×

zbMATH — the first resource for mathematics

Leurent, Gaëtan

Compute Distance To:
Author ID: leurent.gaetan Recent zbMATH articles by "Leurent, Gaëtan"
Published as: Leurent, Gaëan; Leurent, Gaëtan
Documents Indexed: 45 Publications since 2005

Publications by Year

Citations contained in zbMATH

30 Publications have been cited 133 times in 110 Documents Cited by Year
MD4 is not one-way. Zbl 1154.68400
Leurent, Gaëtan
18
2008
LS-designs: bitslice encryption for efficient masked software implementations. Zbl 1382.94111
Grosso, Vincent; Leurent, Gaëtan; Standaert, François-Xavier; Varıcı, Kerem
16
2015
Breaking symmetric cryptosystems using quantum period finding. Zbl 1391.94766
Kaplan, Marc; Leurent, Gaëtan; Leverrier, Anthony; Naya-Plasencia, María
8
2016
How risky is the random-oracle model? Zbl 1252.94082
Leurent, Gaëtan; Nguyen, Phong Q.
8
2009
Another look at complementation properties. Zbl 1279.94055
Bouillaguet, Charles; Dunkelman, Orr; Leurent, Gaëtan; Fouque, Pierre-Alain
7
2010
Narrow-bicliques: cryptanalysis of full IDEA. Zbl 1297.94079
Khovratovich, Dmitry; Leurent, Gaëtan; Rechberger, Christian
6
2012
Attacks on hash functions based on Generalized Feistel: application to reduced-round Lesamnta and SHAvite-3\(_{512}\). Zbl 1290.94047
Bouillaguet, Charles; Dunkelman, Orr; Leurent, Gaëan; Fouque, Pierre-Alain
6
2011
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. Zbl 1215.94046
Fouque, Pierre-Alain; Leurent, Gaëtan; Nguyen, Phong Q.
6
2007
An analysis of the XSL algorithm. Zbl 1154.94384
Cid, Carlos; Leurent, Gaëtan
6
2005
Construction of lightweight S-boxes using Feistel and MISTY structures. Zbl 1396.94064
Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan
5
2016
Construction of differential characteristics in ARX designs application to Skein. Zbl 1310.94160
Leurent, Gaëtan
5
2013
Cryptanalysis of Feistel networks with secret round functions. Zbl 1396.94060
Biryukov, Alex; Leurent, Gaëtan; Perrin, Léo
4
2016
Analysis of differential attacks in ARX constructions. Zbl 1292.94098
Leurent, Gaëtan
4
2012
Boomerang attacks on hash function using auxiliary differentials. Zbl 1292.94099
Leurent, Gaëtan; Roy, Arnab
4
2012
Cryptanalysis of the 10-round hash and full compression function of SHAvite-3-512. Zbl 1284.94075
Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian; Naya-Plasencia, María; Peyrin, Thomas; Rechberger, Christian; Schläffer, Martin
4
2010
Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble. Zbl 1382.94105
Fuhr, Thomas; Leurent, Gaëtan; Suder, Valentin
3
2015
New generic attacks against hash-based MACs. Zbl 1314.94083
Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
3
2013
Message freedom in MD4 and MD5 collisions: Application to APOP. Zbl 1186.94457
Leurent, Gaëtan
3
2007
Differential forgery attack against LAC. Zbl 1396.94088
Leurent, Gaëtan
2
2016
SPRING: fast pseudorandom functions from rounded ring products. Zbl 1382.94056
Banerjee, Abhishek; Brenner, Hai; Leurent, Gaëtan; Peikert, Chris; Rosen, Alon
2
2015
Improved generic attacks against hash-based MACs and HAIFA. Zbl 1343.94047
Dinur, Itai; Leurent, Gaëtan
2
2014
Hardware implementation and side-channel analysis of Lapin. Zbl 1337.94096
Gaspar, Lubos; Leurent, Gaëtan; Standaert, François-Xavier
2
2014
Cryptanalysis of a hash function based on quasi-cyclic codes. Zbl 1159.94360
Fouque, Pierre-Alain; Leurent, Gaëtan
2
2008
Generic attacks against beyond-birthday-bound MACs. Zbl 1444.94084
Leurent, Gaëtan; Nandi, Mridul; Sibleyras, Ferdinand
1
2018
Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. Zbl 1384.94079
Leurent, Gaëtan
1
2016
The sum can be weaker than each part. Zbl 1370.94526
Leurent, Gaëtan; Wang, Lei
1
2015
Cryptanalysis of Widea. Zbl 1321.94073
Leurent, Gaëtan
1
2014
FPGA implementations of SPRING and their countermeasures against side-channel attacks. Zbl 1396.94063
Brenner, Hai; Gaspar, Lubos; Leurent, Gaëtan; Rosen, Alon; Standaert, François-Xavier
1
2014
New insights on impossible differential cryptanalysis. Zbl 1292.94037
Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Leurent, Gaëtan
1
2012
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. Zbl 1178.94196
Leurent, Gaëtan
1
2008
Generic attacks against beyond-birthday-bound MACs. Zbl 1444.94084
Leurent, Gaëtan; Nandi, Mridul; Sibleyras, Ferdinand
1
2018
Breaking symmetric cryptosystems using quantum period finding. Zbl 1391.94766
Kaplan, Marc; Leurent, Gaëtan; Leverrier, Anthony; Naya-Plasencia, María
8
2016
Construction of lightweight S-boxes using Feistel and MISTY structures. Zbl 1396.94064
Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan
5
2016
Cryptanalysis of Feistel networks with secret round functions. Zbl 1396.94060
Biryukov, Alex; Leurent, Gaëtan; Perrin, Léo
4
2016
Differential forgery attack against LAC. Zbl 1396.94088
Leurent, Gaëtan
2
2016
Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. Zbl 1384.94079
Leurent, Gaëtan
1
2016
LS-designs: bitslice encryption for efficient masked software implementations. Zbl 1382.94111
Grosso, Vincent; Leurent, Gaëtan; Standaert, François-Xavier; Varıcı, Kerem
16
2015
Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble. Zbl 1382.94105
Fuhr, Thomas; Leurent, Gaëtan; Suder, Valentin
3
2015
SPRING: fast pseudorandom functions from rounded ring products. Zbl 1382.94056
Banerjee, Abhishek; Brenner, Hai; Leurent, Gaëtan; Peikert, Chris; Rosen, Alon
2
2015
The sum can be weaker than each part. Zbl 1370.94526
Leurent, Gaëtan; Wang, Lei
1
2015
Improved generic attacks against hash-based MACs and HAIFA. Zbl 1343.94047
Dinur, Itai; Leurent, Gaëtan
2
2014
Hardware implementation and side-channel analysis of Lapin. Zbl 1337.94096
Gaspar, Lubos; Leurent, Gaëtan; Standaert, François-Xavier
2
2014
Cryptanalysis of Widea. Zbl 1321.94073
Leurent, Gaëtan
1
2014
FPGA implementations of SPRING and their countermeasures against side-channel attacks. Zbl 1396.94063
Brenner, Hai; Gaspar, Lubos; Leurent, Gaëtan; Rosen, Alon; Standaert, François-Xavier
1
2014
Construction of differential characteristics in ARX designs application to Skein. Zbl 1310.94160
Leurent, Gaëtan
5
2013
New generic attacks against hash-based MACs. Zbl 1314.94083
Leurent, Gaëtan; Peyrin, Thomas; Wang, Lei
3
2013
Narrow-bicliques: cryptanalysis of full IDEA. Zbl 1297.94079
Khovratovich, Dmitry; Leurent, Gaëtan; Rechberger, Christian
6
2012
Analysis of differential attacks in ARX constructions. Zbl 1292.94098
Leurent, Gaëtan
4
2012
Boomerang attacks on hash function using auxiliary differentials. Zbl 1292.94099
Leurent, Gaëtan; Roy, Arnab
4
2012
New insights on impossible differential cryptanalysis. Zbl 1292.94037
Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Leurent, Gaëtan
1
2012
Attacks on hash functions based on Generalized Feistel: application to reduced-round Lesamnta and SHAvite-3\(_{512}\). Zbl 1290.94047
Bouillaguet, Charles; Dunkelman, Orr; Leurent, Gaëan; Fouque, Pierre-Alain
6
2011
Another look at complementation properties. Zbl 1279.94055
Bouillaguet, Charles; Dunkelman, Orr; Leurent, Gaëtan; Fouque, Pierre-Alain
7
2010
Cryptanalysis of the 10-round hash and full compression function of SHAvite-3-512. Zbl 1284.94075
Gauravaram, Praveen; Leurent, Gaëtan; Mendel, Florian; Naya-Plasencia, María; Peyrin, Thomas; Rechberger, Christian; Schläffer, Martin
4
2010
How risky is the random-oracle model? Zbl 1252.94082
Leurent, Gaëtan; Nguyen, Phong Q.
8
2009
MD4 is not one-way. Zbl 1154.68400
Leurent, Gaëtan
18
2008
Cryptanalysis of a hash function based on quasi-cyclic codes. Zbl 1159.94360
Fouque, Pierre-Alain; Leurent, Gaëtan
2
2008
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. Zbl 1178.94196
Leurent, Gaëtan
1
2008
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. Zbl 1215.94046
Fouque, Pierre-Alain; Leurent, Gaëtan; Nguyen, Phong Q.
6
2007
Message freedom in MD4 and MD5 collisions: Application to APOP. Zbl 1186.94457
Leurent, Gaëtan
3
2007
An analysis of the XSL algorithm. Zbl 1154.94384
Cid, Carlos; Leurent, Gaëtan
6
2005
all top 5

