A deeper look at machine learning-based cryptanalysis A Benamira, D Gerault, T Peyrin, QQ Tan Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 122 | 2021 |
Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017 | 100 | 2017 |
Constraint programming models for chosen key differential cryptanalysis D Gerault, M Minier, C Solnon Principles and Practice of Constraint Programming: 22nd International …, 2016 | 79 | 2016 |
Revisiting AES related-key differential attacks with constraint programming D Gérault, P Lafourcade, M Minier, C Solnon Information Processing Letters 139, 24-29, 2018 | 58 | 2018 |
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 49 | 2017 |
Computing AES related-key differential characteristics with constraint programming D Gérault, P Lafourcade, M Minier, C Solnon Artificial intelligence 278, 103183, 2020 | 41 | 2020 |
Exploring differential-based distinguishers and forgeries for ASCON D Gérault, T Peyrin, QQ Tan Cryptology ePrint Archive, 2021 | 33 | 2021 |
Related-key cryptanalysis of midori D Gérault, P Lafourcade International Conference on Cryptology in India, 287-304, 2016 | 32 | 2016 |
Survey of distance bounding protocols and threats A Brelurut, D Gerault, P Lafourcade Foundations and Practice of Security: 8th International Symposium, FPS 2015 …, 2016 | 32 | 2016 |
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 27 | 2016 |
Fully automated differential-linear attacks against ARX ciphers E Bellini, D Gerault, J Grados, RH Makarim, T Peyrin Cryptographers’ Track at the RSA Conference, 252-276, 2023 | 20 | 2023 |
A cipher-agnostic neural training pipeline with automated finding of good input differences E Bellini, D Gerault, A Hambitzer, M Rossi IACR Transactions on Symmetric Cryptology 2023 (3), 184-212, 2023 | 17 | 2023 |
Verifiable private polynomial evaluation X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade International Conference on Provable Security, 487-506, 2017 | 17 | 2017 |
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives E Bellini, D Gerault, J Grados, YJ Huang, R Makarim, M Rachidi, S Tiwari International Conference on Selected Areas in Cryptography, 387-408, 2023 | 13 | 2023 |
On the usage of deterministic (related-key) truncated differentials and multidimensional linear approximations for SPN ciphers L Sun, D Gerault, W Wang, M Wang IACR Transactions on Symmetric Cryptology, 262-287, 2020 | 12 | 2020 |
Using constraint programming to solve a cryptanalytic problem D Gerault, M Minier, C Solnon IJCAI 2017-International Joint Conference on Artificial Intelligence (Sister …, 2017 | 12 | 2017 |
Neurogift: Using a machine learning based sat solver for cryptanalysis L Sun, D Gerault, A Benamira, T Peyrin Cyber Security Cryptography and Machine Learning: Fourth International …, 2020 | 10 | 2020 |
Boosting differential-linear cryptanalysis of ChaCha7 with MILP E Bellini, D Gerault, J Grados, RH Makarim, T Peyrin IACR Transactions on Symmetric Cryptology, 2023 | 9 | 2023 |
And rijndael? Automatic related-key differential analysis of rijndael L Rouquette, D Gerault, M Minier, C Solnon International Conference on Cryptology in Africa, 150-175, 2022 | 9 | 2022 |
Mechanised models and proofs for distance-bounding I Boureanu, CC Drăgan, F Dupressoir, D Gérault, P Lafourcade 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021 | 9 | 2021 |