Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Thomas Peyrin
Cryptanalysis of the ESSENCE Family of Hash Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Practical Cryptanalysis of ARMADILLO2
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Improved Rebound Attack on the Finalist Grøstl
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Counter-In-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Improved Cryptanalysis of Reduced RIPEMD-160
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Unaligned Rebound Attack: Application to Keccak
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of RadioGatún
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of FORK-256
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science