2025
- E. Bellini, D. Gerault, J. Grados and T. Peyrin
“The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs”
in Topics in Cryptology - CT-RSA 2025
2024
-
K. Hu, M. Khairallah, T. Peyrin and Q. Q. Tan
“uKNIT: Breaking Round-alignment for Cipher Design – Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher” -
B. Cogliati, J. Jean, T. Peyrin and Y. Seurin
“A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers”
in IACR Communications in Cryptology CiC 2024-2 -
A. Benamira, T. Peyrin, T. Yap, T. Guérand and B. Hooi “Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form”
in International Joint Conference on Artificial Intelligence - IJCAI 2024 -
A. Bariant, J. Baudrin, G. Leurent, C. Pernot, L. Perrin and T. Peyrin “Fast AES-based Universal Hash Functions and MACs - Featuring LeMac and PetitMac”
in Fast Software Encryption - FSE 2024 and IACR Transactions on Symmetric Cryptology - ToSC 2024-2
2023
-
A. Benamira, T. Guérand, T. Peyrin amd S. Saha
“TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture” -
K. Hu, T. Peyrin, Q.Q. Tan and T. Yap
“Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective”
in Advances in Cryptology - ASIACRYPT 2023 -
A. Benamira, T. Guérand and T. Peyrin
“A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making”
in International Conference on AI in Medicine - iAIM 2023 -
A. Benamira, T. Guérand, T. Peyrin and H. Soegeng
“Neural Network-Based Rule Models With Truth Tables”
in European Conference on Artificial Intelligence - ECAI 2023 -
E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin
“Boosting differential-linear cryptanalysis of ChaCha7 with MILP”
in Fast Software Encryption - FSE 2024 and IACR Transactions on Symmetric Cryptology - ToSC 2023-2 -
E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin
“Fully Automated Differential-Linear Attacks against ARX Ciphers”
in Topics in Cryptology - CT-RSA 2023 -
T. Yap, A. Benamira, S. Bhasin and T. Peyrin
“Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis”
in Cryptographic Hardware and Embedded System - CHES 2023 and IACR Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2023-2
2022
-
A. Benamira, T. Peyrin and B. Hooi
“Truth-Table Net: A New Convolutional Architecture Encodable By Design Into SAT Formulas”
in Workshop on Adversarial Robustness in the Real World AROW 2022 (ECCV 2022 Workshop) -
S. Saha, M. Khairallah and T. Peyrin
“Exploring Integrity of AEADs with Faults: Definitions and Constructions”
in Fast Software Encryption - FSE 2023 and IACR Transactions on Symmetric Cryptology - ToSC 2022-4 -
Q.Q. Tan and T. Peyrin (- Best Paper Award -)
“Mind Your Path: on (Key) Dependencies in Differential Characteristics”
in Fast Software Encryption - FSE 2023 and IACR Transactions on Symmetric Cryptology - ToSC 2022-4 -
K. Hu, T. Peyrin, M. Wang
“Finding All Impossible Differentials When Considering the DDT”
in Selected Areas of Cryptography - SAC 2022
2021
-
A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, S. Sarkar and S. M. Sim
“DEFAULT: Cipher Level Resistance Against Differential Fault Attack”
in Advances in Cryptology - ASIACRYPT 2021 -
D. Gerault, T. Peyrin and Q. Q. Tan
“Exploring Differential-Based Distinguishers and Forgeries for ASCON”
in Fast Software Encryption - FSE 2022 and IACR Transactions on Symmetric Cryptology - ToSC 2021-3 -
J. Jean, I. Nikolic, T. Peyrin and Y. Seurin
“The Deoxys AEAD Family”
in Journal of Cryptology - 33 (October 2021) -
A. Chattopadhyay, M. Khairallah, G. Leurent, Z. Najm, T. Peyrin and V. Velichkov
“On The Cost of ASIC Hardware Crackers: A SHA-1 Case Study”
in Topics in Cryptology - CT-RSA 2021 -
A. Benamira, D. Gerault, T. Peyrin and Q. Q. Tan
“A Deeper Look at Machine Learning-Based Cryptanalysis”
in Advances in Cryptology - EUROCRYPT 2021 -
A. Adomnicai and T. Peyrin
“Fixslicing AES-like Ciphers - New bitsliced AES speed records on ARM-Cortex M and RISC-V”
