BibTeX records: Henri Gilbert

download as .bib file

@inproceedings{DBLP:conf/asiacrypt/GilbertBJR23,
  author       = {Henri Gilbert and
                  Rachelle Heim Boissier and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Cryptanalysis of Elisabeth-4},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14440},
  pages        = {256--284},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8727-6\_9},
  doi          = {10.1007/978-981-99-8727-6\_9},
  timestamp    = {Sun, 07 Jan 2024 14:24:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GilbertBJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GilbertBKR23,
  author       = {Henri Gilbert and
                  Rachelle Heim Boissier and
                  Louiza Khati and
                  Yann Rotella},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Generic Attack on Duplex-Based {AEAD} Modes Using Random Function
                  Statistics},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {348--378},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_12},
  doi          = {10.1007/978-3-031-30634-1\_12},
  timestamp    = {Thu, 20 Apr 2023 11:35:02 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GilbertBKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertBKR23,
  author       = {Henri Gilbert and
                  Rachelle Heim Boissier and
                  Louiza Khati and
                  Yann Rotella},
  title        = {Generic Attack on Duplex-Based {AEAD} Modes using Random Function
                  Statistics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/262},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertBKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertBJR23,
  author       = {Henri Gilbert and
                  Rachelle Heim Boissier and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of Elisabeth-4},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1436},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1436},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertBJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinGT20,
  author       = {Daniel J. Bernstein and
                  Henri Gilbert and
                  Meltem S{\"{o}}nmez Turan},
  title        = {Observations on {COMET}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1445},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1445},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinGT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Chaigneau0GJR19,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1423--1447},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9297-9},
  doi          = {10.1007/S00145-018-9297-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Chaigneau0GJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BauerGRR19,
  author       = {Aur{\'{e}}lie Bauer and
                  Henri Gilbert and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  M{\'{e}}lissa Rossi},
  editor       = {Mitsuru Matsui},
  title        = {Assessment of the Key-Reuse Resilience of NewHope},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {272--292},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_14},
  doi          = {10.1007/978-3-030-12612-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BauerGRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauerGRR19,
  author       = {Aur{\'{e}}lie Bauer and
                  Henri Gilbert and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  M{\'{e}}lissa Rossi},
  title        = {Assessment of the Key-Reuse Resilience of NewHope},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauerGRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGGJRS18,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Ling Song},
  title        = {Key-Recovery Attacks on Full Kravatte},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {5--28},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.5-28},
  doi          = {10.13154/TOSC.V2018.I1.5-28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGJR17,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {156--174},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.156-174},
  doi          = {10.13154/TOSC.V2017.I1.156-174},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauG16,
  author       = {Colin Chaigneau and
                  Henri Gilbert},
  title        = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {114--133},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.114-133},
  doi          = {10.13154/TOSC.V2016.I1.114-133},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaigneauG16,
  author       = {Colin Chaigneau and
                  Henri Gilbert},
  title        = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {832},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/832},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaigneauG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GilbertPT15,
  author       = {Henri Gilbert and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t and
                  Joana Treger},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Key-Recovery Attack on the {ASASA} Cryptosystem with Expanding S-Boxes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {475--490},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_23},
  doi          = {10.1007/978-3-662-47989-6\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GilbertPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MauryRLG15,
  author       = {Florian Maury and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Olivier Levillain and
                  Henri Gilbert},
  editor       = {Kaisa Nyberg},
  title        = {Format Oracles on OpenPGP},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {220--236},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_12},
  doi          = {10.1007/978-3-319-16715-2\_12},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MauryRLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertPT15,
  author       = {Henri Gilbert and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t and
                  Joana Treger},
  title        = {Key-Recovery Attack on the {ASASA} Cryptosystem with Expanding S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Gilbert14,
  author       = {Henri Gilbert},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {A Simplified Representation of {AES}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {200--222},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_11},
  doi          = {10.1007/978-3-662-45611-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Gilbert14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Canteaut0GNR14,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Multiple Differential Cryptanalysis of Round-Reduced {PRINCE}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {591--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_30},
  doi          = {10.1007/978-3-662-46706-0\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Canteaut0GNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFGNR14,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Multiple Di fferential Cryptanalysis of Round-Reduced {PRINCE} (Full
                  version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFGNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Macario-RatPG13,
  author       = {Gilles Macario{-}Rat and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t and
                  Henri Gilbert},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {New Insight into the Isomorphism of Polynomial Problem {IP1S} and
                  Its Use in Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {117--133},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_7},
  doi          = {10.1007/978-3-642-42033-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Macario-RatPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Macario-RatPG13,
  author       = {Gilles Macario{-}Rat and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t and
                  Henri Gilbert},
  title        = {New Insight into the Isomorphism of Polynomials problem {IP1S} and
                  its Use in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/799},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Macario-RatPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FuhrGRV11,
  author       = {Thomas Fuhr and
                  Henri Gilbert and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Analysis of the Initial and Modified Versions of the Candidate 3GPP
                  Integrity Algorithm 128-EIA3},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {230--242},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_14},
  doi          = {10.1007/978-3-642-28496-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FuhrGRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BilletEG10,
  author       = {Olivier Billet and
                  Jonathan Etrog and
                  Henri Gilbert},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Lightweight Privacy Preserving Authentication for {RFID} Using a Stream
                  Cipher},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_4},
  doi          = {10.1007/978-3-642-13858-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BilletEG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertP10,
  author       = {Henri Gilbert and
                  Thomas Peyrin},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {365--383},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_21},
  doi          = {10.1007/978-3-642-13858-4\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2010,
  editor       = {Henri Gilbert},
  title        = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5},
  doi          = {10.1007/978-3-642-13190-5},
  isbn         = {978-3-642-13189-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrGRV10,
  author       = {Thomas Fuhr and
                  Henri Gilbert and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Forgery Attack on the Candidate {LTE} Integrity Algorithm 128-EIA3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrGRV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/BerbainGP09,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert and
                  Jacques Patarin},
  title        = {{QUAD:} {A} multivariate stream cipher with provable security},
  journal      = {J. Symb. Comput.},
  volume       = {44},
  number       = {12},
  pages        = {1703--1723},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jsc.2008.10.004},
  doi          = {10.1016/J.JSC.2008.10.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/BerbainGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BerbainBEG09,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Jonathan Etrog and
                  Henri Gilbert},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {An efficient forward private {RFID} protocol},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {43--53},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653669},
  doi          = {10.1145/1653662.1653669},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BerbainBEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertP09,
  author       = {Henri Gilbert and
                  Thomas Peyrin},
  title        = {Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Nigel P. Smart},
  title        = {HB\({}^{\mbox{{\#}}}\): Increasing the Security and Efficiency of
                  HB\({}^{\mbox{+}}\)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {361--378},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_21},
  doi          = {10.1007/978-3-540-78967-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Gene Tsudik},
  title        = {Good Variants of HB\({}^{\mbox{+}}\) Are Hard to Find},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_12},
  doi          = {10.1007/978-3-540-85230-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {How to Encrypt with the {LPN} Problem},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {679--690},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_55},
  doi          = {10.1007/978-3-540-70583-3\_55},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BerbainGJ08,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert and
                  Antoine Joux},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Algebraic and Correlation Attacks against Linearly Filtered Non Linear
                  Feedback Shift Registers},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_12},
  doi          = {10.1007/978-3-642-04159-4\_12},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BerbainGJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BerbainBCCGGGGLMPS08,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {Sosemanuk, a Fast Software-Oriented Stream Cipher},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {98--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_9},
  doi          = {10.1007/978-3-540-68351-3\_9},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BerbainBCCGGGGLMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BerbainBCCDGGGGLMPS08,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Blandine Debraize and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {Decimv2},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {140--151},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_11},
  doi          = {10.1007/978-3-540-68351-3\_11},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BerbainBCCDGGGGLMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0810-1858,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  title        = {{SOSEMANUK:} a fast software-oriented stream cipher},
  journal      = {CoRR},
  volume       = {abs/0810.1858},
  year         = {2008},
  url          = {http://arxiv.org/abs/0810.1858},
  eprinttype    = {arXiv},
  eprint       = {0810.1858},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0810-1858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  title        = {HB{\#}: Increasing the Security and Efficiency of {HB+}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArdittiBBG07,
  author       = {David Arditti and
                  C{\^{o}}me Berbain and
                  Olivier Billet and
                  Henri Gilbert},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Compact {FPGA} implementations of {QUAD}},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {347--349},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229323},
  doi          = {10.1145/1229285.1229323},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArdittiBBG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BerbainG07,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert},
  editor       = {Alex Biryukov},
  title        = {On the Security of {IV} Dependent Stream Ciphers},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {254--273},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_17},
  doi          = {10.1007/978-3-540-74619-5\_17},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BerbainG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ArdittiBBGP07,
  author       = {David Arditti and
                  C{\^{o}}me Berbain and
                  Olivier Billet and
                  Henri Gilbert and
                  Jacques Patarin},
  editor       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  title        = {{QUAD:} Overview and Recent Developments},
  booktitle    = {Symmetric Cryptography, 07.01. - 12.01.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07021},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/1015},
  timestamp    = {Thu, 10 Jun 2021 13:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ArdittiBBGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PeyrinGMR06,
  author       = {Thomas Peyrin and
                  Henri Gilbert and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Matthew J. B. Robshaw},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Combining Compression Functions and Block Cipher-Based Hash Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {315--331},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_21},
  doi          = {10.1007/11935230\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PeyrinGMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BerbainGP06,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert and
                  Jacques Patarin},
  editor       = {Serge Vaudenay},
  title        = {{QUAD:} {A} Practical Stream Cipher with Provable Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_8},
  doi          = {10.1007/11761679\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BerbainGP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BerbainGM06,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert and
                  Alexander Maximov},
  editor       = {Matthew J. B. Robshaw},
  title        = {Cryptanalysis of Grain},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_2},
  doi          = {10.1007/11799313\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BerbainGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BerbainBG06,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Henri Gilbert},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Efficient Implementations of Multivariate Quadratic Systems},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {174--187},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_13},
  doi          = {10.1007/978-3-540-74462-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BerbainBG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BilletG06,
  author       = {Olivier Billet and
                  Henri Gilbert},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Cryptanalysis of Rainbow},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {336--347},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_23},
  doi          = {10.1007/11832072\_23},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BilletG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BilletG05,
  author       = {Olivier Billet and
                  Henri Gilbert},
  editor       = {Alfred Menezes},
  title        = {Resistance of {SNOW} 2.0 Against Algebraic Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {19--28},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_3},
  doi          = {10.1007/978-3-540-30574-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BilletG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2005,
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137506},
  doi          = {10.1007/B137506},
  isbn         = {3-540-26541-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertRS05,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Herv{\'{e}} Sibert},
  title        = {An Active Attack Against {HB+} - {A} Provably Secure Lightweight Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BilletGE04,
  author       = {Olivier Billet and
                  Henri Gilbert and
                  Charaf Ech{-}Chatbi},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {Cryptanalysis of a White Box {AES} Implementation},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {227--240},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_16},
  doi          = {10.1007/978-3-540-30564-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BilletGE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BilletG03,
  author       = {Olivier Billet and
                  Henri Gilbert},
  editor       = {Chi{-}Sung Laih},
  title        = {A Traceable Block Cipher},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {331--346},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_21},
  doi          = {10.1007/978-3-540-40061-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BilletG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Gilbert03,
  author       = {Henri Gilbert},
  editor       = {Thomas Johansson},
  title        = {The Security of "One-Block-to-Many" Modes of Operation},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {376--395},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_27},
  doi          = {10.1007/978-3-540-39887-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Gilbert03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GilbertH03,
  author       = {Henri Gilbert and
                  Helena Handschuh},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Security Analysis of {SHA-256} and Sisters},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {175--193},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_13},
  doi          = {10.1007/978-3-540-24654-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GilbertH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GilbertM02,
  author       = {Henri Gilbert and
                  Marine Minier},
  editor       = {Lars R. Knudsen},
  title        = {Cryptanalysis of {SFLASH}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {288--298},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_19},
  doi          = {10.1007/3-540-46035-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GilbertM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DebaertG01,
  author       = {Christophe Debaert and
                  Henri Gilbert},
  editor       = {Mitsuru Matsui},
  title        = {The {RIPEMD} and {RIPEMD} Improved Variants of {MD4} Are Not Collision
                  Free},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {52--65},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_5},
  doi          = {10.1007/3-540-45473-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DebaertG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertM01,
  author       = {Henri Gilbert and
                  Marine Minier},
  editor       = {Mitsuru Matsui},
  title        = {New Results on the Pseudorandomness of Some Blockcipher Constructions},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {248--266},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_21},
  doi          = {10.1007/3-540-45473-X\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/BaritaudGN00,
  author       = {Thierry Baritaud and
                  Henri Gilbert and
                  S{\'{e}}bastien Nguyen Ngoc},
  title        = {Security services for protecting radio mobile systems},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {55},
  number       = {7-8},
  pages        = {352--360},
  year         = {2000},
  url          = {https://doi.org/10.1007/BF02994843},
  doi          = {10.1007/BF02994843},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/BaritaudGN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/GilbertM00,
  author       = {Henri Gilbert and
                  Marine Minier},
  title        = {A Collision Attack on 7 Rounds of Rijndael},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {230--241},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/GilbertM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertHJV00,
  author       = {Henri Gilbert and
                  Helena Handschuh and
                  Antoine Joux and
                  Serge Vaudenay},
  editor       = {Bruce Schneier},
  title        = {A Statistical Attack on {RC6}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {64--74},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_5},
  doi          = {10.1007/3-540-44706-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertHJV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinierG00,
  author       = {Marine Minier and
                  Henri Gilbert},
  editor       = {Bruce Schneier},
  title        = {Stochastic Cryptanalysis of Crypton},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {121--133},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_9},
  doi          = {10.1007/3-540-44706-7\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinierG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GilbertGOQ98,
  author       = {Henri Gilbert and
                  Dipankar Gupta and
                  Andrew M. Odlyzko and
                  Jean{-}Jacques Quisquater},
  title        = {Attacks on Shamir's 'RSA for Paranoids'},
  journal      = {Inf. Process. Lett.},
  volume       = {68},
  number       = {4},
  pages        = {197--199},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00160-4},
  doi          = {10.1016/S0020-0190(98)00160-4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GilbertGOQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Gilbert98,
  author       = {Henri Gilbert},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Techniques for Low Cost Authentication and Message Authentication},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {183--192},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_16},
  doi          = {10.1007/10721064\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Gilbert98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/BoucheSSDGGMG97,
  author       = {Michel Bouch{\'{e}} and
                  Pascal Sallagoity and
                  Milena Harito Shteto and
                  Dominique Demange and
                  Henri Gilbert and
                  David Gesbert and
                  Delphine Maury and
                  Fr{\'{e}}d{\'{e}}ric Gaillard},
  title        = {R{\'{e}}sum{\'{e}}s de th{\`{e}}se},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {52},
  number       = {9-10},
  pages        = {536--538},
  year         = {1997},
  url          = {https://doi.org/10.1007/BF02998484},
  doi          = {10.1007/BF02998484},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/BoucheSSDGGMG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HandschuhG97,
  author       = {Helena Handschuh and
                  Henri Gilbert},
  editor       = {Eli Biham},
  title        = {x\({}^{\mbox{2}}\) Cryptanalysis of the {SEAL} Encryption Algorithm},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052330},
  doi          = {10.1007/BFB0052330},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HandschuhG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GilbertC94,
  author       = {Henri Gilbert and
                  Pascal Chauvaud},
  editor       = {Yvo Desmedt},
  title        = {A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {359--368},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_33},
  doi          = {10.1007/3-540-48658-5\_33},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GilbertC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaritaudCCG92,
  author       = {Thierry Baritaud and
                  Mireille Campana and
                  Pascal Chauvaud and
                  Henri Gilbert},
  editor       = {Ernest F. Brickell},
  title        = {On the Security of the Permuted Kernel Identification Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {305--311},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_21},
  doi          = {10.1007/3-540-48071-4\_21},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaritaudCCG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaritaudGG92,
  author       = {Thierry Baritaud and
                  Henri Gilbert and
                  Marc Girault},
  editor       = {Rainer A. Rueppel},
  title        = {{FFT} Hashing is not Collision-free},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {35--44},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_3},
  doi          = {10.1007/3-540-47555-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BaritaudGG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Tardy-CorfdirG91,
  author       = {Anne Tardy{-}Corfdir and
                  Henri Gilbert},
  editor       = {Joan Feigenbaum},
  title        = {A Known Plaintext Attack of {FEAL-4} and {FEAL-6}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {172--181},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_12},
  doi          = {10.1007/3-540-46766-1\_12},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Tardy-CorfdirG91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GilbertC90,
  author       = {Henri Gilbert and
                  Guy Chass{\'{e}}},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {A Statistical Attack of the {FEAL-8} Cryptosystem},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {22--33},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_2},
  doi          = {10.1007/3-540-38424-3\_2},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GilbertC90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics