Optimal asymmetric encryption, Lecture Notes in Computer Science, vol.950, pp.92-111, 1994. ,
DOI : 10.1007/BFb0053428
The Keccak reference, 2011. ,
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV, Lecture Notes in Computer Science, vol.2442, pp.320-335, 2002. ,
DOI : 10.1007/3-540-45708-9_21
Biclique Cryptanalysis of the Full AES, Lecture Notes in Computer Science, vol.7073, pp.344-371, 2011. ,
DOI : 10.1007/978-3-642-25385-0_19
Higher-Order Differential Properties of Keccak and Luffa, LNCS, vol.6733, pp.252-269, 2011. ,
DOI : 10.1007/978-3-642-13858-4_15
URL : https://hal.archives-ouvertes.fr/inria-00537741
The random oracle methodology, revisited, Journal of the ACM, vol.51, issue.4, pp.557-594, 2004. ,
DOI : 10.1145/1008731.1008734
Fast Software Encryption -19th International Workshop Revised Selected Papers, Lecture Notes in Computer Science, vol.7549, 2012. ,
Rijndael/AES, AES Candidate Conference, pp.343-348, 2000. ,
DOI : 10.1007/0-387-23483-7_358
Faster Chosen-Key Distinguishers on Reduced-Round AES, Lecture Notes in Computer Science, vol.7668, pp.225-243, 2012. ,
DOI : 10.1007/978-3-642-34931-7_14
URL : https://hal.archives-ouvertes.fr/hal-01094335
Unaligned Rebound Attack: Application to Keccak, pp.402-421 ,
DOI : 10.1007/978-3-642-34047-5_23
Grøstl ? a SHA-3 candidate, NIST, 2008. ,
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations, pp.365-383 ,
DOI : 10.1007/978-3-642-13858-4_21
The PHOTON Family of Lightweight Hash Functions, pp.222-239 ,
DOI : 10.1007/978-3-642-22792-9_13
The LED Block Cipher, Lecture Notes in Computer Science, vol.6917, pp.326-341, 2011. ,
DOI : 10.1007/978-3-642-23951-9_22
Revised Selected Papers, Fast Software Encryption, 17th International Workshop, FSE 2010, 2010. ,
Improved Rebound Attack on the Finalist Gr??stl, pp.110-126 ,
DOI : 10.1007/978-3-642-34047-5_7
Rotational Cryptanalysis of ARX, pp.333-346 ,
DOI : 10.1007/978-3-642-13858-4_19
Rebound Distinguishers: Results on the Full Whirlpool Compression Function, Lecture Notes in Computer Science, vol.5912, pp.126-143, 2009. ,
DOI : 10.1007/978-3-642-10366-7_8
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool, Journal of Cryptology, vol.62, issue.6, 2010. ,
DOI : 10.1007/s00145-013-9166-5
Rebound Attack on the Full Lane Compression Function, Lecture Notes in Computer Science, vol.5912, pp.106-125, 2009. ,
DOI : 10.1007/978-3-642-10366-7_7
Improved Cryptanalysis of the Reduced Gr??stl Compression Function, ECHO Permutation and AES Block Cipher, Lecture Notes in Computer Science, vol.5867, pp.16-35, 2009. ,
DOI : 10.1007/978-3-642-05445-7_2
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr??stl, Lecture Notes in Computer Science, vol.5665, pp.260-276, 2009. ,
DOI : 10.1007/978-3-642-03317-9_16
How to Improve Rebound Attacks, pp.188-205 ,
DOI : 10.1007/978-3-642-22792-9_11
Cryptanalysis of Round-Reduced LED, In: FSE. Lecture Notes in Computer Science, 2013. ,
Advances in Cryptology -CRYPTO 2011 -31st Annual Cryptology Conference, Proceedings, 2011. ,
Non-full-active Super-Sbox Analysis: Applications to ECHO and Gr??stl, Lecture Notes in Computer Science, vol.6477, pp.38-55, 2010. ,
DOI : 10.1007/978-3-642-17373-8_3
Updated Differential Analysis of Grøstl, Grøstl website, 2011. ,