Thomas Peyrin

Orcid: 0000-0002-2690-9197

Affiliations:
  • Nanyang Technological University, Singapore


According to our database1, Thomas Peyrin authored at least 113 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
IACR Trans. Symmetric Cryptol., 2024

The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.
IACR Cryptol. ePrint Arch., 2024

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
IACR Commun. Cryptol., 2024

Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2023
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP.
IACR Trans. Symmetric Cryptol., 2023

Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Fully Automated Differential-Linear Attacks against ARX Ciphers.
IACR Cryptol. ePrint Arch., 2023

A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making.
CoRR, 2023

TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture.
CoRR, 2023

Neural Network-Based Rule Models with Truth Tables.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Exploring Integrity of AEADs with Faults: Definitions and Constructions.
IACR Trans. Symmetric Cryptol., 2022

Mind Your Path: On (Key) Dependencies in Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2022

Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha.
IACR Cryptol. ePrint Arch., 2022

Finding All Impossible Differentials When Considering the DDT.
IACR Cryptol. ePrint Arch., 2022

Truth-Table Net: A New Convolutional Architecture Encodable by Design into SAT Formulas.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

2021
Exploring Differential-Based Distinguishers and Forgeries for ASCON.
IACR Trans. Symmetric Cryptol., 2021

Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

The Deoxys AEAD Family.
J. Cryptol., 2021

A Deeper Look at Machine Learning-Based Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
IACR Cryptol. ePrint Arch., 2021

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms.
IACR Trans. Symmetric Cryptol., 2020

Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

Improved Heuristics for Short Linear Programs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust.
IACR Cryptol. ePrint Arch., 2020

Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates.
IACR Cryptol. ePrint Arch., 2020

GIFT-COFB.
IACR Cryptol. ePrint Arch., 2020

Fixslicing: A New GIFT Representation.
IACR Cryptol. ePrint Arch., 2020

NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.
IACR Trans. Symmetric Cryptol., 2019

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1.
IACR Cryptol. ePrint Arch., 2019

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2019

2018
Boomerang Connectivity Table: A New Cryptanalysis Tool.
IACR Cryptol. ePrint Arch., 2018

Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018

Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018

Protecting block ciphers against differential fault attacks without re-keying.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

2017
Human-readable Proof of the Related-Key Security of AES-128.
IACR Trans. Symmetric Cryptol., 2017

Optimizing Implementations of Lightweight Building Blocks.
IACR Trans. Symmetric Cryptol., 2017

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Practical Evaluation of FSE 2016 Customized Encoding Countermeasure.
IACR Trans. Symmetric Cryptol., 2017

Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017

Optimizing Implementations of Lightweight Building Blocks.
IACR Cryptol. ePrint Arch., 2017

Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
IACR Cryptol. ePrint Arch., 2017

ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

GIFT: A Small Present.
IACR Cryptol. ePrint Arch., 2017

GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Cryptanalysis of Full RIPEMD-128.
J. Cryptol., 2016

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.
IACR Cryptol. ePrint Arch., 2016

2015
Collision Attack on Grindahl.
J. Cryptol., 2015

Freestart collision on full SHA-1.
IACR Cryptol. ePrint Arch., 2015

Lightweight MDS Involution Matrices.
IACR Cryptol. ePrint Arch., 2015

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2015

Practical Free-Start Collision Attacks on 76-step SHA-1.
IACR Cryptol. ePrint Arch., 2015

Security Analysis of PRINCE.
IACR Cryptol. ePrint Arch., 2015

Known-key Distinguisher on Full PRESENT.
IACR Cryptol. ePrint Arch., 2015

2014
Improved Cryptanalysis of AES-like Permutations.
J. Cryptol., 2014

Generic Universal Forgery Attack on Iterative Hash-based MACs.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of JAMBU.
IACR Cryptol. ePrint Arch., 2014

New Generic Attacks Against Hash-based MACs.
IACR Cryptol. ePrint Arch., 2014

FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.
IACR Cryptol. ePrint Arch., 2014

Tweaks and Keys for Block Ciphers: the TWEAKEY Framework.
IACR Cryptol. ePrint Arch., 2014

A Very Compact FPGA Implementation of LED and PHOTON.
IACR Cryptol. ePrint Arch., 2014

Breaking POET Authentication with a Single Query.
IACR Cryptol. ePrint Arch., 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014

Updates on Generic Attacks against HMAC and NMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Improved Cryptanalysis of Reduced RIPEMD-160.
IACR Cryptol. ePrint Arch., 2013

Multiple Limited-Birthday Distinguishers and Applications.
IACR Cryptol. ePrint Arch., 2013

Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful.
IACR Cryptol. ePrint Arch., 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128.
IACR Cryptol. ePrint Arch., 2013

Implementing Lightweight Block Ciphers on x86 Architectures.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of Zorro.
IACR Cryptol. ePrint Arch., 2013

Security challenges in automotive hardware/software architecture design.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
On the (In)Security of IDEA in Various Hashing Modes.
IACR Cryptol. ePrint Arch., 2012

Generic Related-key Attacks for HMAC.
IACR Cryptol. ePrint Arch., 2012

SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks.
IACR Cryptol. ePrint Arch., 2012

The LED Block Cipher.
IACR Cryptol. ePrint Arch., 2012

Practical Cryptanalysis of ARMADILLO2.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Improved Rebound Attack on the Finalist Grøstl.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Analysis of reduced-SHAvite-3-256 v2.
IACR Cryptol. ePrint Arch., 2011

The PHOTON Family of Lightweight Hash Functions.
IACR Cryptol. ePrint Arch., 2011

Unaligned Rebound Attack - Application to Keccak.
IACR Cryptol. ePrint Arch., 2011

2010
Improved Differential Attacks for ECHO and Grostl.
IACR Cryptol. ePrint Arch., 2010

Side-channel Analysis of Six SHA-3 Candidates.
IACR Cryptol. ePrint Arch., 2010

Distinguishers for the Compression Function and Output Transformation of Hamsi-256.
IACR Cryptol. ePrint Arch., 2010

A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Proceedings of the Progress in Cryptology, 2010

2009
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Cryptanalysis of ESSENCE.
IACR Cryptol. ePrint Arch., 2009

Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations.
IACR Cryptol. ePrint Arch., 2009

Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
IACR Cryptol. ePrint Arch., 2009

Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Cryptanalysis of the ESSENCE Family of Hash Functions.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Cryptanalysis of CubeHash.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Slide Attacks on a Class of Hash Functions.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of RadioGatun.
IACR Cryptol. ePrint Arch., 2008

Inside the Hypercube.
IACR Cryptol. ePrint Arch., 2008

How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Proceedings of the Provable Security, Second International Conference, 2008

Collisions on SHA-0 in One Hour.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Security Analysis of Constructions Combining FIL Random Oracles.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Hash Functions and the (Amplified) Boomerang Attack.
Proceedings of the Advances in Cryptology, 2007

Cryptanalysis of Grindahl.
Proceedings of the Advances in Cryptology, 2007

On Building Hash Functions from Multivariate Quadratic Equations.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Cryptanalysis of T-Function-Based Hash Functions.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Combining Compression Functions and Block Cipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2006

2005
The Pairing Problem with User Interaction.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Linear Cryptanalysis of the TSC Family of Stream Ciphers.
Proceedings of the Advances in Cryptology, 2005

2004
Advances in Alternative Non-adjacent Form Representations.
Proceedings of the Progress in Cryptology, 2004


  Loading...