2024

  • A. Benamira, T. Peyrin, T. Yap, T. Guérand and B. HooiTruth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form” in International Joint Conference on Artificial Intelligence - IJCAI 2024

2023

  • A. Benamira, T. Guérand, T. Peyrin amd S. Saha
    TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture

  • K. Hu, T. Peyrin, Q.Q. Tan and T. Yap
    Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective
    in Advances in Cryptology - ASIACRYPT 2023

  • A. Benamira, T. Guérand and T. Peyrin
    A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making
    in International Conference on AI in Medicine - iAIM 2023

  • A. Benamira, T. Guérand, T. Peyrin and H. Soegeng
    Neural Network-Based Rule Models With Truth Tables
    in European Conference on Artificial Intelligence - ECAI 2023

  • E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin
    Boosting differential-linear cryptanalysis of ChaCha7 with MILP
    in Fast Software Encryption - FSE 2024 and Transactions on Symmetric Cryptology - ToSC 2023-2

  • E. Bellini, D. Gerault, J. Grados, R. H. Makarim and T. Peyrin
    Fully Automated Differential-Linear Attacks against ARX Ciphers
    in Topics in Cryptology - CT-RSA 2023

  • T. Yap, A. Benamira, S. Bhasin and T. Peyrin
    Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
    in Cryptographic Hardware and Embedded System - CHES 2023 and Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2023-2

2022

  • A. Benamira, T. Peyrin and B. Hooi
    Truth-Table Net: A New Convolutional Architecture Encodable By Design Into SAT Formulas
    in Workshop on Adversarial Robustness in the Real World AROW 2022 (ECCV 2022 Workshop)

  • S. Saha, M. Khairallah and T. Peyrin
    Exploring Integrity of AEADs with Faults: Definitions and Constructions
    in Fast Software Encryption - FSE 2023 and Transactions on Symmetric Cryptology - ToSC 2022-4

  • Q.Q. Tan and T. Peyrin (- Best Paper Award -)
    Mind Your Path: on (Key) Dependencies in Differential Characteristics
    in Fast Software Encryption - FSE 2023 and Transactions on Symmetric Cryptology - ToSC 2022-4

  • K. Hu, T. Peyrin, M. Wang
    Finding All Impossible Differentials When Considering the DDT
    in Selected Areas of Cryptography - SAC 2022

  • B. Cogliati, J. Jean, T. Peyrin and Y. Seurin
    A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers

2021

  • A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, S. Sarkar and S. M. Sim
    DEFAULT: Cipher Level Resistance Against Differential Fault Attack
    in Advances in Cryptology - ASIACRYPT 2021

  • D. Gerault, T. Peyrin and Q. Q. Tan
    Exploring Differential-Based Distinguishers and Forgeries for ASCON
    in Fast Software Encryption - FSE 2022 and Transactions on Symmetric Cryptology - ToSC 2021-3

  • J. Jean, I. Nikolic, T. Peyrin and Y. Seurin
    The Deoxys AEAD Family
    in Journal of Cryptology - 33 (October 2021)

  • A. Chattopadhyay, M. Khairallah, G. Leurent, Z. Najm, T. Peyrin and V. Velichkov
    On The Cost of ASIC Hardware Crackers: A SHA-1 Case Study
    in Topics in Cryptology - CT-RSA 2021

  • A. Benamira, D. Gerault, T. Peyrin and Q. Q. Tan
    A Deeper Look at Machine Learning-Based Cryptanalysis
    in Advances in Cryptology - EUROCRYPT 2021

  • A. Adomnicai and T. Peyrin
    Fixslicing AES-like Ciphers - New bitsliced AES speed records on ARM-Cortex M and RISC-V
    in Cryptographic Hardware and Embedded System - CHES 2021 and Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2021-1

2020

  • T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin
    New Results on Romulus
    in NIST Lightweight Cryptography Workshop 2020 - NIST LWC 2020

  • C. Guo, M. Khairallah and T. Peyrin
    AET-LR: Rate-1 Leakage-Resilient AEAD based on the Romulus Family
    in NIST Lightweight Cryptography Workshop 2020 - NIST LWC 2020

