Léo Perrin
Title
Cited by
Cited by
Year
Triathlon of lightweight block ciphers for the internet of things
D Dinu, Y Le Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering 9 (3), 283-302, 2019
1422019
State of the art in lightweight symmetric cryptography
A Biryukov, LP Perrin
Esch-sur-Alzette, 2017
1172017
Design Strategies for ARX with Provable Bounds: Sparx and LAX
D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov
International Conference on the Theory and Application of Cryptology and …, 2016
1062016
Felics–fair evaluation of lightweight cryptographic systems
D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin
NIST Workshop on Lightweight Cryptography 128, 2015
672015
Reverse-engineering the S-box of Streebog, Kuznyechik and STRIBOBr1
A Biryukov, L Perrin, A Udovenko
Annual international conference on the theory and applications of …, 2016
462016
On reverse-engineering S-Boxes with hidden design criteria or structure
A Biryukov, L Perrin
Annual Cryptology Conference, 116-140, 2015
372015
Differential analysis and meet-in-the-middle attack against round-reduced TWINE
A Biryukov, P Derbez, L Perrin
International Workshop on Fast Software Encryption, 3-27, 2015
372015
Feistel structures for MPC, and more
MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ...
European Symposium on Research in Computer Security, 151-171, 2019
362019
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
P Derbez, L Perrin
International Workshop on Fast Software Encryption, 190-216, 2015
362015
Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem
L Perrin, A Udovenko, A Biryukov
Annual International Cryptology Conference, 93-122, 2016
342016
Cryptanalysis of Feistel networks with secret round functions
A Biryukov, G Leurent, L Perrin
International Conference on Selected Areas in Cryptography, 102-121, 2015
342015
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size
A Canteaut, S Duval, L Perrin
IEEE Transactions on Information Theory 63 (11), 7575-7591, 2017
262017
On CCZ-equivalence, extended-affine equivalence, and function twisting
A Canteaut, L Perrin
Finite Fields and Their Applications 56, 209-246, 2019
232019
More differentially 6-uniform power functions
C Blondeau, L Perrin
Designs, codes and cryptography 73 (2), 487-505, 2014
212014
Lightweight cryptography lounge
A Biryukov, L Perrin
Accessed February 5, 2017, 2015
18*2015
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
Annual International Cryptology Conference, 299-328, 2020
172020
Multiset-algebraic cryptanalysis of reduced Kuznyechik, Khazad, and secret SPNs
A Biryukov, D Khovratovich, LP Perrin
IACR Transactions on Symmetric Cryptology 2016 (2), 226-247, 2016
152016
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
L Perrin, K Dmitry
Fast Software Encryption 8540, pp 82-103, 2015
112015
Boomerang uniformity of popular S-box constructions
C Boura, L Perrin, S Tian
WCC 2019-The Eleventh International Workshop on Coding and Cryptography, 2019
102019
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security
A Canteaut, S Duval, G Leurent, M Naya-Plasencia, L Perrin, T Pornin, ...
102019
The system can't perform the operation now. Try again later.
Articles 1–20