David GERAULT
TitoloCitata daAnno
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
302017
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gerault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
222017
Constraint programming models for chosen key differential cryptanalysis
D Gerault, M Minier, C Solnon
International Conference on Principles and Practice of Constraint …, 2016
222016
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
172016
Related-key cryptanalysis of Midori
D Gérault, P Lafourcade
International Conference on Cryptology in India, 287-304, 2016
132016
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
122018
Survey of distance bounding protocols and threats
A Brelurut, D Gerault, P Lafourcade
International Symposium on Foundations and Practice of Security, 29-49, 2015
112015
Processing and characterization of new passive and active oxysulfide glasses in the Ge–Ga–Sb–S–O system
L Petit, J Abel, T Anderson, J Choi, V Nazabal, V Moizan, M Couzi, ...
Journal of Solid State Chemistry 182 (10), 2646-2655, 2009
92009
Using constraint programming to solve a cryptanalytic problem
D Gerault, M Minier, C Solnon
42017
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
32017
Breaking and Fixing the HB+ DB protocol
I Boureanu, D Gerault, P Lafourcade, C Onete
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
22017
Combining Solvers to Solve a Cryptanalytic Problem
D Gerault, P Lafourcade, M Minier, C Solnon
CP/ICLP/SAT Doctoral Program-part of the conference CP 2017, available at …, 2017
22017
Implementation-Level Corruptions in Distance Bounding-Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass-.
I Boureanu, D Gerault, P Lafourcade
IACR Cryptology ePrint Archive 2018, 1243, 2018
12018
Computing AES related-key differential characteristics with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Artificial Intelligence, 103183, 2019
2019
Here and There at Once, with my Mobile Phone!
J Lewis, D Gerault, I Boureanu
Proceedings SECRYPT 2019: International Conference on Security and …, 2019
2019
Distance bounding under different assumptions
D Gerault, I Boureanu
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
2019
Security Analysis of Contactless Communication Protocols Thèse
D GERAULT
INSA Lyon, 2018
2018
Mathematical Computation with SageMath (temporary title)
A Casamayou, N Cohen, G Connan, T Dumont, L Fousse, F Maltey, ...
published by the authors, 2018
2018
SPADE: un protocole délimiteur de distance anonyme et résistant à la fraude terroriste
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
2017
BoxDB: Realistic Adversary Model for Distance Bounding
I Boureanu, D Gerault, P Lafourcade
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20