Edit Profile Fuhr, Thomas Compute Distance To: Compute Author ID: fuhr.thomas Published as: Fuhr, Thomas Documents Indexed: 8 Publications since 2007 all top 5 Co-Authors 1 single-authored 3 Gilbert, Henri 3 Reinhard, Jean-René 1 Canteaut, Anne 1 Chaigneau, Colin 1 Jean, Jérémy 1 Leurent, Gaëtan 1 Minaud, Brice 1 Naya-Plasencia, María 1 Paillier, Pascal 1 Peyrin, Thomas 1 Suder, Valentin 1 Videau, Marion Serials 1 Journal of Cryptology Fields 8 Information and communication theory, circuits (94-XX) 1 Computer science (68-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 7 Publications have been cited 19 times in 19 Documents Cited by ▼ Year ▼ Decryptable searchable encryption. Zbl 1138.94363Fuhr, Thomas; Paillier, Pascal 7 2007 Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble. Zbl 1382.94105Fuhr, Thomas; Leurent, Gaëtan; Suder, Valentin 3 2015 Multiple differential cryptanalysis of round-reduced PRINCE. Zbl 1382.94079Canteaut, Anne; Fuhr, Thomas; Gilbert, Henri; Naya-Plasencia, María; Reinhard, Jean-René 3 2015 Match box meet-in-the-middle attack against KATAN. Zbl 1382.94106Fuhr, Thomas; Minaud, Brice 3 2015 Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm 128-EIA3. Zbl 1292.94064Fuhr, Thomas; Gilbert, Henri; Reinhard, Jean-René; Videau, Marion 1 2012 Finding second preimages of short messages for Hamsi-256. Zbl 1253.94048Fuhr, Thomas 1 2010 Cryptanalysis of RadioGatún. Zbl 1291.94084Fuhr, Thomas; Peyrin, Thomas 1 2009 Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble. Zbl 1382.94105Fuhr, Thomas; Leurent, Gaëtan; Suder, Valentin 3 2015 Multiple differential cryptanalysis of round-reduced PRINCE. Zbl 1382.94079Canteaut, Anne; Fuhr, Thomas; Gilbert, Henri; Naya-Plasencia, María; Reinhard, Jean-René 3 2015 Match box meet-in-the-middle attack against KATAN. Zbl 1382.94106Fuhr, Thomas; Minaud, Brice 3 2015 Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm 128-EIA3. Zbl 1292.94064Fuhr, Thomas; Gilbert, Henri; Reinhard, Jean-René; Videau, Marion 1 2012 Finding second preimages of short messages for Hamsi-256. Zbl 1253.94048Fuhr, Thomas 1 2010 Cryptanalysis of RadioGatún. Zbl 1291.94084Fuhr, Thomas; Peyrin, Thomas 1 2009 Decryptable searchable encryption. Zbl 1138.94363Fuhr, Thomas; Paillier, Pascal 7 2007 all cited Publications top 5 cited Publications all top 5 Cited by 59 Authors 3 Canteaut, Anne 2 Carpov, Sergiu 2 Fontaine, Caroline 2 Lepoint, Tancrède 2 Naya-Plasencia, María 2 Paillier, Pascal 2 Sirdey, Renaud 1 Abdalla, Michel 1 Adhikari, Avishek 1 Bay, Asli 1 Bellare, Mihir 1 Boura, Christina 1 Canard, Sébastien 1 Cao, Meichun 1 Chen, Jiageng 1 Chen, Yu 1 Das, Angsuman 1 Derbez, Patrick 1 Dinur, Itai 1 Ersoy, Oğuzhan 1 Fang, Junbin 1 Fang, Liming 1 Fu, Shaojing 1 Fuchsbauer, Georg 1 Ge, Chunpeng 1 Gouget, Aline 1 Hartel, Pieter H. 1 Ibraimi, Luan 1 Jonker, Willem 1 Karakoç, Ferhat 1 Knudsen, Lars Ramkilde 1 Laguillaumie, Fabien 1 Leander, Gregor 1 Li, Chao 1 Lin, Dongdai 1 Liu, Guoqiang 1 Liu, Yunwen 1 Ma, Sha 1 Mennink, Bart 1 Neven, Gregory 1 Nikova, Svetla Jordanova 1 Perrin, Léo 1 Peyrin, Thomas 1 Reyhanitabar, Reza 1 Rijmen, Vincent 1 Sakurai, Kouichi 1 Samsudin, Azman 1 Sarkar, Palash 1 Shamir, Adi 1 Su, Chunhua 1 Sun, Bing 1 Susilo, Willy 1 Teh, Jesen 1 Vaudenay, Serge 1 Vizár, Damian 1 Wang, Jiandong 1 Zhang, Jiang 1 Zhang, Wenying 1 Zhang, Zhenfeng Cited in 5 Serials 4 Journal of Cryptology 3 Designs, Codes and Cryptography 2 Information Sciences 1 Advances in Mathematics of Communications 1 Cryptography and Communications Cited in 2 Fields 19 Information and communication theory, circuits (94-XX) 4 Computer science (68-XX) Citations by Year