  • A. Adomnicai and T. Peyrin
    Fixslicing - Application to Some NIST LWC Round 2 Candidates
    in NIST Lightweight Cryptography Workshop 2020 - NIST LWC 2020

  • G. Leurent and T. Peyrin
    SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
    in USENIX Security Symposium - USENIX Security 2020

  • T. Peyrin and H. Wang
    The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
    in Advances in Cryptology - CRYPTO 2020

  • L. Sun, D. Gerault, A. Benamira and T. Peyrin
    NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis
    in International Symposium on Cyber Security Cryptology and Machine Learning - CSCML 2020

  • C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich and S. M. Sim
    SKINNY-AEAD and SKINNY-Hash
    in Transactions on Symmetric Cryptology - Special Issue on Designs for the NIST Lightweight Standardisation Process ToSC 2020-LWC

  • D. Goudarzi, J. Jean, S. Kölbl, T. Peyrin, M. Rivain, Y. Sasaki and S. M. Sim
    Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
    in Transactions on Symmetric Cryptology - Special Issue on Designs for the NIST Lightweight Standardisation Process ToSC 2020-LWC

  • T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin
    Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
    in Fast Software Encryption - FSE 2020 and Transactions on Symmetric Cryptology - ToSC 2020-1

  • A. Adomnicai, Z. Najm and T. Peyrin
    Fixslicing: A New GIFT Representation
    in Cryptographic Hardware and Embedded System - CHES 2020 and Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2020-3

  • Q. Q. Tan and T. Peyrin
    Improved Heuristics for Short Linear Programs
    in Cryptographic Hardware and Embedded System - CHES 2020 and Transactions on Cryptographic Hardware and Embedded Systems - TCHES 2020-1

2019

  • T. Iwata, M. Khairallah, K. Minematsu and T. Peyrin
    Updates on Romulus
    in NIST Lightweight Cryptography Workshop 2019 - NIST LWC 2019

  • M. Khairallah, X. Hou, Z. Najm, J. Breier, S. Bhasin and T. Peyrin
    SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
    in ACM ASIA Conference on Computer and Communications Security - AsiaCCS 2019

  • G. Leurent and T. Peyrin
    From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
    in Advances in Cryptology - EUROCRYPT 2019

  • H. Wang and T. Peyrin
    Boomerang Switch in Multiple Rounds - Application to AES Variants and Deoxys
    in Fast Software Encryption - FSE 2019 and Transactions on Symmetric Cryptology - ToSC 2019-1

2018

  • M. Khairallah, Z. Najm, A. Chattopadhyay and T. Peyrin
    Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey
    in International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation - SAMOS 2018

  • C. Cid, T. Huang, T. Peyrin, Y. Sasaki and L. Song
    Boomerang Connectivity Table: a New Cryptanalysis Tool
    in Advances in Cryptology - EUROCRYPT 2018

  • A. Baksi, S. Bhasin, J. Breier, M. Khairallah and T. Peyrin
    Protecting Block Ciphers against Differential Fault Attacks without Re-keying
    in IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2018

  • J. Jean, T. Peyrin and S. M. Sim
    Optimizing Implementations of Lightweight Building Blocks
    in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-4

  • S. Bhasin, D. Jap and T. Peyrin
    Practical Evaluation of FSE 2016 Customized Encoding Countermeasure
    in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-3

  • C. Cid, T. Huang, T. Peyrin, Y. Sasaki and L. Song
    A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers
    in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-3

  • K. Khoo, E. Lee, T. Peyrin and S. M. Sim
    Human-readable Proof of the Related-Key Security of AES-128
    in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-2

2017

  • M. Khairallah, A. Chattopadhyay and T. Peyrin
    Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    in Progress in Cryptology - INDOCRYPT 2017

  • J. Jean, A. Moradi, T. Peyrin and P. Sasdrich
    Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
    in Cryptographic Hardware and Embedded System - CHES 2017

  • S. Banik, S. K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim and Y. Todo
    GIFT: A Small Present
    in Cryptographic Hardware and Embedded System - CHES 2017

  • T. Iwata, K. Minematsu, T. Peyrin and Y. Seurin
    ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
    in Advances in Cryptology - CRYPTO 2017

2016

  • F.Landelle and T. Peyrin
    Cryptanalysis of Full RIPEMD-128
    in Journal of Cryptology - 29 (October 2016)

