Gaëtan Leurent
Gaëtan Leurent
Verified email at inria.fr - Homepage
TitleCited byYear
LS-designs: Bitslice encryption for efficient masked software implementations
V Grosso, G Leurent, FX Standaert, K Varıcı
International Workshop on Fast Software Encryption, 18-37, 2014
1292014
MD4 is not one-way
G Leurent
Fast Software Encryption, 412-428, 2008
1212008
On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN
K Bhargavan, G Leurent
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1062016
An analysis of the XSL algorithm
C Cid, G Leurent
International Conference on the Theory and Application of Cryptology and …, 2005
1012005
Breaking symmetric cryptosystems using quantum period finding
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
Annual International Cryptology Conference, 207-237, 2016
892016
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
PA Fouque, G Leurent, PQ Nguyen
Annual International Cryptology Conference, 13-30, 2007
822007
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH
K Bhargavan, G Leurent
752016
Narrow-Bicliques: cryptanalysis of full IDEA
D Khovratovich, G Leurent, C Rechberger
Annual International Conference on the Theory and Applications of …, 2012
662012
How risky is the random-oracle model?
G Leurent, PQ Nguyen
Annual International Cryptology Conference, 445-464, 2009
582009
Message freedom in MD4 and MD5 collisions: Application to APOP
G Leurent
International Workshop on Fast Software Encryption, 309-328, 2007
562007
SCREAM & iSCREAM side-channel resistant authenticated encryption with masking
V Grosso, G Leurent, FX Standaert, K Varici, F Durvaux, L Gaspar, ...
Submission to CAESAR, 2014
41*2014
Construction of differential characteristics in ARX designs application to Skein
G Leurent
Annual Cryptology Conference, 241-258, 2013
412013
SIMD is a message digest
G Leurent, C Bouillaguet, PA Fouque
Submission to NIST (round 2), 2009
402009
Construction of lightweight S-boxes using Feistel and MISTY structures
A Canteaut, S Duval, G Leurent
International Conference on Selected Areas in Cryptography, 373-393, 2015
39*2015
Analysis of differential attacks in ARX constructions
G Leurent
International Conference on the Theory and Application of Cryptology and …, 2012
372012
New generic attacks against hash-based MACs
G Leurent, T Peyrin, L Wang
International Conference on the Theory and Application of Cryptology and …, 2013
342013
Collision attacks against CAESAR candidates
T Fuhr, G Leurent, V Suder
International Conference on the Theory and Application of Cryptology and …, 2015
33*2015
Another look at complementation properties
C Bouillaguet, O Dunkelman, G Leurent, PA Fouque
Fast Software Encryption, 347-364, 2010
29*2010
Quantum differential and linear cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
IACR Transactions on Symmetric Cryptology 2016 (1), 71-94, 2016
262016
Cryptanalysis of Feistel networks with secret round functions
A Biryukov, G Leurent, L Perrin
International Conference on Selected Areas in Cryptography, 102-121, 2015
242015
The system can't perform the operation now. Try again later.
Articles 1–20