, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Proceedings of the Progress in Cryptology, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Advances in Cryptology, 2006
2005
The Pairing Problem with User Interaction.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Progress in Cryptology, 2004