  • C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich and S.M. Sim
    The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
    in Advances in Cryptology - CRYPTO 2016

  • T. Peyrin and Y. Seurin
    Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
    in Advances in Cryptology - CRYPTO 2016

  • M. Stevens, P. Karpman and T. Peyrin
    Freestart collision on full SHA-1
    in Advances in Cryptology - EUROCRYPT 2016

2015

  • T. Peyrin
    Collision Attack on Grindahl
    in Journal of Cryptology - 28 (October 2015)

  • C. Blondeau, T. Peyrin, and L. Wang
    Known-key Distinguisher on Full PRESENT
    in Advances in Cryptology - CRYPTO 2015

  • P. Karpman, T. Peyrin, and M. Stevens
    Practical Free-Start Collision Attacks on 76-Step SHA-1
    in Advances in Cryptology - CRYPTO 2015

  • S. M. Sim, K. Khoo, F. Oggier, and T. Peyrin
    Lightweight MDS Involution Matrices
    in Fast Software Encryption - FSE 2015

  • T. Peyrin, S. M. Sim, L. Wang and G. Zhang
    Cryptanalysis of JAMBU
    in Fast Software Encryption - FSE 2015

2014

  • J. Jean, M. Naya-Plasencia and T. Peyrin
    Improved Cryptanalysis of AES-like Permutations
    in Journal of Cryptology - 27 (October 2014)

  • N. Anandakumar, T. Peyrin and A. Poschmann
    A Very Compact FPGA Implementation of LED and PHOTON
    in Progress in Cryptology - INDOCRYPT 2014

  • J. Jean, I. Nikolic and T. Peyrin (- Deoxys-II WINNER of the CAESAR competition - Use case 3 -)
    Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
    in Advances in Cryptology - ASIACRYPT 2014

  • K. Khoo, T. Peyrin, A. Poschmann and H. Yap
    FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
    in Cryptographic Hardware and Embedded System - CHES 2014

  • J. Guo, T. Peyrin, Y. Sasaki and L. Wang
    Updates on Generic Attacks against HMAC and NMAC
    in Advances in Cryptology - CRYPTO 2014

  • J. Guo, J. Jean, G. Leurent, T. Peyrin and L. Wang
    The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
    in Selected Areas of Cryptography - SAC 2014

  • T. Peyrin and L. Wang
    Generic Universal Forgery Attack on Iterative Hash-based MACs
    in Advances in Cryptology - EUROCRYPT 2014

2013

  • G. Leurent, T. Peyrin and L. Wang
    New Generic Attacks Against Hash-based MACs
    in Advances in Cryptology - ASIACRYPT 2013

  • F. Mendel, T. Peyrin, M. Schläffer, L. Wang and S. Wu
    Improved Cryptanalysis of Reduced RIPEMD-160
    in Advances in Cryptology - ASIACRYPT 2013

  • M. Iwamoto, T. Peyrin and Y. Sasaki
    Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
    in Advances in Cryptology - ASIACRYPT 2013

  • P.-A. Fouque, J. Jean and T. Peyrin
    Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
    in Advances in Cryptology - CRYPTO 2013

  • J. Jean, M. Naya-Plasencia and T. Peyrin
    Multiple Limited-Birthday Distinguishers and Applications
    in Selected Areas of Cryptography - SAC 2013

  • R. Benadjila, J. Guo, V. Lomné and T. Peyrin
    Implementing Lightweight Block Ciphers on x86 Architectures
    in Selected Areas of Cryptography - SAC 2013

  • F. Landelle and T. Peyrin (- Invited to JoC -)
    Cryptanalysis of Full RIPEMD-128
    in Advances in Cryptology - EUROCRYPT 2013

  • F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann and S. Chakraborty
    Security Challenges in Automotive Hardware/Software Architecture Design
    in Design, Automation & Test in Europe - DATE 2013

  • J. Jean, I. Nikolic, T. Peyrin, L. Wang and S. Wu
    Security Analysis of PRINCE
    in Fast Software Encryption - FSE 2013

2012

  • T. Peyrin, Y. Sasaki and L. Wang
    Generic Related-key Attacks for HMAC
    in Advances in Cryptology - ASIACRYPT 2012