Cited by 224 Authors

13 Sasaki, Yu
8 Leurent, Gaëtan
6 Leander, Gregor
5 Dunkelman, Orr
5 Liu, Yunwen
5 Mendel, Florian
5 Rijmen, Vincent
4 Aoki, Kazumaro
4 Biryukov, Alex
4 Fouque, Pierre-Alain
4 Rechberger, Christian
4 Shamir, Adi
4 Wang, Gaoli
4 Wang, Xiaoyun
3 Albrecht, Martin R.
3 Beierle, Christof
3 Blondeau, Celine
3 Bouillaguet, Charles
3 Dinur, Itai
3 Keller, Nathan
3 Li, Chao
3 Naya-Plasencia, María
3 Nyberg, Kaisa
3 Perrin, Léo
3 Shibutani, Kyoji
3 Standaert, Francois-Xavier
3 Sun, Bing
3 Wang, Lei
3 Yasuda, Kan
3 Yu, Hongbo
2 Biham, Eli
2 Bogdanov, Andrey
2 Boura, Christina
2 Canteaut, Anne
2 Cash, David M.
2 Chew, Guanhan
2 Choy, Jiali
2 Faust, Sebastian
2 Guo, Jian
2 Journault, Anthony
2 Karakoç, Ferhat
2 Katz, Jonathan N.
2 Khoo, Khoongming
2 Kiltz, Eike
2 Kircanski, Aleksandar
2 Knudsen, Lars Ramkilde
2 Liu, Guoqiang
2 Nandi, Mridul
2 Nikolić, Ivica
2 Paul, Goutam
2 Peyrin, Thomas
2 Preneel, Bart
2 Seo, Jae Hong
2 Soleimany, Hadi
2 Todo, Yosuke
2 Udovenko, Aleksei
2 Velichkov, Vesselin
2 Wu, Shuang
2 Wu, Wenling
2 Yap, Huihui Yap
2 Youssef, Amr M.
1 Abdullah, Rosni
1 Alagic, Gorjan
1 Almazrooie, Mishal
1 AlTawy, Riham
1 Andreeva, Elena Anatol’evna
1 Aumasson, Jean-Philippe
1 Bansal, Tarun Kumar
1 Bao, Zhenzhen
1 Bar-On, Achiya
1 Barthe, Gilles
1 Bay, Asli
1 Bernstein, Daniel Julius
1 Boháček, Milan
1 Brickenstein, Michael
1 Bulygin, Stanislav V.
1 Cao, Meichun
1 Chakraborti, Avik
1 Chang, Donghoon
1 Chen, Jiazhe
1 Chen, Jie
1 Chen, Shiwei
1 Cid, Carlos Frederico
1 Cui, Binbin
1 Cui, Ting
1 Demirci, Hüseyin
1 Derbez, Patrick
1 Dhar, Shalini
1 Dinu, Daniel
1 Dobraunig, Christoph
1 Doi, Norihisa
1 Dong, Bingyou
1 Dong, Le
1 Dong, Xiaoyang
1 Dupressoir, François
1 Dutta, Avijit
1 Duval, Sébastien
1 Dwivedi, Ashutosh Dhar
1 Dziembowski, Stefan
1 Ersoy, Oğuzhan
...and 124 more Authors

Citations by Year