


default search action
Henri Gilbert
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c41]Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of Elisabeth-4. ASIACRYPT (3) 2023: 256-284 - [c40]Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella:
Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics. EUROCRYPT (4) 2023: 348-378 - [i14]Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella:
Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics. IACR Cryptol. ePrint Arch. 2023: 262 (2023) - [i13]Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of Elisabeth-4. IACR Cryptol. ePrint Arch. 2023: 1436 (2023) - 2020
- [i12]Daniel J. Bernstein, Henri Gilbert, Meltem Sönmez Turan:
Observations on COMET. IACR Cryptol. ePrint Arch. 2020: 1445 (2020)
2010 – 2019
- 2019
- [j8]Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of NORX v2.0. J. Cryptol. 32(4): 1423-1447 (2019) - [c39]Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. CT-RSA 2019: 272-292 - [i11]Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. IACR Cryptol. ePrint Arch. 2019: 75 (2019) - 2018
- [j7]Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo
, Jérémy Jean, Jean-René Reinhard, Ling Song
:
Key-Recovery Attacks on Full Kravatte. IACR Trans. Symmetric Cryptol. 2018(1): 5-28 (2018) - 2017
- [j6]Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of NORX v2.0. IACR Trans. Symmetric Cryptol. 2017(1): 156-174 (2017) - 2016
- [j5]Colin Chaigneau, Henri Gilbert:
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? IACR Trans. Symmetric Cryptol. 2016(1): 114-133 (2016) - [i10]Colin Chaigneau, Henri Gilbert:
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? IACR Cryptol. ePrint Arch. 2016: 832 (2016) - 2015
- [c38]Henri Gilbert, Jérôme Plût, Joana Treger:
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes. CRYPTO (1) 2015: 475-490 - [c37]Florian Maury, Jean-René Reinhard, Olivier Levillain
, Henri Gilbert:
Format Oracles on OpenPGP. CT-RSA 2015: 220-236 - [i9]Henri Gilbert, Jérôme Plût, Joana Treger:
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes. IACR Cryptol. ePrint Arch. 2015: 567 (2015) - 2014
- [c36]Henri Gilbert:
A Simplified Representation of AES. ASIACRYPT (1) 2014: 200-222 - [c35]Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard:
Multiple Differential Cryptanalysis of Round-Reduced PRINCE. FSE 2014: 591-610 - [i8]Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard:
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version). IACR Cryptol. ePrint Arch. 2014: 89 (2014) - 2013
- [c34]Gilles Macario-Rat, Jérôme Plût, Henri Gilbert:
New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography. ASIACRYPT (1) 2013: 117-133 - [i7]Gilles Macario-Rat, Jérôme Plût, Henri Gilbert:
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography. IACR Cryptol. ePrint Arch. 2013: 799 (2013) - 2011
- [c33]Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau:
Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. Selected Areas in Cryptography 2011: 230-242 - 2010
- [c32]Olivier Billet, Jonathan Etrog, Henri Gilbert:
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. FSE 2010: 55-74 - [c31]Henri Gilbert, Thomas Peyrin:
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. FSE 2010: 365-383 - [e2]Henri Gilbert:
Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings. Lecture Notes in Computer Science 6110, Springer 2010, ISBN 978-3-642-13189-9 [contents] - [i6]Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau:
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3. IACR Cryptol. ePrint Arch. 2010: 618 (2010)
2000 – 2009
- 2009
- [j4]Côme Berbain, Henri Gilbert, Jacques Patarin:
QUAD: A multivariate stream cipher with provable security. J. Symb. Comput. 44(12): 1703-1723 (2009) - [c30]Côme Berbain, Olivier Billet
, Jonathan Etrog, Henri Gilbert:
An efficient forward private RFID protocol. CCS 2009: 43-53 - [i5]Henri Gilbert, Thomas Peyrin:
Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations. IACR Cryptol. ePrint Arch. 2009: 531 (2009) - 2008
- [c29]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
HB#: Increasing the Security and Efficiency of HB+. EUROCRYPT 2008: 361-378 - [c28]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
Good Variants of HB+ Are Hard to Find. Financial Cryptography 2008: 156-170 - [c27]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
How to Encrypt with the LPN Problem. ICALP (2) 2008: 679-690 - [c26]Côme Berbain, Henri Gilbert, Antoine Joux:
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers. Selected Areas in Cryptography 2008: 184-198 - [p2]Côme Berbain, Olivier Billet
, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
Sosemanuk, a Fast Software-Oriented Stream Cipher. The eSTREAM Finalists 2008: 98-118 - [p1]Côme Berbain, Olivier Billet
, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
Decimv2. The eSTREAM Finalists 2008: 140-151 - [i4]Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
SOSEMANUK: a fast software-oriented stream cipher. CoRR abs/0810.1858 (2008) - [i3]Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
HB#: Increasing the Security and Efficiency of HB+. IACR Cryptol. ePrint Arch. 2008: 28 (2008) - 2007
- [c25]David Arditti, Côme Berbain, Olivier Billet
, Henri Gilbert:
Compact FPGA implementations of QUAD. AsiaCCS 2007: 347-349 - [c24]Côme Berbain, Henri Gilbert:
On the Security of IV Dependent Stream Ciphers. FSE 2007: 254-273 - [i2]David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert, Jacques Patarin:
QUAD: Overview and Recent Developments. Symmetric Cryptography 2007 - 2006
- [c23]Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw:
Combining Compression Functions and Block Cipher-Based Hash Functions. ASIACRYPT 2006: 315-331 - [c22]Côme Berbain, Henri Gilbert, Jacques Patarin:
QUAD: A Practical Stream Cipher with Provable Security. EUROCRYPT 2006: 109-128 - [c21]Côme Berbain, Henri Gilbert, Alexander Maximov:
Cryptanalysis of Grain. FSE 2006: 15-29 - [c20]Côme Berbain, Olivier Billet
, Henri Gilbert:
Efficient Implementations of Multivariate Quadratic Systems. Selected Areas in Cryptography 2006: 174-187 - [c19]Olivier Billet, Henri Gilbert:
Cryptanalysis of Rainbow. SCN 2006: 336-347 - 2005
- [c18]Olivier Billet, Henri Gilbert:
Resistance of SNOW 2.0 Against Algebraic Attacks. CT-RSA 2005: 19-28 - [e1]Henri Gilbert, Helena Handschuh:
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3557, Springer 2005, ISBN 3-540-26541-4 [contents] - [i1]Henri Gilbert, Matthew J. B. Robshaw, Hervé Sibert:
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. IACR Cryptol. ePrint Arch. 2005: 237 (2005) - 2004
- [c17]Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi:
Cryptanalysis of a White Box AES Implementation. Selected Areas in Cryptography 2004: 227-240 - 2003
- [c16]Olivier Billet, Henri Gilbert:
A Traceable Block Cipher. ASIACRYPT 2003: 331-346 - [c15]Henri Gilbert:
The Security of "One-Block-to-Many" Modes of Operation. FSE 2003: 376-395 - [c14]Henri Gilbert, Helena Handschuh:
Security Analysis of SHA-256 and Sisters. Selected Areas in Cryptography 2003: 175-193 - 2002
- [c13]Henri Gilbert, Marine Minier:
Cryptanalysis of SFLASH. EUROCRYPT 2002: 288-298 - 2001
- [c12]Christophe Debaert, Henri Gilbert:
The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. FSE 2001: 52-65 - [c11]Henri Gilbert, Marine Minier:
New Results on the Pseudorandomness of Some Blockcipher Constructions. FSE 2001: 248-266 - 2000
- [j3]Thierry Baritaud, Henri Gilbert, Sébastien Nguyen Ngoc:
Security services for protecting radio mobile systems. Ann. des Télécommunications 55(7-8): 352-360 (2000) - [c10]Henri Gilbert, Marine Minier:
A Collision Attack on 7 Rounds of Rijndael. AES Candidate Conference 2000: 230-241 - [c9]Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay:
A Statistical Attack on RC6. FSE 2000: 64-74 - [c8]Marine Minier, Henri Gilbert:
Stochastic Cryptanalysis of Crypton. FSE 2000: 121-133
1990 – 1999
- 1998
- [j2]Henri Gilbert, Dipankar Gupta, Andrew M. Odlyzko, Jean-Jacques Quisquater:
Attacks on Shamir's 'RSA for Paranoids'. Inf. Process. Lett. 68(4): 197-199 (1998) - [c7]Henri Gilbert:
Techniques for Low Cost Authentication and Message Authentication. CARDIS 1998: 183-192 - 1997
- [j1]Michel Bouché, Pascal Sallagoity, Milena Harito Shteto, Dominique Demange, Henri Gilbert, David Gesbert, Delphine Maury, Frédéric Gaillard:
Résumés de thèse. Ann. des Télécommunications 52(9-10): 536-538 (1997) - [c6]Helena Handschuh, Henri Gilbert:
x2 Cryptanalysis of the SEAL Encryption Algorithm. FSE 1997: 1-12 - 1994
- [c5]Henri Gilbert, Pascal Chauvaud:
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. CRYPTO 1994: 359-368 - 1992
- [c4]Thierry Baritaud, Mireille Campana, Pascal Chauvaud, Henri Gilbert:
On the Security of the Permuted Kernel Identification Scheme. CRYPTO 1992: 305-311 - [c3]Thierry Baritaud, Henri Gilbert, Marc Girault:
FFT Hashing is not Collision-free. EUROCRYPT 1992: 35-44 - 1991
- [c2]Anne Tardy-Corfdir, Henri Gilbert:
A Known Plaintext Attack of FEAL-4 and FEAL-6. CRYPTO 1991: 172-181 - 1990
- [c1]Henri Gilbert, Guy Chassé:
A Statistical Attack of the FEAL-8 Cryptosystem. CRYPTO 1990: 22-33
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint