|
Search the dblp DataBase
Thomas Peyrin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw
Combining Compression Functions and Block Cipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2006, pp:315-331 [Conf]
- Frédéric Muller, Thomas Peyrin
Linear Cryptanalysis of the TSC Family of Stream Ciphers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:373-394 [Conf]
- Frédéric Muller, Thomas Peyrin
Cryptanalysis of T-Function-Based Hash Functions. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:267-285 [Conf]
- Gildas Avoine, Jean Monnerat, Thomas Peyrin
Advances in Alternative Non-adjacent Form Representations. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:260-274 [Conf]
- Thomas Peyrin, Serge Vaudenay
The Pairing Problem with User Interaction. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:251-266 [Conf]
- Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin
On Building Hash Functions from Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:82-95 [Conf]
- Thomas Peyrin
Cryptanalysis of Grindahl. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:551-567 [Conf]
- Antoine Joux, Thomas Peyrin
Hash Functions and the (Amplified) Boomerang Attack. [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:244-263 [Conf]
- Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk
Cryptanalysis of FORK-256. [Citation Graph (0, 0)][DBLP] FSE, 2007, pp:19-38 [Conf]
- Yannick Seurin, Thomas Peyrin
Security Analysis of Constructions Combining FIL Random Oracles. [Citation Graph (0, 0)][DBLP] FSE, 2007, pp:119-136 [Conf]
Inside the Hypercube. [Citation Graph (, )][DBLP]
Cryptanalysis of CubeHash. [Citation Graph (, )][DBLP]
Slide Attacks on a Class of Hash Functions. [Citation Graph (, )][DBLP]
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. [Citation Graph (, )][DBLP]
Side-Channel Analysis of Six SHA-3 Candidates. [Citation Graph (, )][DBLP]
Improved Differential Attacks for ECHO and Grøstl. [Citation Graph (, )][DBLP]
Cryptanalysis of RadioGatún. [Citation Graph (, )][DBLP]
Cryptanalysis of ESSENCE. [Citation Graph (, )][DBLP]
Collisions on SHA-0 in One Hour. [Citation Graph (, )][DBLP]
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. [Citation Graph (, )][DBLP]
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. [Citation Graph (, )][DBLP]
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. [Citation Graph (, )][DBLP]
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|