2008 |
13 | EE | Michael Gorski,
Stefan Lucks,
Thomas Peyrin:
Slide Attacks on a Class of Hash Functions.
ASIACRYPT 2008: 143-160 |
12 | EE | Stéphane Manuel,
Thomas Peyrin:
Collisions on SHA-0 in One Hour.
FSE 2008: 16-35 |
11 | EE | Emmanuel Bresson,
Benoît Chevallier-Mames,
Christophe Clavier,
Aline Gouget,
Pascal Paillier,
Thomas Peyrin:
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
ProvSec 2008: 241-253 |
2007 |
10 | EE | Olivier Billet,
Matthew J. B. Robshaw,
Thomas Peyrin:
On Building Hash Functions from Multivariate Quadratic Equations.
ACISP 2007: 82-95 |
9 | EE | Thomas Peyrin:
Cryptanalysis of Grindahl.
ASIACRYPT 2007: 551-567 |
8 | EE | Antoine Joux,
Thomas Peyrin:
Hash Functions and the (Amplified) Boomerang Attack.
CRYPTO 2007: 244-263 |
7 | EE | Yannick Seurin,
Thomas Peyrin:
Security Analysis of Constructions Combining FIL Random Oracles.
FSE 2007: 119-136 |
6 | EE | Krystian Matusiewicz,
Thomas Peyrin,
Olivier Billet,
Scott Contini,
Josef Pieprzyk:
Cryptanalysis of FORK-256.
FSE 2007: 19-38 |
2006 |
5 | EE | Thomas Peyrin,
Henri Gilbert,
Frédéric Muller,
Matthew J. B. Robshaw:
Combining Compression Functions and Block Cipher-Based Hash Functions.
ASIACRYPT 2006: 315-331 |
4 | EE | Frédéric Muller,
Thomas Peyrin:
Cryptanalysis of T-Function-Based Hash Functions.
ICISC 2006: 267-285 |
2005 |
3 | EE | Frédéric Muller,
Thomas Peyrin:
Linear Cryptanalysis of the TSC Family of Stream Ciphers.
ASIACRYPT 2005: 373-394 |
2 | | Thomas Peyrin,
Serge Vaudenay:
The Pairing Problem with User Interaction.
SEC 2005: 251-266 |
2004 |
1 | EE | Gildas Avoine,
Jean Monnerat,
Thomas Peyrin:
Advances in Alternative Non-adjacent Form Representations.
INDOCRYPT 2004: 260-274 |