David GERAULT
Titolo
Citata da
Citata da
Anno
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
392017
Constraint programming models for chosen key differential cryptanalysis
D Gerault, M Minier, C Solnon
International Conference on Principles and Practice of Constraint …, 2016
282016
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gerault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
252017
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
212018
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
182016
Related-key cryptanalysis of midori
D Gérault, P Lafourcade
International Conference on Cryptology in India, 287-304, 2016
172016
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
132017
Survey of distance bounding protocols and threats
A Brelurut, D Gerault, P Lafourcade
International Symposium on Foundations and Practice of Security, 29-49, 2015
122015
Processing and characterization of new passive and active oxysulfide glasses in the Ge–Ga–Sb–S–O system
L Petit, J Abel, T Anderson, J Choi, V Nazabal, V Moizan, M Couzi, ...
Journal of Solid State Chemistry 182 (10), 2646-2655, 2009
92009
Using constraint programming to solve a cryptanalytic problem
D Gerault, M Minier, C Solnon
62017
Security analysis of contactless communication protocols
D Gerault
Université Clermont Auvergne, 2018
22018
Breaking and Fixing the HB+ DB protocol
I Boureanu, D Gerault, P Lafourcade, C Onete
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
22017
Combining solvers to solve a cryptanalytic problem
D Gerault, P Lafourcade, M Minier, C Solnon
CP 2017-Doctoral program 9, 104, 2017
22017
Computing AES related-key differential characteristics with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Artificial Intelligence 278, 103183, 2020
12020
Distance bounding under different assumptions: opinion
D Gerault, I Boureanu
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
12019
Implementation-Level Corruptions in Distance Bounding-Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass-.
I Boureanu, D Gerault, P Lafourcade
IACR Cryptol. ePrint Arch. 2018, 1243, 2018
12018
NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis
L Sun, D Gerault, A Benamira, T Peyrin
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
2020
Verifiable and Private Oblivious Polynomial Evaluation
H Gajera, M Giraud, D Gérault, ML Das, P Lafourcade
IFIP International Conference on Information Security Theory and Practice, 49-65, 2019
2019
Verifiable and Private Oblivious Polynomial Evaluation
ML Das, H Gajera, M Giraud, P Lafourcade, D Gerault
International Conference on Information Security Theory and Practice (WISTP …, 2019
2019
Towards Secure TMIS Protocols
D Gérault, P Lafourcade
International Symposium on Foundations and Practice of Security, 337-344, 2019
2019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20