David GERAULT
Title
Cited by
Cited by
Year
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
432017
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gerault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
352017
Constraint programming models for chosen key differential cryptanalysis
D Gerault, M Minier, C Solnon
International Conference on Principles and Practice of Constraint …, 2016
332016
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
232018
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
212016
Related-key cryptanalysis of midori
D Gérault, P Lafourcade
International Conference on Cryptology in India, 287-304, 2016
202016
Survey of distance bounding protocols and threats
A Brelurut, D Gerault, P Lafourcade
International Symposium on Foundations and Practice of Security, 29-49, 2015
142015
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
132017
Processing and characterization of new passive and active oxysulfide glasses in the Ge–Ga–Sb–S–O system
L Petit, J Abel, T Anderson, J Choi, V Nazabal, V Moizan, M Couzi, ...
Journal of Solid State Chemistry 182 (10), 2646-2655, 2009
92009
Using constraint programming to solve a cryptanalytic problem
D Gerault, M Minier, C Solnon
62017
Computing AES related-key differential characteristics with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Artificial Intelligence 278, 103183, 2020
42020
Security analysis of contactless communication protocols
D Gerault
Université Clermont Auvergne, 2018
42018
Breaking and Fixing the HB+ DB protocol
I Boureanu, D Gerault, P Lafourcade, C Onete
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
22017
Combining solvers to solve a cryptanalytic problem
D Gerault, P Lafourcade, M Minier, C Solnon
CP 2017-Doctoral program 9, 104, 2017
22017
Verifiable and Private Oblivious Polynomial Evaluation
H Gajera, M Giraud, D Gérault, ML Das, P Lafourcade
IFIP International Conference on Information Security Theory and Practice, 49-65, 2019
12019
Distance bounding under different assumptions: opinion
D Gerault, I Boureanu
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
12019
Implementation-Level Corruptions in Distance Bounding-Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass-.
I Boureanu, D Gerault, P Lafourcade
IACR Cryptol. ePrint Arch. 2018, 1243, 2018
12018
BoxDB: Realistic Adversary Model for Distance Bounding
I Boureanu, D Gerault, P Lafourcade
1
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers
L Sun, D Gerault, W Wang, M Wang
IACR Transactions on Symmetric Cryptology, 262-287, 2020
2020
NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis
L Sun, D Gerault, A Benamira, T Peyrin
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20