Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 75 | 2020 |
Block cipher invariants as eigenvectors of correlation matrices T Beyne Journal of Cryptology 33 (3), 1156-1183, 2020 | 54 | 2020 |
Elephant v2 T Beyne, YL Chen, C Dobraunig, B Mennink | 49 | 2021 |
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus T Beyne, YL Chen, C Dobraunig, B Mennink IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020 | 38 | 2020 |
Cryptanalysis of the Legendre PRF and Generalizations W Beullens, T Beyne, A Udovenko, G Vitto IACR Transactions on Symmetric Cryptology, 2020 | 32 | 2020 |
Uniform first-order threshold implementations T Beyne, B Bilgin Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017 | 21 | 2017 |
A geometric approach to linear cryptanalysis T Beyne Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 18 | 2021 |
Revisiting the wrong-key-randomization hypothesis T Ashur, T Beyne, V Rijmen Journal of Cryptology 33, 567-594, 2020 | 18 | 2020 |
Differential cryptanalysis in the fixed-key model T Beyne, V Rijmen Annual International Cryptology Conference, 687-716, 2022 | 17 | 2022 |
Cryptanalysis of masked ciphers: A not so random idea T Beyne, S Dhooghe, Z Zhang Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 17 | 2020 |
Elephant v1 T Beyne, YL Chen, C Dobraunig, B Mennink | 16* | 2019 |
Cryptanalysis of efficient masked ciphers: applications to low latency T Beyne, S Dhooghe, A Moradi, AR Shahmirzadi IACR Transactions on Cryptographic Hardware and Embedded Systems, 679-721, 2022 | 15 | 2022 |
Multi-user security of the elephant v2 authenticated encryption mode T Beyne, YL Chen, C Dobraunig, B Mennink International Conference on Selected Areas in Cryptography, 155-178, 2021 | 14 | 2021 |
A low-randomness second-order masked AES T Beyne, S Dhooghe, A Ranea, D Šijačić International Conference on Selected Areas in Cryptography, 87-110, 2021 | 11 | 2021 |
Elephant v1. 1 T Beyne, YL Chen, C Dobraunig, B Mennink Submission to NIST Lightweight Cryptography, 2019 | 11 | 2019 |
Linear cryptanalysis of FF3-1 and FEA T Beyne Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 10 | 2021 |
On the security of the Rescue hash function T Beyne, A Canteaut, G Leander, MN Plasencia, L Perrin, F Wiemer IACR Cryptology ePrint Archive, 2020 | 10 | 2020 |
Linear Cryptanalysis in the Weak Key Model T Beyne | 7 | 2019 |
Constructing and deconstructing intentional weaknesses in symmetric ciphers C Beierle, T Beyne, P Felke, G Leander Annual International Cryptology Conference, 748-778, 2022 | 6 | 2022 |
An overview of the eight international olympiad in cryptography" Non-Stop University Crypto" A Gorodilova, N Tokareva, S Agievich, I Beterov, T Beyne, L Budaghyan, ... arXiv preprint arXiv:2204.11502, 2022 | 6 | 2022 |