in Cryptographic Hardware and Embedded System - CHES 2021 and IACR Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2021-1
2020
-
T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin
“New Results on Romulus”
in NIST Lightweight Cryptography Workshop 2020 - NIST LWC 2020 -
C. Guo, M. Khairallah and T. Peyrin
“AET-LR: Rate-1 Leakage-Resilient AEAD based on the Romulus Family”
in NIST Lightweight Cryptography Workshop 2020 - NIST LWC 2020 -
A. Adomnicai and T. Peyrin
“Fixslicing - Application to Some NIST LWC Round 2 Candidates”
in NIST Lightweight Cryptography Workshop 2020 - NIST LWC 2020 -
G. Leurent and T. Peyrin
“SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust”
in USENIX Security Symposium - USENIX Security 2020 -
T. Peyrin and H. Wang
“The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers”
in Advances in Cryptology - CRYPTO 2020 -
L. Sun, D. Gerault, A. Benamira and T. Peyrin
“NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis”
in International Symposium on Cyber Security Cryptology and Machine Learning - CSCML 2020 -
C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich and S. M. Sim
“SKINNY-AEAD and SKINNY-Hash”
in IACR Transactions on Symmetric Cryptology - Special Issue on Designs for the NIST Lightweight Standardisation Process ToSC 2020-LWC -
D. Goudarzi, J. Jean, S. Kölbl, T. Peyrin, M. Rivain, Y. Sasaki and S. M. Sim
“Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation”
in IACR Transactions on Symmetric Cryptology - Special Issue on Designs for the NIST Lightweight Standardisation Process ToSC 2020-LWC -
T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin
“Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms”
in Fast Software Encryption - FSE 2020 and IACR Transactions on Symmetric Cryptology - ToSC 2020-1 -
A. Adomnicai, Z. Najm and T. Peyrin
“Fixslicing: A New GIFT Representation”
in Cryptographic Hardware and Embedded System - CHES 2020 and IACR Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2020-3 -
Q. Q. Tan and T. Peyrin
“Improved Heuristics for Short Linear Programs”
in Cryptographic Hardware and Embedded System - CHES 2020 and IACR Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2020-1
2019
-
T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin
“Updates on Romulus”
in NIST Lightweight Cryptography Workshop 2019 - NIST LWC 2019 -
M. Khairallah, X. Hou, Z. Najm, J. Breier, S. Bhasin and T. Peyrin
“SoK : On DFA Vulnerabilities of Substitution-Permutation Networks”
in ACM ASIA Conference on Computer and Communications Security - AsiaCCS 2019 -
G. Leurent and T. Peyrin
“From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1”
in Advances in Cryptology - EUROCRYPT 2019 -
H. Wang and T. Peyrin
“Boomerang Switch in Multiple Rounds - Application to AES Variants and Deoxys”
in Fast Software Encryption - FSE 2019 and IACR Transactions on Symmetric Cryptology - ToSC 2019-1
2018
-
M. Khairallah, Z. Najm, A. Chattopadhyay and T. Peyrin
“Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey”
in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018 -
C. Cid, T. Huang, T. Peyrin, Y. Sasaki and L. Song
“Boomerang Connectivity Table: a New Cryptanalysis Tool”
in Advances in Cryptology - EUROCRYPT 2018 -
A. Baksi, S. Bhasin, J. Breier, M. Khairallah and T. Peyrin
“Protecting Block Ciphers against Differential Fault Attacks without Re-keying”
in IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2018 -
J. Jean, T. Peyrin and S. M. Sim
“Optimizing Implementations of Lightweight Building Blocks”
in Fast Software Encryption - FSE 2018 and IACR Transactions on Symmetric Cryptology - ToSC 2017-4 -
S. Bhasin, D. Jap and T. Peyrin
“Practical Evaluation of FSE 2016 Customized Encoding Countermeasure”
in Fast Software Encryption - FSE 2018 and IACR Transactions on Symmetric Cryptology - ToSC 2017-3 -
