[go: up one dir, main page]

Follow
Patrick Derbez
Patrick Derbez
University of Rennes
Verified email at irisa.fr - Homepage
Title
Cited by
Cited by
Year
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
P Derbez, PA Fouque, J Jean
Annual International Conference on the Theory and Applications of …, 2013
2682013
Automatic search of attacks on round-reduced AES and applications
C Bouillaguet, P Derbez, PA Fouque
Annual Cryptology Conference, 169-187, 2011
1322011
Exhausting Demirci-Selçuk meet-in-the-middle attacks against reduced-round AES
P Derbez, PA Fouque
International workshop on fast software encryption, 541-560, 2013
922013
Automatic search of meet-in-the-middle and impossible differential attacks
P Derbez, PA Fouque
Annual International Cryptology Conference, 157-184, 2016
872016
Low-data complexity attacks on AES
C Bouillaguet, P Derbez, O Dunkelman, PA Fouque, N Keller, V Rijmen
IEEE transactions on information theory 58 (11), 7002-7017, 2012
842012
Meet-in-the-middle and impossible differential fault analysis on AES
P Derbez, PA Fouque, D Leresteux
International Workshop on Cryptographic Hardware and Embedded Systems, 274-291, 2011
782011
Key-recovery attacks on ASASA
B Minaud, P Derbez, PA Fouque, P Karpman
Journal of Cryptology 31 (3), 845-884, 2018
772018
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and …, 2018
702018
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
P Derbez, L Perrin
International Workshop on Fast Software Encryption, 190-216, 2015
672015
Catching the fastest boomerangs: Application to SKINNY
S Delaune, P Derbez, M Vavrille
IACR Transactions on Symmetric Cryptology, 104-129, 2020
662020
Differential analysis and meet-in-the-middle attack against round-reduced TWINE
A Biryukov, P Derbez, L Perrin
International Workshop on Fast Software Encryption, 3-27, 2015
542015
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
C Beierle, P Derbez, G Leander, G Leurent, H Raddum, Y Rotella, ...
Annual International Conference on the Theory and Applications of …, 2021
472021
On recovering affine encodings in white-box implementations
P Derbez, PA Fouque, B Lambin, B Minaud
IACR Transactions on Cryptographic Hardware and Embedded Systems, 121-149, 2018
402018
Differential meet-in-the-middle cryptanalysis
C Boura, N David, P Derbez, G Leander, M Naya-Plasencia
Annual International Cryptology Conference, 240-272, 2023
392023
Linearly equivalent s-boxes and the division property
B Lambin, P Derbez, PA Fouque
Designs, Codes and Cryptography 88 (10), 2207-2231, 2020
332020
Increasing precision of division property
P Derbez, PA Fouque
IACR Transactions on Symmetric Cryptology, 173-194, 2020
262020
Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
H Hadipour, P Derbez, M Eichlseder
Annual International Cryptology Conference, 38-72, 2024
252024
Revisiting related-key boomerang attacks on AES using computer-aided tool
P Derbez, M Euler, PA Fouque, PH Nguyen
International Conference on the Theory and Application of Cryptology and …, 2022
242022
Efficient methods to search for best differential characteristics on SKINNY
S Delaune, P Derbez, P Huynh, M Minier, V Mollimard, C Prud’Homme
International Conference on Applied Cryptography and Network Security, 184-207, 2021
24*2021
Efficient search for optimal diffusion layers of generalized feistel networks
P Derbez, PA Fouque, B Lambin, V Mollimard
IACR Transactions on Symmetric Cryptology, 218-240, 2019
242019
The system can't perform the operation now. Try again later.
Articles 1–20