The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas Peyrin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw
    Combining Compression Functions and Block Cipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:315-331 [Conf]
  2. Frédéric Muller, Thomas Peyrin
    Linear Cryptanalysis of the TSC Family of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:373-394 [Conf]
  3. Frédéric Muller, Thomas Peyrin
    Cryptanalysis of T-Function-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:267-285 [Conf]
  4. Gildas Avoine, Jean Monnerat, Thomas Peyrin
    Advances in Alternative Non-adjacent Form Representations. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:260-274 [Conf]
  5. Thomas Peyrin, Serge Vaudenay
    The Pairing Problem with User Interaction. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:251-266 [Conf]
  6. Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin
    On Building Hash Functions from Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:82-95 [Conf]
  7. Thomas Peyrin
    Cryptanalysis of Grindahl. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:551-567 [Conf]
  8. Antoine Joux, Thomas Peyrin
    Hash Functions and the (Amplified) Boomerang Attack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:244-263 [Conf]
  9. Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk
    Cryptanalysis of FORK-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:19-38 [Conf]
  10. Yannick Seurin, Thomas Peyrin
    Security Analysis of Constructions Combining FIL Random Oracles. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:119-136 [Conf]

  11. Inside the Hypercube. [Citation Graph (, )][DBLP]


  12. Cryptanalysis of CubeHash. [Citation Graph (, )][DBLP]


  13. Slide Attacks on a Class of Hash Functions. [Citation Graph (, )][DBLP]


  14. Linearization Framework for Collision Attacks: Application to CubeHash and MD6. [Citation Graph (, )][DBLP]


  15. Side-Channel Analysis of Six SHA-3 Candidates. [Citation Graph (, )][DBLP]


  16. Improved Differential Attacks for ECHO and Grøstl. [Citation Graph (, )][DBLP]


  17. Cryptanalysis of RadioGatún. [Citation Graph (, )][DBLP]


  18. Cryptanalysis of ESSENCE. [Citation Graph (, )][DBLP]


  19. Collisions on SHA-0 in One Hour. [Citation Graph (, )][DBLP]


  20. Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. [Citation Graph (, )][DBLP]


  21. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. [Citation Graph (, )][DBLP]


  22. How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. [Citation Graph (, )][DBLP]


  23. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002