Triathlon of lightweight block ciphers for the internet of things D Dinu, YL Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov Journal of Cryptographic Engineering 9, 283-302, 2019 | 233 | 2019 |
State of the art in lightweight symmetric cryptography A Biryukov, L Perrin Cryptology ePrint Archive, 2017 | 208 | 2017 |
Design Strategies for ARX with Provable Bounds: Sparx and LAX D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 189 | 2016 |
Feistel structures for MPC, and more MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ... Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 128 | 2019 |
FELICS-fair evaluation of lightweight cryptographic systems D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin NIST Workshop on Lightweight Cryptography 128, 2015 | 116 | 2015 |
Reverse-engineering the S-box of Streebog, Kuznyechik and STRIBOBr1 A Biryukov, L Perrin, A Udovenko Annual international conference on the theory and applications of …, 2016 | 85 | 2016 |
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security A Canteaut, S Duval, G Leurent, M Naya-Plasencia, L Perrin, T Pornin, ... | 84 | 2019 |
Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... NIST round 2, 2019 | 80 | 2019 |
Lightweight AEAD and hashing using the sparkle permutation family C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ... IACR Transactions on Symmetric Cryptology 2020 (S1), 208-261, 2020 | 75 | 2020 |
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 75 | 2020 |
Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem L Perrin, A Udovenko, A Biryukov Annual International Cryptology Conference, 93-122, 2016 | 65 | 2016 |
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE P Derbez, L Perrin Journal of Cryptology 33, 1184-1215, 2020 | 64 | 2020 |
Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX) C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 59 | 2020 |
On reverse-engineering S-boxes with hidden design criteria or structure A Biryukov, L Perrin Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 55 | 2015 |
Differential analysis and meet-in-the-middle attack against round-reduced TWINE A Biryukov, P Derbez, L Perrin International Workshop on Fast Software Encryption, 3-27, 2015 | 52 | 2015 |
On CCZ-equivalence, extended-affine equivalence, and function twisting A Canteaut, L Perrin Finite Fields and Their Applications 56, 209-246, 2019 | 51 | 2019 |
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size A Canteaut, S Duval, L Perrin IEEE Transactions on Information Theory 63 (11), 7575-7591, 2017 | 49 | 2017 |
New design techniques for efficient arithmetization-oriented hash functions: anemoi permutations and jive compression mode C Bouvier, P Briaud, P Chaidos, L Perrin, R Salen, V Velichkov, D Willems Annual International Cryptology Conference, 507-539, 2023 | 48 | 2023 |
Cryptanalysis of Feistel networks with secret round functions A Biryukov, G Leurent, L Perrin International Conference on Selected Areas in Cryptography, 102-121, 2015 | 46 | 2015 |
More differentially 6-uniform power functions C Blondeau, L Perrin Designs, codes and cryptography 73, 487-505, 2014 | 43 | 2014 |