Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT J Nakahara, P Sepehrdad, B Zhang, M Wang Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 102 | 2009 |
Recursive Diffusion Layers for Block Ciphers and Hash Functions. M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad FSE 7549 (2012), 385-401, 2012 | 96 | 2012 |
Discovery and exploitation of new biases in RC4 P Sepehrdad, S Vaudenay, M Vuagnoux Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011 | 85 | 2011 |
Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers GV Bard, NT Courtois, J Nakahara, P Sepehrdad, B Zhang Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 71 | 2010 |
ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware S Badel, N Dağtekin, J Nakahara, K Ouafi, N Reffé, P Sepehrdad, P Sušil, ... Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010 | 66 | 2010 |
Statistical attack on RC4: distinguishing WPA P Sepehrdad, S Vaudenay, M Vuagnoux Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011 | 63 | 2011 |
ElimLin Algorithm Revisited NT Courtois, P Sepehrdad, P Sušil, S Vaudenay Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 39 | 2012 |
Smashing WEP in a passive attack P Sepehrdad, P Sušil, S Vaudenay, M Vuagnoux Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 29 | 2014 |
Combined algebraic and truncated differential cryptanalysis on reduced-round simon N Courtois, T Mourouzis, G Song, P Sepehrdad, P Susil 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-6, 2014 | 26 | 2014 |
Efficient Recursive Diffusion Layers for Block Ciphers, and Hash Functions M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad | 26* | |
Statistical and algebraic cryptanalysis of lightweight and ultra-lightweight symmetric primitives P Sepehrdad EPFL, 2012 | 24 | 2012 |
Distinguishing Distributions Using Chernoff Information. T Baigneres, P Sepehrdad, S Vaudenay ProvSec, 144-165, 2010 | 19 | 2010 |
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations P Sušil, P Sepehrdad, S Vaudenay, N Courtois International Journal of Information Security 15, 51-65, 2016 | 17* | 2016 |
Cryptanalysis of the ISDB scrambling algorithm (MULTI2) JP Aumasson, J Nakahara, P Sepehrdad Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven …, 2009 | 14 | 2009 |
Tornado Attack on RC4 with Applications to WEP and WPA P Sepehrdad, P Susil, S Vaudenay, M Vuagnoux Cryptology ePrint Archive, 2015 | 9 | 2015 |
Fast Key Recovery Attack on ARMADILLO1 and Variants P Sepehrdad, P Sušil, S Vaudenay Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 …, 2011 | 7 | 2011 |
Predicting outcomes of ElimLin attack on lightweight block cipher simon N Courtois, G Song, I Papapanagiotakis-Bousy, P Sepehrdad SECRYPT 2016 4, 465-470, 2016 | 5 | 2016 |
Robert R. Enderlein S Vaudenay, P Sepehrdad | | 2010 |
Group ID U10433 Affiliated authors Aellig, Alexandre D Aggarwal, G Avoine, T Baignères, MF Balli, S Banik, K Barooti, A Bay, ... | | |