Patrick Derbez
Patrick Derbez
Université Rennes 1
Verified email at irisa.fr
TitleCited byYear
Improved key recovery attacks on reduced-round AES in the single-key setting
P Derbez, PA Fouque, J Jean
Annual International Conference on the Theory and Applications of …, 2013
1232013
Automatic search of attacks on round-reduced AES and applications
C Bouillaguet, P Derbez, PA Fouque
Annual Cryptology Conference, 169-187, 2011
672011
Low-data complexity attacks on AES
C Bouillaguet, P Derbez, O Dunkelman, PA Fouque, N Keller, V Rijmen
IEEE Transactions on Information Theory 58 (11), 7002-7017, 2012
582012
Meet-in-the-middle and impossible differential fault analysis on AES
P Derbez, PA Fouque, D Leresteux
International Workshop on Cryptographic Hardware and Embedded Systems, 274-291, 2011
392011
Exhausting Demirci-Selçuk meet-in-the-middle attacks against reduced-round AES
P Derbez, PA Fouque
International Workshop on Fast Software Encryption, 541-560, 2013
362013
Key-Recovery Attacks on ASASA
B Minaud, P Derbez, PA Fouque, P Karpman
Journal of Cryptology 31 (3), 845-884, 2018
332018
Differential analysis and meet-in-the-middle attack against round-reduced TWINE
A Biryukov, P Derbez, L Perrin
International Workshop on Fast Software Encryption, 3-27, 2015
272015
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
P Derbez, L Perrin
International Workshop on Fast Software Encryption, 190-216, 2015
232015
Automatic search of meet-in-the-middle and impossible differential attacks
P Derbez, PA Fouque
Annual International Cryptology Conference, 157-184, 2016
212016
Faster Chosen-Key Distinguishers on Reduced-Round AES
P Derbez, PA Fouque, J Jean
International Conference on Cryptology in India, 225-243, 2012
142012
Simulating the migration and growth patterns of Bacillus subtilis
M Badoual, P Derbez, M Aubert, B Grammaticos
Physica A: Statistical Mechanics and its Applications 388 (4), 549-559, 2009
112009
Note on impossible differential attacks
P Derbez
International Conference on Fast Software Encryption, 416-427, 2016
82016
Meet-in-the-middle attacks on AES
P Derbez
72013
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and …, 2018
42018
On Recovering Affine Encodings in White-Box Implementations
P Derbez, PA Fouque, B Lambin, B Minaud
IACR Transactions on Cryptographic Hardware and Embedded Systems, 121-149, 2018
22018
Variants of the AES Key Schedule for Better Truncated Differential Bounds
P Derbez, PA Fouque, J Jean, B Lambin
International Conference on Selected Areas in Cryptography, 27-49, 2018
12018
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
P Derbez, PA Fouque, B Lambin, V Mollimard
IACR Transactions on Symmetric Cryptology, 218-240, 2019
2019
Troika: a ternary cryptographic hash function
S Kölbl, E Tischhauser, P Derbez, A Bogdanov
Designs, Codes and Cryptography, 1-27, 2019
2019
Linearly equivalent S-boxes and the Division Property.
P Derbez, PA Fouque, B Lambin
IACR Cryptology ePrint Archive 2019, 97, 2019
2019
Cryptanalysis of AES-PRF and Its Dual
P Derbez, T Iwata, L Sun, S Sun, Y Todo, H Wang, M Wang
IACR Transactions on Symmetric Cryptology, 161-191, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20