A Deeper Look at Machine Learning-Based Cryptanalysis.

David Gérault , Thomas Peyrin , Quan Quan Tan , Adrien Benamira
IACR Cryptology ePrint Archive 2021 287

45
2021
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study.

Zakaria Najm , Gaëtan Leurent , Thomas Peyrin , Vesselin Velichkov
the cryptographers’ track at the rsa conference 657 -681

2021
Cryptanalysis of CubeHash

Eric Brier , Thomas Peyrin
Applied Cryptography and Network Security 354 -368

1
2009
The Pairing Problem with User Interaction

Thomas Peyrin , Serge Vaudenay
information security conference 251 -265

7
2005
Collisions on SHA-0 in One Hour

Stéphane Manuel , Thomas Peyrin
fast software encryption 16 -35

57
2008
Cryptanalysis of Full RIPEMD-128

Franck Landelle , Thomas Peyrin
theory and application of cryptographic techniques 228 -244

13
2013
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

Tetsu Iwata , Mustafa Khairallah , Kazuhiko Minematsu , Thomas Peyrin
IACR Transactions on Symmetric Cryptology 2019 43 -120

3
2020
Optimizing Implementations of Lightweight Building Blocks

Jérémy Jean , Thomas Peyrin , Siang Meng Sim , Jade Tourteaux
IACR Transactions on Symmetric Cryptology 130 -168

93
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

Carlos Cid , Tao Huang , Thomas Peyrin , Yu Sasaki
IACR Transactions on Symmetric Cryptology 73 -107

39
SKINNY-AEAD and SKINNY-Hash

Christof Beierle , Jérémy Jean , Stefan Kölbl , Gregor Leander
IACR Transactions on Symmetric Cryptology 2020 88 -131

6
2020
Generic Related-Key Attacks for HMAC

Thomas Peyrin , Yu Sasaki , Lei Wang
Advances in Cryptology – ASIACRYPT 2012 580 -597

32
2012
The PHOTON family of lightweight Hash functions

Jian Guo , Thomas Peyrin , Axel Poschmann
international cryptology conference 2011 222 -239

327
2011
Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey

Mustafa Khairallah , Zakaria Najm , Anupam Chattopadhyay , Thomas Peyrin
international conference on embedded computer systems architectures modeling and simulation 167 -172

1
2018
Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption

Mustafa Khairallah , Anupam Chattopadhyay , Thomas Peyrin
international conference on cryptology in india 282 -301

7
2017
Advances in Alternative Non-adjacent Form Representations

Gildas Avoine , Jean Monnerat , Thomas Peyrin
Progress in Cryptology - INDOCRYPT 2004 3348 260 -274

12
2004
Generic Universal Forgery Attack on Iterative Hash-Based MACs

Thomas Peyrin , Lei Wang
theory and application of cryptographic techniques 147 -164

18
2014
A Very Compact FPGA Implementation of LED and PHOTON

N. Nalla Anandakumar , Thomas Peyrin , Axel Poschmann
international conference on cryptology in india 304 -321

42
2014
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function

Jian Guo , Jérémy Jean , Gaëtan Leurent , Thomas Peyrin
selected areas in cryptography 2014 195 -211

12
2014
Updates on Generic Attacks against HMAC and NMAC

Jian Guo , Thomas Peyrin , Yu Sasaki , Lei Wang
Advances in Cryptology – CRYPTO 2014 131 -148

16
2014
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison

Khoongming Khoo , Thomas Peyrin , Axel Y. Poschmann , Huihui Yap
cryptographic hardware and embedded systems 433 -450

39
2014