Author of the publication

Collision Attacks against CAESAR Candidates - Forgery and Key-Recovery against AEZ and Marble.

, , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Leurent, Gaëtan
add a person with the name Leurent, Gaëtan
 

Other publications of authors with the same name

How Risky is the Random-Oracle Model?, and . IACR Cryptology ePrint Archive, (2008)Cryptanalysis of the "Kindle" Cipher., , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 86-103. Springer, (2012)Security Analysis of SIMD., , and . Selected Areas in Cryptography, volume 6544 of Lecture Notes in Computer Science, page 351-368. Springer, (2010)New Insights on Impossible Differential Cryptanalysis., , , and . Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 243-259. Springer, (2011)The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function., , , , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 195-211. Springer, (2014)New Generic Attacks against Hash-Based MACs., , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 1-20. Springer, (2013)Cryptanalysis of MORUS., , , , , , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 35-64. Springer, (2018)An Analysis of the XSL Algorithm., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 333-352. Springer, (2005)Another Look at Complementation Properties., , , and . FSE, volume 6147 of Lecture Notes in Computer Science, page 347-364. Springer, (2010)Key Recovery Attack Against 2.5-Round -Cipher., , , , , , and . FSE, volume 9783 of Lecture Notes in Computer Science, page 535-553. Springer, (2016)