| Security analysis of SHA-256 and sisters H Gilbert, H Handschuh International workshop on selected areas in cryptography, 175-193, 2003 | 583 | 2003 |
| Active attack against HB+: a provably secure lightweight authentication protocol H Gilbert, M Robshaw, H Sibert Electronics letters 41 (21), 1169-1170, 2005 | 435 | 2005 |
| Cryptanalysis of a white box AES implementation O Billet, H Gilbert, C Ech-Chatbi International workshop on selected areas in cryptography, 227-240, 2004 | 368 | 2004 |
| A Collision Attack on 7 Rounds of Rijndael. H Gilbert, M Minier AES candidate conference 230, 241, 2000 | 334 | 2000 |
| : Increasing the Security and Efficiency of H Gilbert, MJB Robshaw, Y Seurin Annual International Conference on the Theory and Applications of …, 2008 | 274 | 2008 |
| Super-Sbox cryptanalysis: improved attacks for AES-like permutations H Gilbert, T Peyrin International Workshop on Fast Software Encryption, 365-383, 2010 | 265 | 2010 |
| Sosemanuk, a Fast Software-Oriented Stream Cipher C Berbain, O Billet, A Canteaut, N Courtois, H Gilbert, L Goubin, A Gouget, ... New Stream Cipher Designs: The eSTREAM Finalists, 98-118, 2008 | 241 | 2008 |
| QUAD: A practical stream cipher with provable security C Berbain, H Gilbert, J Patarin Annual International Conference on the Theory and Applications of …, 2006 | 161 | 2006 |
| A known plaintext attack of FEAL-4 and FEAL-6 A Tardy-Corfdir, H Gilbert Annual International Cryptology Conference, 172-182, 1991 | 145 | 1991 |
| Cryptanalysis of grain C Berbain, H Gilbert, A Maximov International workshop on fast software encryption, 15-29, 2006 | 135 | 2006 |
| Good Variants of HB + Are Hard to Find H Gilbert, MJB Robshaw, Y Seurin International Conference on Financial Cryptography and Data Security, 156-170, 2008 | 122 | 2008 |
| How to encrypt with the LPN problem H Gilbert, MJB Robshaw, Y Seurin International Colloquium on Automata, Languages, and Programming, 679-690, 2008 | 118 | 2008 |
| Cryptanalysis of rainbow O Billet, H Gilbert International Conference on Security and Cryptography for Networks, 336-347, 2006 | 114 | 2006 |
| Sha-3 proposal: ECHO R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ... Submission to NIST (updated), 113, 2009 | 100 | 2009 |
| An efficient forward private RFID protocol C Berbain, O Billet, J Etrog, H Gilbert Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 86 | 2009 |
| The eSTREAM portfolio S Babbage, C Canniere, A Canteaut, C Cid, H Gilbert, T Johansson, ... eSTREAM, ECRYPT Stream Cipher Project, 1-6, 2008 | 82 | 2008 |
| A traceable block cipher O Billet, H Gilbert International Conference on the Theory and Application of Cryptology and …, 2003 | 76 | 2003 |
| Advances in Cryptology-EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 … H Gilbert Springer Science & Business Media, 2010 | 74 | 2010 |
| Assessment of the key-reuse resilience of NewHope A Bauer, H Gilbert, G Renault, M Rossi Cryptographers’ track at the RSA conference, 272-292, 2019 | 69 | 2019 |
| Multiple differential cryptanalysis of round-reduced PRINCE A Canteaut, T Fuhr, H Gilbert, M Naya-Plasencia, JR Reinhard International Workshop on Fast Software Encryption, 591-610, 2014 | 66 | 2014 |