Pouyan Sepehrdad
Pouyan Sepehrdad
Senior Staff Engineer / Manager at Qualcomm Technologies Inc.
Verified email at - Homepage
Cited by
Cited by
Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT
J Nakahara, P Sepehrdad, B Zhang, M Wang
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
Recursive Diffusion Layers for Block Ciphers and Hash Functions.
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
FSE 7549 (2012), 385-401, 2012
Discovery and exploitation of new biases in RC4
P Sepehrdad, S Vaudenay, M Vuagnoux
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers
GV Bard, NT Courtois, J Nakahara, P Sepehrdad, B Zhang
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware
S Badel, N Dağtekin, J Nakahara, K Ouafi, N Reffé, P Sepehrdad, P Sušil, ...
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
Statistical attack on RC4: distinguishing WPA
P Sepehrdad, S Vaudenay, M Vuagnoux
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
ElimLin Algorithm Revisited
NT Courtois, P Sepehrdad, P Sušil, S Vaudenay
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
Smashing WEP in a passive attack
P Sepehrdad, P Sušil, S Vaudenay, M Vuagnoux
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
Combined algebraic and truncated differential cryptanalysis on reduced-round simon
N Courtois, T Mourouzis, G Song, P Sepehrdad, P Susil
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-6, 2014
Efficient Recursive Diffusion Layers for Block Ciphers, and Hash Functions
M Sajadieh, M Dakhilalian, H Mala, P Sepehrdad
Statistical and algebraic cryptanalysis of lightweight and ultra-lightweight symmetric primitives
P Sepehrdad
EPFL, 2012
Distinguishing Distributions Using Chernoff Information.
T Baigneres, P Sepehrdad, S Vaudenay
ProvSec, 144-165, 2010
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
P Sušil, P Sepehrdad, S Vaudenay, N Courtois
International Journal of Information Security 15, 51-65, 2016
Cryptanalysis of the ISDB scrambling algorithm (MULTI2)
JP Aumasson, J Nakahara, P Sepehrdad
Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven …, 2009
Tornado Attack on RC4 with Applications to WEP and WPA
P Sepehrdad, P Susil, S Vaudenay, M Vuagnoux
Cryptology ePrint Archive, 2015
Fast Key Recovery Attack on ARMADILLO1 and Variants
P Sepehrdad, P Sušil, S Vaudenay
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 …, 2011
Predicting outcomes of ElimLin attack on lightweight block cipher simon
N Courtois, G Song, I Papapanagiotakis-Bousy, P Sepehrdad
SECRYPT 2016 4, 465-470, 2016
Robert R. Enderlein
S Vaudenay, P Sepehrdad
Group ID U10433 Affiliated authors Aellig, Alexandre
D Aggarwal, G Avoine, T Baignères, MF Balli, S Banik, K Barooti, A Bay, ...
The system can't perform the operation now. Try again later.
Articles 1–19