  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann and C. H. Tan
    SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
    in Progress in Cryptology - AFRICACRYPT 2012

  • L. Wei, T. Peyrin, P. Sokołowski, S. Ling, J. Pieprzyk and H. Wang
    On the (In)Security of IDEA in Various Hashing Modes
    in Fast Software Encryption - FSE 2012

  • J. Jean, M. Naya-Plasencia and T. Peyrin (- Best Paper Award -)
    Improved Rebound Attack on the Finalist Grøstl
    in Fast Software Encryption - FSE 2012

  • M. Naya-Plasencia and T. Peyrin
    Practical Cryptanalysis of ARMADILLO2
    in Fast Software Encryption - FSE 2012

  • A. Duc, J. Guo, T. Peyrin and L.Wei
    Unaligned Rebound Attack: Application to Keccak
    in Fast Software Encryption - FSE 2012

2011

  • J. Guo, T. Peyrin, A. Poschmann and M. Robshaw
    The LED Block Cipher
    in Cryptographic Hardware and Embedded System - CHES 2011

  • J. Guo, T. Peyrin and A. Poschmann
    The PHOTON Family of Lightweight Hash Functions
    in Advances in Cryptology - CRYPTO 2011

  • J. Guo, T. Peyrin and A. Poschmann
    The PHOTON Family of Lightweight Hash Functions
    in ECRYPT Hash Workshop 2011

  • M. Minier, M. Naya-Plasencia and T. Peyrin
    Analysis of Reduced-SHAvite-3-256 v2
    in Fast Software Encryption - FSE 2011

2010

  • E. Brier and T. Peyrin
    A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT
    in Advances in Cryptology - ASIACRYPT 2010

  • T. Peyrin
    Improved Differential Attacks for ECHO and Grøstl
    in Advances in Cryptology - CRYPTO 2010

  • O. Benoit and T. Peyrin
    Side-channel Analysis of Six SHA-3 Candidates
    in Cryptographic Hardware and Embedded System - CHES 2010

  • J-P. Aumasson, E. Käsper, L. Knudsen, K. Matusiewicz, R. Ødegaard, T. Peyrin and M. Schläffer
    Distinguishers for the Compression Function and Output Transformation of Hamsi-256”
    in Australasian Conference on Information Security and Privacy - ACISP 2010

  • P. Gauravaram, G. Leurent, F. Mendel, M. Naya-Plasencia, T. Peyrin, C. Rechberger and M. Schläffer
    Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
    in Progress in Cryptology - AFRICACRYPT 2010

  • H. Gilbert and T. Peyrin
    Super-Sbox Cryptanalysis: Improved Attacks for AES-like Permutations
    in Fast Software Encryption - FSE 2010

  • M. Naya-Plasencia, A. Röck, J-P. Aumasson, Y. Laigle-Chapuy, G. Leurent, W. Meier and T. Peyrin
    Cryptanalysis of ESSENCE
    in Fast Software Encryption - FSE 2010

2009

  • J. Yajima, T. Iwasaki, Y.Naito, Y. Sasaki, T. Shimoyama, T. Peyrin, N. Kunihiro and K. Ohta
    A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
    in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences - IEICE TRANS. January 2009

  • N. Mouha, G. Sekar, J-P. Aumasson, T. Peyrin, S. Thomsen, M. S. Turan and B. Preneel
    Cryptanalysis of the ESSENCE Family of Hash Functions
    in International Conference on Information Security and Cryptology - INSCRYPT 2009

  • E. Brier, S. Khazaei, W. Meier and T. Peyrin
    Linearization Framework for Collision Attacks: Application to CubeHash and MD6
    in Advances in Cryptology - ASIACRYPT 2009

  • F. Mendel, T. Peyrin, C. Rechberger and M. Schläffer
    Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
    in Selected Areas of Cryptography - SAC 2009

  • J-P. Aumasson, E. Brier, W. Meier, M. Naya-Plasencia and T. Peyrin
    Inside the Hypercube
    in Australasian Conference on Information Security and Privacy - ACISP 2009

  • E. Brier and T. Peyrin
    Cryptanalysis of CubeHash
    in Applied Cryptography and Network Security - ACNS 2009

  • T. Fuhr and T. Peyrin
    Cryptanalysis of RadioGatun
    in Fast Software Encryption - FSE 2009

2008

  • M. Gorski, S. Lucks and T. Peyrin
    Slide Attacks on a Class of Hash Functions
    in Advances in Cryptology - ASIACRYPT 2008

  • E. Bresson, B. Chevallier-Mames, C. Clavier, A. Gouget, P. Paillier and T. Peyrin
    How to use Merkle-Damgard - On the Security Relations between Signature Schemes and their Inner Hash Functions
    in Provable Security - ProvSec 2008

  • S. Manuel and T. Peyrin
    Collisions on SHA-0 in One Hour
    in Fast Software Encryption - FSE 2008

2007

  • T. Peyrin (- Best Paper Award -)
    Cryptanalysis of Grindahl
    in Advances in Cryptology - ASIACRYPT 2007

  • A. Joux and T. Peyrin
    Hash Functions and the (Amplified) Boomerang Attack
    in Advances in Cryptology - CRYPTO 2007

  • A. Joux and T. Peyrin
    Hash Functions and the (Amplified) Boomerang Attack
    in ECRYPT Hash Workshop 2007

  • E. Bresson, B. Chevallier-Mames, C. Clavier, B. Debraize, P.-A. Fouque, L. Goubin, A. Gouget, G. Leurent, P. Q. Nguyen, P. Paillier, T. Peyrin and S. Zimmer
    Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions
    in ECRYPT Hash Workshop 2007

  • O. Billet, M. Robshaw and T. Peyrin
    On Building Hash Functions From Multivariate Quadratic Equations
    in Australian Conference on Information Security and Privacy - ACISP 2007

  • Y. Seurin and T. Peyrin
    Security Analysis of Constructions Combining FIL Random Oracles
    in Fast Software Encryption - FSE 2007

  • K. Matusiewicz, T. Peyrin, O. Billet, S. Contini and J. Pieprzyk
    Cryptanalysis of FORK-256
    in Fast Software Encryption - FSE 2007

2006

  • T. Peyrin, H. Gilbert, F. Muller and M. Robshaw
    Combining Compression Functions and Block Cipher-Based Hash Functions
    in Advances in Cryptology - ASIACRYPT 2006

  • F. Muller and T. Peyrin
    Cryptanalysis of T-Function-Based Hash Functions
    in International Conference on Information Security and Cryptology - ICISC 2006

2005

  • F. Muller and T. Peyrin
    Linear Cryptanalysis of the TSC family of Stream Ciphers
    in Advances in Cryptology - ASIACRYPT 2005

  • T. Peyrin and S. Vaudenay
    The Pairing Problem with User Interaction
    in Security and Privacy in the Age of Ubiquitous Computing - SEC 2005

2004

  • G. Avoine, J. Monnerat and T. Peyrin
    Advances in Alternative Non-Adjacent Form Representations
    in Progress in Cryptology - INDOCRYPT 2004

Preprints

  • J. Guo, J. Jean, T. Peyrin, and L. Wang
    Breaking POET Authentication with a Single Query

  • J. Guo, I. Nikolic, T. Peyrin, and L. Wang
    Cryptanalysis of Zorro

Thesis

  • T. Peyrin
    Analyse de fonctions de hachage cryptographiques
    PhD thesis, University of Versailles, 2008

  • T. Peyrin
    Etude de la Sécurité des T-fonctions
    Master thesis, MPRI, 2005

  • T. Peyrin
    Bluetooth Security
    Diploma thesis, CPE Lyon - EPFL, 2004

Articles in Magazines

  • J. Jean and T. Peyrin
    La Cryptographie Symétrique à Bas-Coût: Comment Protéger des Données Avec Très Peu de Ressources ?
    in MISC - Multi-System and Internet Security Cookbook, Hors-Série no. 15, November 2017

  • R. Benadjila, O. Billet, G. Macario-Rat and T. Peyrin
    Hachage Sécurisé: la Compétition SHA-3
    in MISC - Multi-System and Internet Security Cookbook, Hors-Série no. 6, November 2012

  • T. Peyrin
    Les compromis temps-mémoire: un outil pratique pour la cryptanalyse
    in La lettre Techniques de l’ingénieur - Sécurité des systèmes d’information, January 2007