default search action
Léo Perrin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin:
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac. IACR Trans. Symmetric Cryptol. 2024(2): 35-67 (2024) - [c20]Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. CRYPTO (4) 2024: 139-173 - [i39]Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. IACR Cryptol. ePrint Arch. 2024: 347 (2024) - [i38]Léo Perrin:
Security Analysis of XHASH8/12. IACR Cryptol. ePrint Arch. 2024: 605 (2024) - [i37]Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes:
Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2024: 1678 (2024) - 2023
- [j23]Clémence Bouvier, Anne Canteaut, Léo Perrin:
On the algebraic degree of iterated power functions. Des. Codes Cryptogr. 91(3): 997-1033 (2023) - [j22]Aurélien Boeuf, Anne Canteaut, Léo Perrin:
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES. IACR Trans. Symmetric Cryptol. 2023(4): 270-298 (2023) - [j21]Jules Baudrin, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes:
Commutative Cryptanalysis Made Practical. IACR Trans. Symmetric Cryptol. 2023(4): 299-329 (2023) - [c19]Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems:
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode. CRYPTO (3) 2023: 507-539 - 2022
- [j20]Yuyin Yu, Léo Perrin:
Constructing more quadratic APN functions with the QAM method. Cryptogr. Commun. 14(6): 1359-1369 (2022) - [j19]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and extensions of quadratic APN functions. Des. Codes Cryptogr. 90(4): 1009-1036 (2022) - [j18]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A further study of quadratic APN permutations in dimension nine. Finite Fields Their Appl. 81: 102049 (2022) - [j17]Anne Canteaut, Alain Couvreur, Léo Perrin:
Recovering or Testing Extended-Affine Equivalence. IEEE Trans. Inf. Theory 68(9): 6187-6206 (2022) - [j16]Augustin Bariant, Clémence Bouvier, Gaëtan Leurent, Léo Perrin:
Algebraic Attacks against Some Arithmetization-Oriented Primitives. IACR Trans. Symmetric Cryptol. 2022(3): 73-101 (2022) - [j15]Jules Baudrin, Anne Canteaut, Léo Perrin:
Practical Cube Attack against Nonce-Misused Ascon. IACR Trans. Symmetric Cryptol. 2022(4): 120-144 (2022) - [d3]Christof Beierle, Gregor Leander, Léo Perrin:
Quadratic APN Extensions. Version 2.0. Zenodo, 2022 [all versions] - [d2]Christof Beierle, Gregor Leander, Léo Perrin:
Supplementary code to "Trims and extensions of quadratic APN functions". Zenodo, 2022 - [i36]Clémence Bouvier, Anne Canteaut, Léo Perrin:
On the Algebraic Degree of Iterated Power Functions. IACR Cryptol. ePrint Arch. 2022: 366 (2022) - [i35]Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Vesselin Velichkov:
Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence. IACR Cryptol. ePrint Arch. 2022: 840 (2022) - 2021
- [j14]Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli. J. Cryptol. 34(4): 45 (2021) - [j13]Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander, Léo Perrin, François-Xavier Standaert:
MOE: Multiplication Operated Encryption with Trojan Resilience. IACR Trans. Symmetric Cryptol. 2021(1): 78-129 (2021) - [d1]Christof Beierle, Gregor Leander, Léo Perrin:
Quadratic APN Extensions. Version 1.0. Zenodo, 2021 [all versions] - [i34]Anne Canteaut, Alain Couvreur, Léo Perrin:
Recovering or Testing Extended-Affine Equivalence. CoRR abs/2103.00078 (2021) - [i33]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A Further Study of Quadratic APN Permutations in Dimension Nine. CoRR abs/2104.08008 (2021) - [i32]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and Extensions of Quadratic APN Functions. CoRR abs/2108.13280 (2021) - [i31]Anne Canteaut, Alain Couvreur, Léo Perrin:
Recovering or Testing Extended-Affine Equivalence. IACR Cryptol. ePrint Arch. 2021: 225 (2021) - [i30]Yuyin Yu, Léo Perrin:
Constructing More Quadratic APN Functions with the QAM Method. IACR Cryptol. ePrint Arch. 2021: 574 (2021) - 2020
