Publications
Here is a full list of my publications:
Bibliographical data is also available from DBLP and from my Google Scholar profile.
Conference papers
Cryptanalysis of WIDEA
Conference:
FSE 2013 (©IACR)
Authors:
Gaëtan Leurent
Keywords:
Cryptanalysis, block cipher, hash function, truncated differential, IDEA, WIDEA, HIDEA
Time-memory Trade-offs for Near-collisions
Conference:
FSE 2013 (©IACR)
Authors:
Gaëtan Leurent
Keywords:
Hash function, near-collision, generic attacks, time-memory trade-off
Analysis of Differential Attacks in ARX Constructions
Conference:
Asiacrypt 2012 (©IACR)
Authors:
Gaëtan Leurent
Keywords:
Symmetric ciphers, hash functions, ARX, generalized characteristics, differential attacks, boomerang attacks
See also:
ARXtoolsCryptanalysis of the “Kindle” Cipher
Conference:
SAC 2012
Authors:
Alex Biryukov, Gaëtan Leurent, Arnab Roy
Keywords:
Cryptanalysis, stream cipher, hash function, Pukall Cipher, PC1, PSCHF, MobiPocket, Amazon Kindle, e-book
Boomerang Attacks on Hash Function using Auxiliary Differentials
Conference:
CT-RSA 2012
Authors:
Gaëtan Leurent, Arnab Roy
Keywords:
Hash function, SHA-3 competition, chosen-key, Skein, Threefish, boomerang attack, higher order differential, zero-sum
Practical Near-Collisions on the Compression Function of BMW
Conference:
FSE 2011 (©IACR)
Authors:
Gaëtan Leurent, Søren S. Thomsen
Keywords:
Hash function, SHA-3, BMW, ARX, cryptanalysis, partial-collision, near-collision
Security Analysis of SIMD
Conference:
SAC 2010
Authors:
Charles Bouillaguet, Gaëtan Leurent, Pierre-Alain Fouque
Keywords:
Hash function, SHA-3, SIMD, Distinguisher, Security proof
Attacks on Hash Functions based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3₅₁₂
Conference:
SAC 2010
Authors:
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
Keywords:
Cryptanalysis, Hash function, Generalized Feistel, Cancellation property, SHA-3, Lesamnta, SHAvite-3
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3₅₁₂
Conference:
Africacrypt 2010
Authors:
Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer
Keywords:
Cryptanalysis, Hash function, SHA-3, SHAvite-3
Download:
paperCryptanalysis of ESSENCE
Conference:
FSE 2010 (©IACR)
Authors:
María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
Keywords:
Cryptanalysis, Hash function, SHA-3, ESSENCE
Download:
paperAnother Look at the Complementation Property
Conference:
FSE 2010 (© IACR)
Authors:
Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent
Keywords:
Cryptanalysis, DES complementation property, Self-similarity, Hash function, SHA-3, Lesamnta, ESSENCE, Block cipher, XTEA, PURE
Practical Key Recovery Attack against Secret-IV Edon-R
Conference:
CT-RSA 2010
Authors:
Gaëtan Leurent
Keywords:
Cryptanalysis, Hash function, Edon-R, MAC
Practical Electromagnetic Template Attack on HMAC
Conference:
CHESS 2009 (©IACR)
Authors:
Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette
Keywords:
Side-channel cryptanalysis, HMAC, SHA-1
Download:
paperHow Risky is the Random Oracle Model?
Conference:
Crypto 2009 (©IACR)
Authors:
Gaëtan Leurent, Phong Nguyen
Keywords:
Random Oracle Model (ROM), instantiation, hash function
Download:
paperMD4 is not One-Way
Conference:
FSE 2008 (©IACR)
Authors:
Gaëtan Leurent
Keywords:
Cryptanalysis, Hash function, MD4, preimage
Cryptanalysis of a Hash Function Based on Quasi-Cyclic Codes
Conference:
CT-RSA 2008
Authors:
Pierre-Alain Fouque, Gaëtan Leurent
Keywords:
Cryptanalysis, Hash function, Fast Syndrome Based (FSB), IFSB
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Conference:
Crypto 2007 (©IACR)
Authors:
Pierre-Alain Fouque, Gaëtan Leurent, Phong Nguyen
Keywords:
Cryptanalysis, Hash function, HMAC, MAC, MD4, MD5
Automatic Search of Differential Path in MD4
Conference:
ECRYPT Hash Workshop 2007
Authors:
Pierre-Alain Fouque, Gaëtan Leurent, Phong Nguyen
Keywords:
Cryptanalysis, Hash function, MD4, Differential paths
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Conference:
FSE 2007 (©IACR)
Authors:
Gaëtan Leurent
Keywords:
Cryptanalysis, Hash function, message modifications, APOP authentication, POP3
An Analysis of the XSL Algorithm
Conference:
Asiacrypt 2005 (©IACR)
Authors:
Carlos Cid, Gaëtan Leurent
Keywords:
Cryptanalysis, AES, Algebraic attacks, XL, XSL, Linearization
Download:
paperJournal papers
Practical key-recovery attack against APOP, an MD5 based challenge-response authentication
Journal:
International Journal of Applied Cryptography (IJACT)
Authors:
Gaëtan Leurent
Keywords:
Cryptanalysis, Hash function, message modifications, APOP authentication, POP3
Download:
paperPreprints
Construction of Differential Characteristics in ARX Designs — Application to Skein
Seminar talks
Differential Attacks against ARX Designs
Date:
December 6, 2012
Keywords:
Symmetric ciphers, hash functions, ARX, Skein, generalized characteristics, differential attacks
Download:
slidesBoomerang Attacks against ARX Hash Functions
Date:
2012
Keywords:
Symmetric ciphers, hash functions, ARX, generalized characteristics, differential attacks, boomerang attacks
Download:
slidesAnalisys of some SHA-3 candidates
A Look at the SHA-3 Competiton: Design and Analysis of Hash Functions
PhD Thesis
Design and Analysis of Hash Functions
Language:
French (introduction), English (main part)
Keywords:
Symmetric cryptography, Hash functions, design, cryptanalysis.