C. Cid, T. Huang, T. Peyrin, Y. Sasaki and L. Song
“A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers”
in Fast Software Encryption - FSE 2018 and IACR Transactions on Symmetric Cryptology - ToSC 2017-3 -
K. Khoo, E. Lee, T. Peyrin and S. M. Sim
“Human-readable Proof of the Related-Key Security of AES-128”
in Fast Software Encryption - FSE 2018 and IACR Transactions on Symmetric Cryptology - ToSC 2017-2
2017
-
M. Khairallah, A. Chattopadhyay and T. Peyrin
“Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption”
in Progress in Cryptology - INDOCRYPT 2017 -
J. Jean, A. Moradi, T. Peyrin and P. Sasdrich
“Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives”
in Cryptographic Hardware and Embedded System - CHES 2017 -
S. Banik, S. K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim and Y. Todo
“GIFT: A Small Present”
in Cryptographic Hardware and Embedded System - CHES 2017 -
T. Iwata, K. Minematsu, T. Peyrin and Y. Seurin
“ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication”
in Advances in Cryptology - CRYPTO 2017
2016
-
F.Landelle and T. Peyrin
“Cryptanalysis of Full RIPEMD-128”
in Journal of Cryptology - 29 (October 2016) -
C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich and S.M. Sim
“The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS”
in Advances in Cryptology - CRYPTO 2016 -
T. Peyrin and Y. Seurin
“Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers”
in Advances in Cryptology - CRYPTO 2016 -
M. Stevens, P. Karpman and T. Peyrin
“Freestart collision on full SHA-1”
in Advances in Cryptology - EUROCRYPT 2016
2015
-
T. Peyrin
“Collision Attack on Grindahl”
in Journal of Cryptology - 28 (October 2015) -
C. Blondeau, T. Peyrin, and L. Wang
“Known-key Distinguisher on Full PRESENT”
in Advances in Cryptology - CRYPTO 2015 -
P. Karpman, T. Peyrin, and M. Stevens
“Practical Free-Start Collision Attacks on 76-Step SHA-1”
in Advances in Cryptology - CRYPTO 2015 -
S. M. Sim, K. Khoo, F. Oggier, and T. Peyrin
“Lightweight MDS Involution Matrices”
in Fast Software Encryption - FSE 2015 -
T. Peyrin, S. M. Sim, L. Wang and G. Zhang
“Cryptanalysis of JAMBU”
in Fast Software Encryption - FSE 2015
2014
-
J. Jean, M. Naya-Plasencia and T. Peyrin
“Improved Cryptanalysis of AES-like Permutations”
in Journal of Cryptology - 27 (October 2014) -
N. Anandakumar, T. Peyrin and A. Poschmann
“A Very Compact FPGA Implementation of LED and PHOTON”
in Progress in Cryptology - INDOCRYPT 2014 -
J. Jean, I. Nikolic and T. Peyrin (- Deoxys-II WINNER of the CAESAR competition - Use case 3 -)
“Tweaks and Keys for Block Ciphers: the TWEAKEY Framework”
in Advances in Cryptology - ASIACRYPT 2014 -
K. Khoo, T. Peyrin, A. Poschmann and H. Yap
“FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison”
in Cryptographic Hardware and Embedded System - CHES 2014 -
J. Guo, T. Peyrin, Y. Sasaki and L. Wang
“Updates on Generic Attacks against HMAC and NMAC”
in Advances in Cryptology - CRYPTO 2014 -
J. Guo, J. Jean, G. Leurent, T. Peyrin and L. Wang
“The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function”
in Selected Areas of Cryptography - SAC 2014 -
T. Peyrin and L. Wang
“Generic Universal Forgery Attack on Iterative Hash-based MACs”
in Advances in Cryptology - EUROCRYPT 2014
2013
-
G. Leurent, T. Peyrin and L. Wang
“New Generic Attacks Against Hash-based MACs”
in Advances in Cryptology - ASIACRYPT 2013 -
F. Mendel, T. Peyrin, M. Schläffer, L. Wang and S. Wu
“Improved Cryptanalysis of Reduced RIPEMD-160”
in Advances in Cryptology - ASIACRYPT 2013 -
M. Iwamoto, T. Peyrin and Y. Sasaki
“Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful”
in Advances in Cryptology - ASIACRYPT 2013 -
P.-A. Fouque, J. Jean and T. Peyrin
“Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128”
in Advances in Cryptology - CRYPTO 2013 -
