| A deeper look at machine learning-based cryptanalysis A Benamira, D Gerault, T Peyrin, QQ Tan Annual international conference on the theory and applications of …, 2021 | 175 | 2021 |
| Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR transactions on symmetric cryptology, 281-306, 2017 | 103 | 2017 |
| Constraint programming models for chosen key differential cryptanalysis D Gerault, M Minier, C Solnon International conference on principles and practice of constraint …, 2016 | 85 | 2016 |
| Revisiting AES related-key differential attacks with constraint programming D Gérault, P Lafourcade, M Minier, C Solnon Information Processing Letters 139, 24-29, 2018 | 59 | 2018 |
| A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 54 | 2017 |
| Computing AES related-key differential characteristics with constraint programming D Gérault, P Lafourcade, M Minier, C Solnon Artificial intelligence 278, 103183, 2020 | 46 | 2020 |
| Exploring differential-based distinguishers and forgeries for ASCON D Gérault, T Peyrin, QQ Tan IACR Transactions on Symmetric Cryptology, 102-136, 2021 | 36 | 2021 |
| Related-key cryptanalysis of midori D Gérault, P Lafourcade International Conference on Cryptology in India, 287-304, 2016 | 35 | 2016 |
| Survey of distance bounding protocols and threats A Brelurut, D Gerault, P Lafourcade International symposium on foundations and practice of security, 29-49, 2015 | 35 | 2015 |
| A cipher-agnostic neural training pipeline with automated finding of good input differences E Bellini, D Gerault, A Hambitzer, M Rossi IACR Transactions on Symmetric Cryptology 2023 (3), 184-212, 2023 | 33 | 2023 |
| Fully automated differential-linear attacks against ARX ciphers E Bellini, D Gérault, J Grados, RH Makarim, T Peyrin Cryptographers’ Track at the RSA Conference, 252-276, 2023 | 33 | 2023 |
| Boosting differential-linear cryptanalysis of ChaCha7 with MILP E Bellini, D Gerault, J Grados, RH Makarim, T Peyrin IACR Transactions on Symmetric Cryptology 2023 (2), 189-223, 2023 | 31 | 2023 |
| A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 28 | 2016 |
| CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives E Bellini, D Gerault, J Grados, YJ Huang, R Makarim, M Rachidi, S Tiwari International Conference on Selected Areas in Cryptography, 387-408, 2023 | 25 | 2023 |
| On the usage of deterministic (related-key) truncated differentials and multidimensional linear approximations for SPN ciphers L Sun, D Gerault, W Wang, M Wang IACR Transactions on Symmetric Cryptology, 262-287, 2020 | 22 | 2020 |
| Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives E Bellini, A De Piccoli, M Formenti, D Gerault, P Huynh, S Pelizzola, ... International Conference on cryptology and network security, 268-292, 2023 | 20 | 2023 |
| Verifiable private polynomial evaluation X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade International Conference on Provable Security, 487-506, 2017 | 20 | 2017 |
| From relay attacks to distance-bounding protocols G Avoine, I Boureanu, D Gérault, GP Hancke, P Lafourcade, C Onete Security of Ubiquitous Computing Systems: Selected Topics, 113-130, 2021 | 14 | 2021 |
| Neurogift: Using a machine learning based sat solver for cryptanalysis L Sun, D Gerault, A Benamira, T Peyrin International Symposium on Cyber Security Cryptography and Machine Learning …, 2020 | 14 | 2020 |
| Claasping ARADI: automated analysis of the ARADI block cipher E Bellini, M Formenti, D Gérault, J Grados, A Hambitzer, Y Ju Huang, ... International Conference on Cryptology in India, 90-113, 2024 | 13 | 2024 |