Thomas Peyrin


Ontology type: schema:Person     


Person Info

NAME

Thomas

SURNAME

Peyrin

Publications in SciGraph latest 50 shown

  • 2021-12-01 DEFAULT: Cipher Level Resistance Against Differential Fault Attack in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2021
  • 2021-06-16 A Deeper Look at Machine Learning-Based Cryptanalysis in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2021
  • 2021-06-10 The Deoxys AEAD Family in JOURNAL OF CRYPTOLOGY
  • 2021-05-11 On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study in TOPICS IN CRYPTOLOGY – CT-RSA 2021
  • 2020-08-10 The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers in ADVANCES IN CRYPTOLOGY – CRYPTO 2020
  • 2020-06-25 NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis in CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
  • 2019-04-24 From Collisions to Chosen-Prefix Collisions Application to Full SHA-1 in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2019
  • 2018-03-31 Boomerang Connectivity Table: A New Cryptanalysis Tool in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2017-11-30 Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2017
  • 2017-08-02 ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2016-07-21 The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016-07-21 Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016-04-28 Freestart Collision for Full SHA-1 in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2015-08-25 Cryptanalysis of Full RIPEMD-128 in JOURNAL OF CRYPTOLOGY
  • 2015-08-12 Lightweight MDS Involution Matrices in FAST SOFTWARE ENCRYPTION
  • 2015-08-12 Cryptanalysis of JAMBU in FAST SOFTWARE ENCRYPTION
  • 2015-08-01 Known-Key Distinguisher on Full PRESENT in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015-08-01 Practical Free-Start Collision Attacks on 76-step SHA-1 in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2014-11-29 The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2014-10-25 A Very Compact FPGA Implementation of LED and PHOTON in PROGRESS IN CRYPTOLOGY -- INDOCRYPT 2014
  • 2014-07-08 Security Analysis of PRINCE in FAST SOFTWARE ENCRYPTION
  • 2014-05-28 Collision Attack on Grindahl in JOURNAL OF CRYPTOLOGY
  • 2014-05-21 Implementing Lightweight Block Ciphers on x86 Architectures in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2014-05-21 Multiple Limited-Birthday Distinguishers and Applications in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2014 Updates on Generic Attacks against HMAC and NMAC in ADVANCES IN CRYPTOLOGY – CRYPTO 2014
  • 2014 Tweaks and Keys for Block Ciphers: The TWEAKEY Framework in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2014 FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison in ADVANCED INFORMATION SYSTEMS ENGINEERING
  • 2014 Generic Universal Forgery Attack on Iterative Hash-Based MACs in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2014
  • 2013-07-17 Improved Cryptanalysis of AES-like Permutations in JOURNAL OF CRYPTOLOGY
  • 2013 New Generic Attacks against Hash-Based MACs in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2013 Cryptanalysis of Full RIPEMD-128 in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2013
  • 2013 Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2013 Improved Cryptanalysis of Reduced RIPEMD-160 in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2013 Limited-Birthday Distinguishers for Hash Functions in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2012 Generic Related-Key Attacks for HMAC in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2012 On the (In)Security of IDEA in Various Hashing Modes in FAST SOFTWARE ENCRYPTION
  • 2012 SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks in PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2012
  • 2012 Practical Cryptanalysis of ARMADILLO2 in FAST SOFTWARE ENCRYPTION
  • 2012 Unaligned Rebound Attack: Application to Keccak in FAST SOFTWARE ENCRYPTION
  • 2012 Improved Rebound Attack on the Finalist Grøstl in FAST SOFTWARE ENCRYPTION
  • 2011 The LED Block Cipher in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2011
  • 2011 The PHOTON Family of Lightweight Hash Functions in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2011 Analysis of Reduced-SHAvite-3-256 v2 in FAST SOFTWARE ENCRYPTION
  • 2010 Side-Channel Analysis of Six SHA-3 Candidates in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2010 Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2010
  • 2010 Cryptanalysis of the ESSENCE Family of Hash Functions in INFORMATION SECURITY AND CRYPTOLOGY
  • 2010 Cryptanalysis of ESSENCE in FAST SOFTWARE ENCRYPTION
  • 2010 Distinguishers for the Compression Function and Output Transformation of Hamsi-256 in INFORMATION SECURITY AND PRIVACY
  • 2010 Improved Differential Attacks for ECHO and Grøstl in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • 2010 Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations in FAST SOFTWARE ENCRYPTION
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.59025.3b", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.89485.38", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.435187.c", 
            "type": "Organization"
          }
        ], 
        "familyName": "Peyrin", 
        "givenName": "Thomas", 
        "id": "sg:person.011167161615.31", 
        "identifier": [
          {
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0002-2690-9197"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31", 
          "https://orcid.org/0000-0002-2690-9197"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-08-04T17:39", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/person/person_991.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.011167161615.31'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.011167161615.31'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.011167161615.31'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.011167161615.31'


     

    This table displays all metadata directly associated to this object as RDF triples.

    25 TRIPLES      11 PREDICATES      15 URIs      8 LITERALS      3 BLANK NODES

    Subject Predicate Object
    1 sg:person.011167161615.31 schema:affiliation Nd69f9706470a4145ab835f0a8c007b0d
    2 grid-institutes:grid.435187.c
    3 grid-institutes:grid.89485.38
    4 schema:familyName Peyrin
    5 schema:givenName Thomas
    6 schema:identifier N98d0a9848cdb42a9bf11fff61522a405
    7 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31
    8 https://orcid.org/0000-0002-2690-9197
    9 schema:sdDatePublished 2022-08-04T17:39
    10 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    11 schema:sdPublisher Nb053571932124cdda594ceb14d282f66
    12 sgo:license sg:explorer/license/
    13 sgo:sdDataset persons
    14 rdf:type schema:Person
    15 N98d0a9848cdb42a9bf11fff61522a405 schema:name orcid_id
    16 schema:value 0000-0002-2690-9197
    17 rdf:type schema:PropertyValue
    18 Nb053571932124cdda594ceb14d282f66 schema:name Springer Nature - SN SciGraph project
    19 rdf:type schema:Organization
    20 Nd69f9706470a4145ab835f0a8c007b0d schema:affiliation grid-institutes:grid.59025.3b
    21 sgo:isCurrent true
    22 rdf:type schema:OrganizationRole
    23 grid-institutes:grid.435187.c schema:Organization
    24 grid-institutes:grid.59025.3b schema:Organization
    25 grid-institutes:grid.89485.38 schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...