Patrick Derbez
Patrick Derbez
Université Rennes 1
Verified email at
Cited by
Cited by
Improved key recovery attacks on reduced-round AES in the single-key setting
P Derbez, PA Fouque, J Jean
Annual International Conference on the Theory and Applications of …, 2013
Automatic search of attacks on round-reduced AES and applications
C Bouillaguet, P Derbez, PA Fouque
Annual Cryptology Conference, 169-187, 2011
Low-data complexity attacks on AES
C Bouillaguet, P Derbez, O Dunkelman, PA Fouque, N Keller, V Rijmen
IEEE transactions on information theory 58 (11), 7002-7017, 2012
Key-Recovery Attacks on ASASA
B Minaud, P Derbez, PA Fouque, P Karpman
Journal of Cryptology 31 (3), 845-884, 2018
Exhausting Demirci-Selçuk meet-in-the-middle attacks against reduced-round AES
P Derbez, PA Fouque
International workshop on fast software encryption, 541-560, 2013
Meet-in-the-middle and impossible differential fault analysis on AES
P Derbez, PA Fouque, D Leresteux
International Workshop on Cryptographic Hardware and Embedded Systems, 274-291, 2011
Automatic search of meet-in-the-middle and impossible differential attacks
P Derbez, PA Fouque
Annual International Cryptology Conference, 157-184, 2016
Differential analysis and meet-in-the-middle attack against round-reduced TWINE
A Biryukov, P Derbez, L Perrin
International Workshop on Fast Software Encryption, 3-27, 2015
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
P Derbez, L Perrin
Journal of Cryptology, 1-32, 2020
Faster Chosen-Key Distinguishers on Reduced-Round AES
P Derbez, PA Fouque, J Jean
International Conference on Cryptology in India, 225-243, 2012
Note on impossible differential attacks
P Derbez
International Conference on Fast Software Encryption, 416-427, 2016
Simulating the migration and growth patterns of Bacillus subtilis
M Badoual, P Derbez, M Aubert, B Grammaticos
Physica A: Statistical Mechanics and its Applications 388 (4), 549-559, 2009
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and …, 2018
On recovering affine encodings in white-box implementations
P Derbez, PA Fouque, B Lambin, B Minaud
IACR Transactions on Cryptographic Hardware and Embedded Systems, 121-149, 2018
Meet-in-the-middle attacks on AES
P Derbez
Efficient search for optimal diffusion layers of generalized feistel networks
P Derbez, PA Fouque, B Lambin, V Mollimard
IACR Transactions on Symmetric Cryptology, 218-240, 2019
Cryptanalysis Results on Spook.
P Derbez, P Huynh, V Lallemand, M Naya-Plasencia, L Perrin, ...
IACR Cryptol. ePrint Arch. 2020, 309, 2020
Troika: a ternary cryptographic hash function
S Kölbl, E Tischhauser, P Derbez, A Bogdanov
Designs, Codes and Cryptography 88 (1), 91-117, 2020
Linearly equivalent S-boxes and the Division Property.
P Derbez, PA Fouque, B Lambin
IACR Cryptol. ePrint Arch. 2019, 97, 2019
Variants of the AES key schedule for better truncated differential bounds
P Derbez, PA Fouque, J Jean, B Lambin
International Conference on Selected Areas in Cryptography, 27-49, 2018
The system can't perform the operation now. Try again later.
Articles 1–20