Thomas Peyrin
Nanyang Technological University
H-index: 45
Asia-Singapore
Top articles of Thomas Peyrin
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Peek into the black-box: interpretable neural network using SAT equations in side-channel analysis | IACR Transactions on Cryptographic Hardware and Embedded Systems | Trevor Yap Adrien Benamira Shivam Bhasin Thomas Peyrin | 2023/3/6 |
TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture | arXiv preprint arXiv:2302.01584 | Adrien Benamira Tristan Guérand Thomas Peyrin Sayandeep Saha | 2023/2/3 |
A New Interpretable Neural Network-Based Rule Model for Healthcare Decision Making | arXiv preprint arXiv:2309.11101 | Adrien Benamira Tristan Guerand Thomas Peyrin | 2023/9/20 |
Boosting differential-linear cryptanalysis of ChaCha7 with MILP | IACR Transactions on Symmetric Cryptology | Emanuele Bellini David Gerault Juan Grados Rusydi H Makarim Thomas Peyrin | 2023 |
Neural network-based rule models with truth tables | arXiv preprint arXiv:2309.09638 | Adrien Benamira Tristan Guérand Thomas Peyrin Hans Soegeng | 2023/9/18 |
Fully automated differential-linear attacks against ARX ciphers | Emanuele Bellini David Gerault Juan Grados Rusydi H Makarim Thomas Peyrin | 2023/4/19 | |
Finding all impossible differentials when considering the DDT | Cryptology ePrint Archive | Kai Hu Thomas Peyrin Meiqin Wang | 2022 |
Final-round updates on Romulus | Chun Guo Tetsu Iwata Mustafa Khairallah Kazuhiko Minematsu Thomas Peyrin | 2022/9/27 | |
A long tweak goes a long way: High multi-user security authenticated encryption from tweakable block ciphers | Cryptology ePrint Archive | Benoît Cogliati Jérémy Jean Thomas Peyrin Yannick Seurin | 2022 |
Security Proof for Romulus-T | Chun Guo Tetsu Iwata Mustafa Khairallah Kazuhiko Minematsu Thomas Peyrin | 2022/9/20 | |
DEFAULT: Cipher-Level Resistance Against Differential Fault Attack | Classical and Physical Security of Symmetric Key Cryptographic Algorithms | Anubhab Baksi Anubhab Baksi | 2022 |
Mind your path: On (key) dependencies in differential characteristics | Cryptology ePrint Archive | Thomas Peyrin Quan Quan Tan | 2022 |
Truth-Table Net: A New Convolutional Architecture Encodable by Design into SAT Formulas | Adrien Benamira Thomas Peyrin Bryan Hooi Kuen-Yew | 2022/10/23 | |
Exploring integrity of AEADs with faults: definitions and constructions | Cryptology ePrint Archive | Sayandeep Saha Mustafa Khairallah Thomas Peyrin | 2022 |
TT-Rules: Extracting & Optimizing Exact Rules of a CNN-Based Model-Application to Fairness | Adrien Benamira Tristan Guérand Thomas Peyrin | 2022/9/29 | |
Exploring differential-based distinguishers and forgeries for ASCON | Cryptology ePrint Archive | David Gerault Thomas Peyrin Quan Quan Tan | 2021 |
A deeper look at machine learning-based cryptanalysis | Adrien Benamira David Gerault Thomas Peyrin Quan Quan Tan | 2021 | |
Truth Table Deep Convolutional Neural Network, A New SAT-Encodable Architecture-Application To Complete Robustness | Adrien Benamira Thomas Peyrin Bryan Hooi | 2021/10/6 | |
The deoxys AEAD family | Journal of Cryptology | Jérémy Jean Ivica Nikolić Thomas Peyrin Yannick Seurin | 2021/7 |
On the cost of asic hardware crackers: A sha-1 case study | Anupam Chattopadhyay Mustafa Khairallah Gaëtan Leurent Zakaria Najm Thomas Peyrin | 2021/5/11 |