Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR Transactions on Symmetric Cryptology 2017 (1), 281--306, 2017 | 43 | 2017 |
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gerault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 38 | 2017 |
Constraint programming models for chosen key differential cryptanalysis D Gerault, M Minier, C Solnon International Conference on Principles and Practice of Constraint …, 2016 | 34 | 2016 |
Revisiting AES related-key differential attacks with constraint programming D Gérault, P Lafourcade, M Minier, C Solnon Information Processing Letters 139, 24-29, 2018 | 24 | 2018 |
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 24 | 2016 |
Related-key cryptanalysis of Midori D Gérault, P Lafourcade International Conference on Cryptology in India, 287-304, 2016 | 20 | 2016 |
Survey of distance bounding protocols and threats A Brelurut, D Gerault, P Lafourcade International symposium on foundations and practice of security, 29-49, 2015 | 18 | 2015 |
Verifiable private polynomial evaluation X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade International Conference on Provable Security, 487-506, 2017 | 14 | 2017 |
Processing and characterization of new passive and active oxysulfide glasses in the Ge–Ga–Sb–S–O system L Petit, J Abel, T Anderson, J Choi, V Nazabal, V Moizan, M Couzi, ... Journal of Solid State Chemistry 182 (10), 2646-2655, 2009 | 9 | 2009 |
Using constraint programming to solve a cryptanalytic problem D Gerault, M Minier, C Solnon IJCAI 2017-International Joint Conference on Artificial Intelligence (Sister …, 2017 | 8 | 2017 |
Computing AES related-key differential characteristics with constraint programming D Gérault, P Lafourcade, M Minier, C Solnon Artificial Intelligence 278, 103183, 2020 | 6 | 2020 |
Security analysis of contactless communication protocols D Gerault Université Clermont Auvergne, 2018 | 5 | 2018 |
Breaking and fixing the HB+ DB protocol I Boureanu, D Gerault, P Lafourcade, C Onete Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 2 | 2017 |
Combining solvers to solve a cryptanalytic problem D Gerault, P Lafourcade, M Minier, C Solnon CP 2017-Doctoral program 9, 104, 2017 | 2 | 2017 |
A Deeper Look at Machine Learning-Based Cryptanalysis A Benamira, D Gerault, T Peyrin, QQ Tan IACR Cryptol. ePrint Arch 287, 2021, 2021 | 1 | 2021 |
Verifiable and private oblivious polynomial evaluation H Gajera, M Giraud, D Gérault, ML Das, P Lafourcade IFIP International Conference on Information Security Theory and Practice, 49-65, 2019 | 1 | 2019 |
Distance bounding under different assumptions: opinion D Gerault, I Boureanu Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 1 | 2019 |
Implementation-Level Corruptions in Distance Bounding-Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass-. I Boureanu, D Gerault, P Lafourcade IACR Cryptol. ePrint Arch. 2018, 1243, 2018 | 1 | 2018 |
From Relay Attacks to Distance-Bounding Protocols G Avoine, I Boureanu, D Gérault, GP Hancke, P Lafourcade, C Onete Security of Ubiquitous Computing Systems, 113-130, 2012 | 1 | 2012 |
Boxdb: Realistic adversary model for distance bounding I Boureanu, D Gerault, P Lafourcade Cryptology ePrint Archive, Report 2018/1243, 2018. https://eprint. iacr. org …, 0 | 1 | |