J. Jean, M. Naya-Plasencia and T. Peyrin
“Multiple Limited-Birthday Distinguishers and Applications”
in Selected Areas of Cryptography - SAC 2013 -
R. Benadjila, J. Guo, V. Lomné and T. Peyrin
“Implementing Lightweight Block Ciphers on x86 Architectures”
in Selected Areas of Cryptography - SAC 2013 -
F. Landelle and T. Peyrin (- Invited to JoC -)
“Cryptanalysis of Full RIPEMD-128”
in Advances in Cryptology - EUROCRYPT 2013 -
F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann and S. Chakraborty
“Security Challenges in Automotive Hardware/Software Architecture Design”
in Design, Automation & Test in Europe - DATE 2013 -
J. Jean, I. Nikolic, T. Peyrin, L. Wang and S. Wu
“Security Analysis of PRINCE”
in Fast Software Encryption - FSE 2013
2012
-
T. Peyrin, Y. Sasaki and L. Wang
“Generic Related-key Attacks for HMAC”
in Advances in Cryptology - ASIACRYPT 2012 -
J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann and C. H. Tan
“SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks”
in Progress in Cryptology - AFRICACRYPT 2012 -
L. Wei, T. Peyrin, P. Sokołowski, S. Ling, J. Pieprzyk and H. Wang
“On the (In)Security of IDEA in Various Hashing Modes”
in Fast Software Encryption - FSE 2012 -
J. Jean, M. Naya-Plasencia and T. Peyrin (- Best Paper Award -)
“Improved Rebound Attack on the Finalist Grøstl”
in Fast Software Encryption - FSE 2012 -
M. Naya-Plasencia and T. Peyrin
“Practical Cryptanalysis of ARMADILLO2”
in Fast Software Encryption - FSE 2012 -
A. Duc, J. Guo, T. Peyrin and L.Wei
“Unaligned Rebound Attack: Application to Keccak”
in Fast Software Encryption - FSE 2012
2011
-
J. Guo, T. Peyrin, A. Poschmann and M. Robshaw
“The LED Block Cipher”
in Cryptographic Hardware and Embedded System - CHES 2011 -
J. Guo, T. Peyrin and A. Poschmann
“The PHOTON Family of Lightweight Hash Functions”
in Advances in Cryptology - CRYPTO 2011 -
J. Guo, T. Peyrin and A. Poschmann
“The PHOTON Family of Lightweight Hash Functions”
in ECRYPT Hash Workshop 2011 -
M. Minier, M. Naya-Plasencia and T. Peyrin
“Analysis of Reduced-SHAvite-3-256 v2”
in Fast Software Encryption - FSE 2011
2010
-
E. Brier and T. Peyrin
“A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT”
in Advances in Cryptology - ASIACRYPT 2010 -
T. Peyrin
“Improved Differential Attacks for ECHO and Grøstl”
in Advances in Cryptology - CRYPTO 2010 -
O. Benoit and T. Peyrin
“Side-channel Analysis of Six SHA-3 Candidates”
in Cryptographic Hardware and Embedded System - CHES 2010 -
J-P. Aumasson, E. Käsper, L. Knudsen, K. Matusiewicz, R. Ødegaard, T. Peyrin and M. Schläffer
“Distinguishers for the Compression Function and Output Transformation of Hamsi-256”
in Australasian Conference on Information Security and Privacy - ACISP 2010 -
P. Gauravaram, G. Leurent, F. Mendel, M. Naya-Plasencia, T. Peyrin, C. Rechberger and M. Schläffer
“Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512”
in Progress in Cryptology - AFRICACRYPT 2010 -
H. Gilbert and T. Peyrin
“Super-Sbox Cryptanalysis: Improved Attacks for AES-like Permutations”
in Fast Software Encryption - FSE 2010 -
M. Naya-Plasencia, A. Röck, J-P. Aumasson, Y. Laigle-Chapuy, G. Leurent, W. Meier and T. Peyrin
“Cryptanalysis of ESSENCE”
in Fast Software Encryption - FSE 2010
2009
-
J. Yajima, T. Iwasaki, Y.Naito, Y. Sasaki, T. Shimoyama, T. Peyrin, N. Kunihiro and K. Ohta
“A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search”
in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences - IEICE TRANS. January 2009 -
N. Mouha, G. Sekar, J-P. Aumasson, T. Peyrin, S. Thomsen, M. S. Turan and B. Preneel
“Cryptanalysis of the ESSENCE Family of Hash Functions”
in International Conference on Information Security and Cryptology - INSCRYPT 2009 -
E. Brier, S. Khazaei, W. Meier and T. Peyrin
“Linearization Framework for Collision Attacks: Application to CubeHash and MD6”
