Author of the publication

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1.

, and . IACR Cryptology ePrint Archive, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Leurent, Gaëtan
add a person with the name Leurent, Gaëtan
 

Other publications of authors with the same name

New Insights on Impossible Differential Cryptanalysis., , , and . Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 243-259. Springer, (2011)The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function., , , , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 195-211. Springer, (2014)Cryptanalysis of the "Kindle" Cipher., , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 86-103. Springer, (2012)Security Analysis of SIMD., , and . Selected Areas in Cryptography, volume 6544 of Lecture Notes in Computer Science, page 351-368. Springer, (2010)Another Look at Complementation Properties., , , and . FSE, volume 6147 of Lecture Notes in Computer Science, page 347-364. Springer, (2010)Key Recovery Attack Against 2.5-Round -Cipher., , , , , , and . FSE, volume 9783 of Lecture Notes in Computer Science, page 535-553. Springer, (2016)Hardware Implementation and Side-Channel Analysis of Lapin., , and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 206-226. Springer, (2014)New Generic Attacks against Hash-Based MACs., , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 1-20. Springer, (2013)Cryptanalysis of MORUS., , , , , , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 35-64. Springer, (2018)An Analysis of the XSL Algorithm., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 333-352. Springer, (2005)