[go: up one dir, main page]

Follow
David GERAULT
David GERAULT
Technology Innovation Institute (TII)
Verified email at tii.ae
Title
Cited by
Cited by
Year
A deeper look at machine learning-based cryptanalysis
A Benamira, D Gerault, T Peyrin, QQ Tan
Annual international conference on the theory and applications of …, 2021
1752021
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology, 281-306, 2017
1032017
Constraint programming models for chosen key differential cryptanalysis
D Gerault, M Minier, C Solnon
International conference on principles and practice of constraint …, 2016
852016
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
592018
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
542017
Computing AES related-key differential characteristics with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Artificial intelligence 278, 103183, 2020
462020
Exploring differential-based distinguishers and forgeries for ASCON
D Gérault, T Peyrin, QQ Tan
IACR Transactions on Symmetric Cryptology, 102-136, 2021
362021
Related-key cryptanalysis of midori
D Gérault, P Lafourcade
International Conference on Cryptology in India, 287-304, 2016
352016
Survey of distance bounding protocols and threats
A Brelurut, D Gerault, P Lafourcade
International symposium on foundations and practice of security, 29-49, 2015
352015
A cipher-agnostic neural training pipeline with automated finding of good input differences
E Bellini, D Gerault, A Hambitzer, M Rossi
IACR Transactions on Symmetric Cryptology 2023 (3), 184-212, 2023
332023
Fully automated differential-linear attacks against ARX ciphers
E Bellini, D Gérault, J Grados, RH Makarim, T Peyrin
Cryptographers’ Track at the RSA Conference, 252-276, 2023
332023
Boosting differential-linear cryptanalysis of ChaCha7 with MILP
E Bellini, D Gerault, J Grados, RH Makarim, T Peyrin
IACR Transactions on Symmetric Cryptology 2023 (2), 189-223, 2023
312023
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
282016
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives
E Bellini, D Gerault, J Grados, YJ Huang, R Makarim, M Rachidi, S Tiwari
International Conference on Selected Areas in Cryptography, 387-408, 2023
252023
On the usage of deterministic (related-key) truncated differentials and multidimensional linear approximations for SPN ciphers
L Sun, D Gerault, W Wang, M Wang
IACR Transactions on Symmetric Cryptology, 262-287, 2020
222020
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives
E Bellini, A De Piccoli, M Formenti, D Gerault, P Huynh, S Pelizzola, ...
International Conference on cryptology and network security, 268-292, 2023
202023
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
202017
From relay attacks to distance-bounding protocols
G Avoine, I Boureanu, D Gérault, GP Hancke, P Lafourcade, C Onete
Security of Ubiquitous Computing Systems: Selected Topics, 113-130, 2021
142021
Neurogift: Using a machine learning based sat solver for cryptanalysis
L Sun, D Gerault, A Benamira, T Peyrin
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
142020
Claasping ARADI: automated analysis of the ARADI block cipher
E Bellini, M Formenti, D Gérault, J Grados, A Hambitzer, Y Ju Huang, ...
International Conference on Cryptology in India, 90-113, 2024
132024
The system can't perform the operation now. Try again later.
Articles 1–20