in Advances in Cryptology - ASIACRYPT 2009 -
F. Mendel, T. Peyrin, C. Rechberger and M. Schläffer
“Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher”
in Selected Areas of Cryptography - SAC 2009 -
J-P. Aumasson, E. Brier, W. Meier, M. Naya-Plasencia and T. Peyrin
“Inside the Hypercube”
in Australasian Conference on Information Security and Privacy - ACISP 2009 -
E. Brier and T. Peyrin
“Cryptanalysis of CubeHash”
in Applied Cryptography and Network Security - ACNS 2009 -
T. Fuhr and T. Peyrin
“Cryptanalysis of RadioGatun”
in Fast Software Encryption - FSE 2009
2008
-
M. Gorski, S. Lucks and T. Peyrin
“Slide Attacks on a Class of Hash Functions”
in Advances in Cryptology - ASIACRYPT 2008 -
E. Bresson, B. Chevallier-Mames, C. Clavier, A. Gouget, P. Paillier and T. Peyrin
“How to use Merkle-Damgard - On the Security Relations between Signature Schemes and their Inner Hash Functions”
in Provable Security - ProvSec 2008 -
S. Manuel and T. Peyrin
“Collisions on SHA-0 in One Hour”
in Fast Software Encryption - FSE 2008
2007
-
T. Peyrin (- Best Paper Award -)
“Cryptanalysis of Grindahl”
in Advances in Cryptology - ASIACRYPT 2007 -
A. Joux and T. Peyrin
“Hash Functions and the (Amplified) Boomerang Attack”
in Advances in Cryptology - CRYPTO 2007 -
A. Joux and T. Peyrin
“Hash Functions and the (Amplified) Boomerang Attack”
in ECRYPT Hash Workshop 2007 -
E. Bresson, B. Chevallier-Mames, C. Clavier, B. Debraize, P.-A. Fouque, L. Goubin, A. Gouget, G. Leurent, P. Q. Nguyen, P. Paillier, T. Peyrin and S. Zimmer
“Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions”
in ECRYPT Hash Workshop 2007 -
O. Billet, M. Robshaw and T. Peyrin
“On Building Hash Functions From Multivariate Quadratic Equations”
in Australian Conference on Information Security and Privacy - ACISP 2007 -
Y. Seurin and T. Peyrin
“Security Analysis of Constructions Combining FIL Random Oracles”
in Fast Software Encryption - FSE 2007 -
K. Matusiewicz, T. Peyrin, O. Billet, S. Contini and J. Pieprzyk
“Cryptanalysis of FORK-256”
in Fast Software Encryption - FSE 2007
2006
-
T. Peyrin, H. Gilbert, F. Muller and M. Robshaw
“Combining Compression Functions and Block Cipher-Based Hash Functions”
in Advances in Cryptology - ASIACRYPT 2006 -
F. Muller and T. Peyrin
“Cryptanalysis of T-Function-Based Hash Functions”
in International Conference on Information Security and Cryptology - ICISC 2006
2005
-
F. Muller and T. Peyrin
“Linear Cryptanalysis of the TSC family of Stream Ciphers”
in Advances in Cryptology - ASIACRYPT 2005 -
T. Peyrin and S. Vaudenay
“The Pairing Problem with User Interaction”
in Security and Privacy in the Age of Ubiquitous Computing - SEC 2005
2004
- G. Avoine, J. Monnerat and T. Peyrin
“Advances in Alternative Non-Adjacent Form Representations”
in Progress in Cryptology - INDOCRYPT 2004
Preprints
-
J. Guo, J. Jean, T. Peyrin, and L. Wang
“Breaking POET Authentication with a Single Query” -
J. Guo, I. Nikolic, T. Peyrin, and L. Wang
“Cryptanalysis of Zorro”
Thesis
-
T. Peyrin
“Analyse de fonctions de hachage cryptographiques”
PhD thesis, University of Versailles, 2008 -
T. Peyrin
“Etude de la Sécurité des T-fonctions”
Master thesis, MPRI, 2005 -
T. Peyrin
“Bluetooth Security”
Diploma thesis, CPE Lyon - EPFL, 2004
Articles in Magazines
-
J. Jean and T. Peyrin
“La Cryptographie Symétrique à Bas-Coût: Comment Protéger des Données Avec Très Peu de Ressources ?”
in MISC - Multi-System and Internet Security Cookbook, Hors-Série no. 15, November 2017 -
R. Benadjila, O. Billet, G. Macario-Rat and T. Peyrin
“Hachage Sécurisé: la Compétition SHA-3”
in MISC - Multi-System and Internet Security Cookbook, Hors-Série no. 6, November 2012 -
T. Peyrin
“Les compromis temps-mémoire: un outil pratique pour la cryptanalyse”
in La lettre Techniques de l’ingénieur - Sécurité des systèmes d’information, January 2007