Follow
Ferdinand Sibleyras
Ferdinand Sibleyras
NTT Social Informatics Laboratories
Verified email at sibleyras.fr
Title
Cited by
Cited by
Year
Generic attacks against beyond-birthday-bound MACs
G Leurent, M Nandi, F Sibleyras
Annual International Cryptology Conference, 306-336, 2018
312018
On the security margin of TinyJAMBU with refined differential and linear cryptanalysis
D Saha, Y Sasaki, D Shi, F Sibleyras, S Sun, Y Zhang
IACR Transactions on Symmetric Cryptology, 152-174, 2020
272020
Beyond quadratic speedups in quantum attacks on symmetric schemes
X Bonnetain, A Schrottenloher, F Sibleyras
Annual International Conference on the Theory and Applications of …, 2022
222022
New results on Gimli: full-permutation distinguishers and improved collisions
A Flórez Gutiérrez, G Leurent, M Naya-Plasencia, L Perrin, ...
International Conference on the Theory and Application of Cryptology and …, 2020
222020
Low-memory attacks against two-round even-mansour using the 3-XOR problem
G Leurent, F Sibleyras
Annual International Cryptology Conference, 210-235, 2019
182019
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology, 119-146, 2019
172019
The missing difference problem, and its applications to counter mode encryption
G Leurent, F Sibleyras
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
162018
Cryptanalysis of Rocca and feasibility of its security claim
A Hosoyamada, A Inoue, R Ito, T Iwata, K Minematsu, F Sibleyras, Y Todo
IACR Transactions on Symmetric Cryptology, 123-151, 2022
92022
Birthday-bound slide attacks on TinyJAMBU’s keyed-permutations for all key sizes
F Sibleyras, Y Sasaki, Y Todo, A Hosoyamada, K Yasuda
International Workshop on Security, 107-127, 2022
82022
Internal symmetries and linear properties: Full-permutation distinguishers and improved collisions on Gimli
A Flórez-Gutiérrez, G Leurent, M Naya-Plasencia, L Perrin, ...
Journal of Cryptology 34 (4), 45, 2021
52021
Generic attack on iterated tweakable FX constructions
F Sibleyras
Cryptographers’ Track at the RSA Conference, 1-14, 2020
52020
Cryptanalysis of the Counter mode of operation
F Sibleyras
Paris 7, 2017
52017
Key committing security of AEZ and more
YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ...
IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023
22023
Security of Modes of Operation and other provably secure cryptographic schemes
F Sibleyras
Sorbonne Université, 2020
22020
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli
AF Gutiérrez, G Leurent, M Naya-Plasencia, L Perrin, A Schrottenloher, ...
Cryptology ePrint Archive, 2020
12020
Keyed Sum of Permutations: a simpler RP-based PRF
F Sibleyras, Y Todo
Cryptographers’ Track at the RSA Conference, 573-593, 2023
2023
Key-reduced variants of 3kf9 with beyond-birthday-bound security
Y Shen, F Sibleyras
International Conference on the Theory and Application of Cryptology and …, 2022
2022
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications
K Kapusta, M Rambaud, F Sibleyras
Cryptology ePrint Archive, 2022
2022
Release of unverified plaintext: tight unified model and application to ANYDAE
M Nandi, F Sibleyras, B Mennink, D Chang, S Sanadhya, A Dutta, N Datta
2021
Sécurité des Modes d'Opération et d'autres constructions formellement sûres
F Sibleyras
2020
The system can't perform the operation now. Try again later.
Articles 1–20