Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Thomas Peyrin

Cryptanalysis of the ESSENCE Family of Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Practical Cryptanalysis of ARMADILLO2

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Improved Rebound Attack on the Finalist Grøstl

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Counter-In-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

Improved Cryptanalysis of Reduced RIPEMD-160

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Unaligned Rebound Attack: Application to Keccak

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Cryptanalysis of RadioGatún

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Cryptanalysis of FORK-256

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy