Follow
David GERAULT
Title
Cited by
Cited by
Year
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
912017
A deeper look at machine learning-based cryptanalysis
A Benamira, D Gerault, T Peyrin, QQ Tan
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
892021
Constraint programming models for chosen key differential cryptanalysis
D Gerault, M Minier, C Solnon
Principles and Practice of Constraint Programming: 22nd International …, 2016
692016
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
542018
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
462017
Computing AES related-key differential characteristics with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Artificial intelligence 278, 103183, 2020
372020
Survey of distance bounding protocols and threats
A Brelurut, D Gerault, P Lafourcade
Foundations and Practice of Security: 8th International Symposium, FPS 2015 …, 2016
312016
Related-key cryptanalysis of midori
D Gérault, P Lafourcade
International Conference on Cryptology in India, 287-304, 2016
292016
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
9th ACM Conference on Security & Privacy in Wireless and Mobile Networks …, 2016
262016
Exploring differential-based distinguishers and forgeries for ASCON
D Gerault, T Peyrin, QQ Tan
Cryptology ePrint Archive, 2021
242021
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
182017
Using constraint programming to solve a cryptanalytic problem
D Gerault, M Minier, C Solnon
IJCAI 2017-International Joint Conference on Artificial Intelligence (Sister …, 2017
132017
Fully automated differential-linear attacks against ARX ciphers
E Bellini, D Gerault, J Grados, RH Makarim, T Peyrin
Cryptographers’ Track at the RSA Conference, 252-276, 2023
82023
And rijndael? automatic related-key differential analysis of rijndael
L Rouquette, D Gerault, M Minier, C Solnon
International Conference on Cryptology in Africa, 150-175, 2022
82022
From relay attacks to distance-bounding protocols
G Avoine, I Boureanu, D Gérault, GP Hancke, P Lafourcade, C Onete
Security of Ubiquitous Computing Systems: Selected Topics, 113-130, 2021
82021
Verifiable and private oblivious polynomial evaluation
H Gajera, M Giraud, D Gérault, ML Das, P Lafourcade
IFIP International Conference on Information Security Theory and Practice, 49-65, 2019
82019
A cipher-agnostic neural training pipeline with automated finding of good input differences
E Bellini, D Gerault, A Hambitzer, M Rossi
Cryptology ePrint Archive, 2022
72022
On the usage of deterministic (related-key) truncated differentials and multidimensional linear approximations for SPN ciphers
L Sun, D Gerault, W Wang, M Wang
IACR Transactions on Symmetric Cryptology, 262-287, 2020
72020
Mechanised models and proofs for distance-bounding
I Boureanu, CC Drăgan, F Dupressoir, D Gérault, P Lafourcade
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
62021
Security analysis of contactless communication protocols
D Gerault
Université Clermont Auvergne [2017-2020], 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20