- [j12]Shizhu Tian, Christina Boura, Léo Perrin:
Boomerang uniformity of popular S-box constructions. Des. Codes Cryptogr. 88(9): 1959-1989 (2020) - [j11]Patrick Derbez, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. J. Cryptol. 33(3): 1184-1215 (2020) - [j10]Anne Canteaut, Sébastien Duval, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, André Schrottenloher:
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security. IACR Trans. Symmetric Cryptol. 2020(S1): 160-207 (2020) - [j9]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans. Symmetric Cryptol. 2020(S1): 208-261 (2020) - [c18]Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions. ASIACRYPT (1) 2020: 33-63 - [c17]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c16]Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher:
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light. CRYPTO (3) 2020: 359-388 - [c15]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). CRYPTO (3) 2020: 419-448 - [c14]Faruk Göloglu, Lukas Kölsch, Gohar M. Kyureghyan, Léo Perrin:
On Subspaces of Kloosterman Zeros and Permutations of the Form L1(x-1)+L2(x). WAIFI 2020: 207-221 - [i29]Faruk Göloglu, Lukas Kölsch, Gohar M. Kyureghyan, Léo Perrin:
On subspaces of Kloosterman zeros and permutations of the form L1(x-1)+L2(x). CoRR abs/2003.14068 (2020) - [i28]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i27]Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher:
Cryptanalysis Results on Spook. IACR Cryptol. ePrint Arch. 2020: 309 (2020) - [i26]Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
New results on Gimli: full-permutation distinguishers and improved collisions. IACR Cryptol. ePrint Arch. 2020: 744 (2020) - [i25]Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer:
On the security of the Rescue hash function. IACR Cryptol. ePrint Arch. 2020: 820 (2020)
2010 – 2019
- 2019
- [j8]Anne Canteaut, Léo Perrin, Shizhu Tian:
If a generalised butterfly is APN then it operates on 6 bits. Cryptogr. Commun. 11(6): 1147-1164 (2019) - [j7]Anne Canteaut, Léo Perrin:
On CCZ-equivalence, extended-affine equivalence, and function twisting. Finite Fields Their Appl. 56: 209-246 (2019) - [j6]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of lightweight block ciphers for the Internet of things. J. Cryptogr. Eng. 9(3): 283-302 (2019) - [j5]Léo Perrin:
Partitions in the S-Box of Streebog and Kuznyechik. IACR Trans. Symmetric Cryptol. 2019(1): 302-329 (2019) - [c13]Xavier Bonnetain, Léo Perrin, Shizhu Tian:
Anomalies and Vector Space Search: Tools for S-Box Analysis. ASIACRYPT (1) 2019: 196-223 - [c12]Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. ESORICS (2) 2019: 151-171 - [c11]Orr Dunkelman, Léo Perrin:
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. SSR 2019: 69-80 - [i24]Léo Perrin:
Partitions in the S-Box of Streebog and Kuznyechik. IACR Cryptol. ePrint Arch. 2019: 92 (2019) - [i23]Léo Perrin:
Probability 1 Iterated Differential in the SNEIK Permutation. IACR Cryptol. ePrint Arch. 2019: 374 (2019) - [i22]Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. IACR Cryptol. ePrint Arch. 2019: 397 (2019) - [i21]Xavier Bonnetain, Léo Perrin, Shizhu Tian:
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering. IACR Cryptol. ePrint Arch. 2019: 528 (2019) - [i20]Shizhu Tian, Christina Boura, Léo Perrin:
Boomerang Uniformity of Popular S-box Constructions. IACR Cryptol. ePrint Arch. 2019: 1002 (2019) - [i19]Orr Dunkelman, Léo Perrin:
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. IACR Cryptol. ePrint Arch. 2019: 1187 (2019) - [i18]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-bit ARX-box. IACR Cryptol. ePrint Arch. 2019: 1378 (2019) - 2018
- [i17]Anne Canteaut, Léo Perrin:
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting. IACR Cryptol. ePrint Arch. 2018: 713 (2018) - [i16]Anne Canteaut, Léo Perrin, Shizhu Tian:
If a Generalised Butterfly is APN then it Operates on 6 Bits. IACR Cryptol. ePrint Arch. 2018: 1036 (2018) - 2017
- [b1]Léo Perrin:
Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms. University of Luxembourg, 2017 - [j4]Anne Canteaut, Sébastien Duval, Léo Perrin:
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size 24k+2. IEEE Trans. Inf. Theory 63(11): 7575-7591 (2017) - [c10]Alex Biryukov, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. ASIACRYPT (3) 2017: 417-445 - [i15]Alex Biryukov, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. IACR Cryptol. ePrint Arch. 2017: 414 (2017) - [i14]Alex Biryukov, Léo Perrin:
State of the Art in Lightweight Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2017: 511 (2017) - [i13]Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger:
Improvements to the Linear Layer of LowMC: A Faster Picnic. IACR Cryptol. ePrint Arch. 2017: 1148 (2017) - 2016
- [j3]Léo Perrin, Aleksei Udovenko:
Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog. IACR Trans. Symmetric Cryptol. 2016(2): 99-124 (2016) - [j2]Alex Biryukov, Dmitry Khovratovich, Léo Perrin:
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Trans. Symmetric Cryptol. 2016(2): 226-247 (2016) - [c9]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: Sparx and LAX. ASIACRYPT (1) 2016: 484-513 - [c8]Léo Perrin, Aleksei Udovenko, Alex Biryukov:
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. CRYPTO (2) 2016: 93-122 - [c7]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. EUROCRYPT (1) 2016: 372-402 - [c6]Léo Perrin, Aleksei Udovenko:
Algebraic Insights into the Secret Feistel Network. FSE 2016: 378-398 - [i12]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. IACR Cryptol. ePrint Arch. 2016: 71 (2016) - [i11]Léo Perrin, Aleksei Udovenko:
Algebraic Insights into the Secret Feistel Network (Full version). IACR Cryptol. ePrint Arch. 2016: 398 (2016) - [i10]Léo Perrin, Aleksei Udovenko, Alex Biryukov:
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version). IACR Cryptol. ePrint Arch. 2016: 539 (2016) - [i9]Anne Canteaut, Sébastien Duval, Léo Perrin:
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 24k+2. IACR Cryptol. ePrint Arch. 2016: 887 (2016) - [i8]Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version). IACR Cryptol. ePrint Arch. 2016: 984 (2016) - 2015
- [c5]Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. CRYPTO (1) 2015: 116-140 - [c4]Alex Biryukov, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. FSE 2015: 3-27 - [c3]Patrick Derbez, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. FSE 2015: 190-216 - [c2]Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. SAC 2015: 102-121 - [i7]Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptol. ePrint Arch. 2015: 209 (2015) - [i6]Patrick Derbez, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. IACR Cryptol. ePrint Arch. 2015: 239 (2015) - [i5]Alex Biryukov, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. IACR Cryptol. ePrint Arch. 2015: 240 (2015) - [i4]Alex Biryukov, Gaëtan Leurent, Léo Perrin:
Cryptanalysis of Feistel Networks with Secret Round Functions. IACR Cryptol. ePrint Arch. 2015: 723 (2015) - [i3]Alex Biryukov, Léo Perrin, Aleksei Udovenko:
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob. IACR Cryptol. ePrint Arch. 2015: 812 (2015) - [i2]Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. IACR Cryptol. ePrint Arch. 2015: 976 (2015) - 2014
- [j1]Céline Blondeau, Léo Perrin:
More differentially 6-uniform power functions. Des. Codes Cryptogr. 73(2): 487-505 (2014) - [c1]Léo Perrin, Dmitry Khovratovich:
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. FSE 2014: 82-103 - [i1]Léo Perrin, Dmitry Khovratovich:
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. IACR Cryptol. ePrint Arch. 2014: 223 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint