Research


Journal Publications


2014

  • T. Peyrin 
    "Collision Attack on Grindahl" 
    in Journal of Cryptology - May 2014 


  • 2013

  • J. Jean, M. Naya-Plasencia and T. Peyrin 
    "Improved Cryptanalysis of AES-like Permutations" 
    in Journal of Cryptology - July 2013 
    paper


  • 2009

  • J. Yajima, T. Iwasaki, Y.Naito, Y. Sasaki, T. Shimoyama, T. Peyrin, N. Kunihiro and K. Ohta
    "A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search"
    in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences - IEICE TRANS. January 2009
    paper




  • International Conferences and Workshops Publications


    2015

  • C. Blondeau, T. Peyrin, and L. Wang
  • "Known-key Distinguisher on Full PRESENT"
    in Advances in Cryptology - CRYPTO 2015 

  • P. Karpman, T. Peyrin, and M. Stevens
  • "Practical Free-Start Collision Attacks on 76-Step SHA-1"
    in Advances in Cryptology - CRYPTO 2015 

  • S. M. Sim, K. Khoo, F. Oggier, and T. Peyrin
  • "Lightweight MDS Involution Matrices"
    in Fast Software Encryption - FSE 2015 

  • T. Peyrin, S. M. Sim, L. Wang and G. Zhang
  • "Cryptanalysis of JAMBU"
    in Fast Software Encryption - FSE 2015 


    2014

  • N. Anandakumar, T. Peyrin and A. Poschmann
  • "A Very Compact FPGA Implementation of LED and PHOTON"
    in Progress in Cryptology - INDOCRYPT 2014 

  • J. Jean, I. Nikolic and T. Peyrin
  • "Tweaks and Keys for Block Ciphers: the TWEAKEY Framework"
    in Advances in Cryptology - ASIACRYPT 2014 

  • K. Khoo, T. Peyrin, A. Poschmann and H. Yap
  • "FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison"
    in 
  • Cryptographic Hardware and Embedded System
  •  - CHES 2014 

  • J. Guo, T. Peyrin, Y. Sasaki and L. Wang
  • "Updates on Generic Attacks against HMAC and NMAC"
    in Advances in Cryptology - CRYPTO 2014 

  • J. Guo, J. Jean, G. Leurent, T. Peyrin and L. Wang
  • "The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function"
    in Selected Areas of Cryptography - SAC 2014 

  • T. Peyrin and L. Wang
  • "Generic Universal Forgery Attack on Iterative Hash-based MACs"
    in Advances in Cryptology - EUROCRYPT 2014 


    2013

  • G. Leurent, T. Peyrin and L. Wang
  • "New Generic Attacks Against Hash-based MACs"
    in Advances in Cryptology - ASIACRYPT 2013 

  • F. Mendel, T. Peyrin, M. Schläffer, L. Wang and S. Wu
  • "Improved Cryptanalysis of Reduced RIPEMD-160"
    in Advances in Cryptology - ASIACRYPT 2013 

  • M. Iwamoto, T. Peyrin and Y. Sasaki
  • "Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful"
    in Advances in Cryptology - ASIACRYPT 2013 

  • P.-A. Fouque, J. Jean and T. Peyrin
  • "Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128"
    in Advances in Cryptology - CRYPTO 2013 
    -
     

  • J. Jean, M. Naya-Plasencia and T. Peyrin
  • "Multiple Limited-Birthday Distinguishers and Applications"
    in Selected Areas of Cryptography - SAC 2013 

  • R. Benadjila, J. Guo, V. Lomné and T. Peyrin
  • "Implementing Lightweight Block Ciphers on x86 Architectures"
    in Selected Areas of Cryptography - SAC 2013 
    -
     

  • F. Landelle and T. Peyrin  (- Invited to JoC -)
  • "Cryptanalysis of Full RIPEMD-128"
    in Advances in Cryptology - EUROCRYPT 2013 

  • F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann and S. Chakraborty
  • "Security Challenges in Automotive Hardware/Software Architecture Design"
  • in Design, Automation & Test in Europe - DATE 2013 

  • J. Jean, I. Nikolic, T. Peyrin, L. Wang and S. Wu
  • "Security Analysis of PRINCE"
  • in Fast Software Encryption - FSE 2013 


  • 2012

  • T. Peyrin, Y. Sasaki and L. Wang
  • "Generic Related-key Attacks for HMAC"
    in Advances in Cryptology - ASIACRYPT 2012 

  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann and C. H. Tan
  • "SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks"
    in Progress in Cryptology - AFRICACRYPT 2012 

  • L. Wei, T. Peyrin, P. Sokołowski, S. Ling, J. Pieprzyk and H. Wang
  • "On the (In)Security of IDEA in Various Hashing Modes"
  • in Fast Software Encryption - FSE 2012 

  • J. Jean, M. Naya-Plasencia and T. Peyrin  (- Best Paper Award -)
  • "Improved Rebound Attack on the Finalist Grøstl"
  • in Fast Software Encryption - FSE 2012 

  • M. Naya-Plasencia and T. Peyrin
  • "Practical Cryptanalysis of ARMADILLO2"
  • in Fast Software Encryption - FSE 2012 

  • A. Duc, J. Guo, T. Peyrin and L.Wei
  • "Unaligned Rebound Attack: Application to Keccak"
  • in Fast Software Encryption - FSE 2012 


  • 2011

  • J. Guo, T. Peyrin, A. Poschmann and M. Robshaw
  • "The LED Block Cipher"
    in 
  • Cryptographic Hardware and Embedded System

  • J. Guo, T. Peyrin and A. Poschmann 
    "The PHOTON Family of Lightweight Hash Functions"
  • in Advances in Cryptology - CRYPTO 2011 

  • J. Guo, T. Peyrin and A. Poschmann 
    "The PHOTON Family of Lightweight Hash Functions" 
    in ECRYPT Hash Workshop 2011 
    eprint 
    - slides 

  • M. Minier
    , M. Naya-Plasencia
     and T. Peyrin
  • "
  • Analysis of Reduced-SHAvite-3-256 v2" 
  • in Fast Software Encryption - FSE 2011 



  • 2010

  • E. Brier and T. Peyrin 
  • "A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT" 
  • in Advances in Cryptology - ASIACRYPT 2010 
    paper  

  • T. Peyrin
  • "Improved Differential Attacks for ECHO and Grøstl" 
    in Advances in Cryptology - CRYPTO 2010 
  • O. Benoit and T. Peyrin
  • "Side-channel Analysis of Six SHA-3 Candidates" 
  • in Cryptographic Hardware and Embedded System - CHES 2010 

  • J-P. Aumasson, E. Käsper, L. Knudsen, K. Matusiewicz, R. Ødegaard, T. Peyrin and M. Schläffer
    "Distinguishers for the Compression Function and Output Transformation of Hamsi-256" in Australasian Conference on Information Security and Privacy - ACISP 2010 

  • P. Gauravaram, G. Leurent, F. Mendel, M. Naya-Plasencia, T. Peyrin, C. Rechberger and M. Schläffer
  • "Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512" 
    in Progress in Cryptology - AFRICACRYPT 2010 
  • H. Gilbert and T. Peyrin
  • "Super-Sbox Cryptanalysis: Improved Attacks for AES-like Permutations" 
  • in Fast Software Encryption - FSE 2010 

  • M. Naya-Plasencia, A. Röck, J-P. Aumasson, Y. Laigle-Chapuy, G. Leurent, W. Meier and T. Peyrin
    "Cryptanalysis of ESSENCE"
    in Fast Software Encryption - FSE 2010 
    paper - eprint
     


  • 2009

  • N. Mouha, G. Sekar, J-P. Aumasson, T. Peyrin, S. Thomsen, M. S. Turan and B. Preneel 
  • "Cryptanalysis of the ESSENCE Family of Hash Functions" 
    in International Conference on Information Security and Cryptology - INSCRYPT 2009

  • E. Brier, S. Khazaei, W. Meier and T. Peyrin
    "Linearization Framework for Collision Attacks: Application to CubeHash and MD6"
    in Advances in Cryptology - ASIACRYPT 2009
    paper - eprint - slides

  • F. Mendel, T. Peyrin, C. Rechberger and M. Schläffer
    "Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher"
    in Selected Areas of Cryptography - SAC 2009
    paper - slides

  • J-P. Aumasson, E. Brier, W. Meier, M. Naya-Plasencia and T. Peyrin
  • "Inside the Hypercube"
    in Australasian Conference on Information Security and Privacy - ACISP 2009
    paper - eprint - slides 

  • E. Brier and T. Peyrin
    "Cryptanalysis of CubeHash"
    in Applied Cryptography and Network Security - ACNS 2009
    paper - slides

  • T. Fuhr and T. Peyrin
    "Cryptanalysis of RadioGatun"
    in Fast Software Encryption - FSE 2009
    paper - eprint - slides



  • 2008

  • M. Gorski, S. Lucks and T. Peyrin
    "Slide Attacks on a Class of Hash Functions"
    in Advances in Cryptology - ASIACRYPT 2008
    paper - eprint - slides

  • E. Bresson, B. Chevallier-Mames, C. Clavier, A. Gouget, P. Paillier and T. Peyrin
    "How to use Merkle-Damgard - On the Security Relations between Signature Schemes and their Inner Hash Functions"
    in Provable Security - ProvSec 2008
    paper

  • S. Manuel and T. Peyrin
    "Collisions on SHA-0 in One Hour"
    in Fast Software Encryption - FSE 2008
    paper - slides



  • 2007

  • T. Peyrin (- Best Paper Award -)
    "Cryptanalysis of Grindahl"
    in Advances in Cryptology - ASIACRYPT 2007
    paper - slides

  • A. Joux and T. Peyrin
    "Hash Functions and the (Amplified) Boomerang Attack"
    in Advances in Cryptology - CRYPTO 2007
    paper - slides

  • A. Joux and T. Peyrin 
    "Hash Functions and the (Amplified) Boomerang Attack" 
    in ECRYPT Hash Workshop 2007 
    paper - slides 

  • E. Bresson, B. Chevallier-Mames, C. Clavier, B. Debraize, P.-A. Fouque, L. Goubin, A. Gouget, G. Leurent, P. Q. Nguyen, P. Paillier, T. Peyrin and S. Zimmer 
    "Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions" 
    in ECRYPT Hash Workshop 2007 

  • O. Billet, M. Robshaw and T. Peyrin
    "On Building Hash Functions From Multivariate Quadratic Equations"
    in Australian Conference on Information Security and Privacy - ACISP 2007
    paper - slides

  • Y. Seurin and T. Peyrin
    "Security Analysis of Constructions Combining FIL Random Oracles"
    in Fast Software Encryption - FSE 2007
    paper - slides

  • K. Matusiewicz, T. Peyrin, O. Billet, S. Contini and J. Pieprzyk
    "Cryptanalysis of FORK-256"
    in Fast Software Encryption - FSE 2007
    paper - slides



  • 2006

  • T. Peyrin, H. Gilbert, F. Muller and M. Robshaw
    "Combining Compression Functions and Block Cipher-Based Hash Functions"
    in Advances in Cryptology - ASIACRYPT 2006
    paper - slides

  • F. Muller and T. Peyrin
    "Cryptanalysis of T-Function-Based Hash Functions"
    in International Conference on Information Security and Cryptology - ICISC 2006
    paper - slides



  • 2005

  • F. Muller and T. Peyrin
    "Linear Cryptanalysis of the TSC family of Stream Ciphers"
    in Advances in Cryptology - ASIACRYPT 2005
    paper - slides

  • T. Peyrin and S. Vaudenay
    "The Pairing Problem with User Interaction"
    in Security and Privacy in the Age of Ubiquitous Computing - SEC 2005
    paper



  • 2004

  • G. Avoine, J. Monnerat and T. Peyrin
    "Advances in Alternative Non-Adjacent Form Representations"
    in Progress in Cryptology - INDOCRYPT 2004
    paper - slides



  • Preprints


  • J. Guo, J. Jean, T. Peyrin, and L. Wang
  • "Breaking POET Authentication with a Single Query"



    Algorithms 
    Submitted for Standardization or Competitions


  • E. Brier, T. Peyrin and J. Stern 
    "BPS: a Format-Preserving Encryption Proposal" 
    in NIST MODES DEVELOPMENT 
    specifications - now part of NIST SP800-38G

  • R. Benadjila, O. Billet, H. Gilbert, G. Macario-Rat, T. Peyrin, M. Robshaw and Y. Seurin 
    "SHA-3 Proposal: ECHO" 
    in NIST CRYPTOGRAPHIC HASH ALGORITHM COMPETITION 
    specifications 




  • Invited Talks


    2015

  • TBD
    at MathCrypt 2015, Daejeon, South Korea, June 25th 2015

  • "Cryptanalysis of JAMBU"
    at ESC 2015, Clervaux, Luxembourg, January 16th 2015
  • 2014

  • "TWEAKEY Schedules and Application to Authenticated Encryption"
    at ASK 2014, Chennai, India, December 19th 2014

  • "KIASU"
  • at DIAC 2014, Santa-Barbara, USA, August 23th 2014
    slides


    2013

  • "Cryptanalysis of RIPEMD-128/160"
    at 
    CHINACRYPT 2013, Fuzhou, China, October 25th 2013

  • "Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128"
  • at Institute of Software, Chinese Academy of Sciences, Beijing, China, October 23th 2013
    slides

  • "Cryptanalysis of RIPEMD-128
    "

    at ASK 2013, Weihai, China, August 29th 2013


  • 2012

  • "
    Generic Related-key Attacks for HMAC
    "

    at 
    TCCM-CACR 2012, Chengdu, China, November 24th 2012

  • "
    Generic Related-key Attacks for HMAC
    "

    at SPACE 2012, Chennai, India, November 2nd 2012

  • "
    Cryptanalysis of ARMADILLO2
    "

    at ASK 2012, Nagoya, Japan, August 29th 2012
  • slides

  • "Symmetric-Key Cryptography"
  • at Workshop on Mathematics for Defence, Singapore,
     April 13rd 2012

  • "Recent Advances on Lightweight Cryptography Designs"
  • at Séminaire de cryptographie de l'Université de Rennes, Rennes, France,
     February 3rd 2012

    slides


    2011

  • "Recent Advances on Lightweight Cryptography Designs"

    at ICISC 2011, Seoul, South Korea, November 30th 2011

  • "Unaligned Rebound Attack for Keccak"

    at ASK 2011, Singapore, August 31st 2011

  • "Unaligned Rebound Attack for Keccak"
    at Microsoft Workshop on Symmetric Cryptanalysis, Redmond, USA, August 8th 2011

  • "The PHOTON Family of Lightweight Hash Functions"

    at Coding, Cryptology and Combinatorial Designs, Singapore, May 15th 2011 
  • slides 


    2010

  • "State-of-the-art of Hash Functions"

    at WAC 2010, Singapore, December 3rd 2010 
    slides 


  • "The ECHO hash function"
    at The Second SHA-3 Candidate Conference, Santa-Barbara, USA, August 24th 2010 
    slides
     

    2009

  • "Cryptanalysis of stream-based hashes"
  • at ECRYPT II Hash3: Proofs, Analysis and Implementation, Tenerife, Spain, November 17th 2009

  • "Les fonctions de hachage, un domaine à la mode"
    at JSSI 2009, Paris, France, March 17th 2009
    slides 

  • "SHA-3 Proposal: ECHO" 
    at The First SHA-3 Candidate Conference, Leuven, Belgium, February 25th 2009 
    slides 


  • 2008

  • "Cryptanalyse des fonctions éponges"
    at Séminaire de cryptographie de l'Université de Rennes, Rennes, France, November 21st 2008
    slides

  • "Cryptanalyse des fonctions éponges"
    at Séminaire de cryptographie de l'Université de Caen, Caen, France, November 20th 2008
    slides

  • "Security Analysis of Extended Sponge Functions"
    at ECRYPT Hash Workshop, Leiden, The Netherlands, June 4th 2008
    slides



  • 2007

  • "Collisions on SHA-0 in One Hour"
    at IPA Cryptography Workshop, Tokyo, Japan, December 13rd 2007
    slides

  • "Cryptanalysis of Grindahl"
    at IPA Cryptography Forum, Tokyo, Japan, December 12nd 2007
    slides 



  • Thesis


  • T. Peyrin
    "Analyse de fonctions de hachage cryptographiques"
    PhD thesis, University of Versailles, 2008
    report

  • T. Peyrin 
    "Etude de la Sécurité des T-fonctions"
    Master thesis, MPRI, 2005
    report

  • T. Peyrin
    "Bluetooth Security"
    Diploma thesis, CPE Lyon - EPFL, 2004
    report 




  • Articles in Magazines


  • R. Benadjila, O. Billet, G. Macario-Rat and T. Peyrin
  • "Hachage Sécurisé: la Compétition SHA-3
    " 
    in MISC - Multi-System and Internet Security Cookbook, November 2012

  • T. Peyrin
  • "Les compromis temps-mémoire: un outil pratique pour la cryptanalyse"
    in La lettre Techniques de l'ingénieur - Sécurité des systèmes d'information, January 2007



    Scientific Activities


  • Program Chair for FSE 2016 

  • Organising Chair for ASK 2011

  • General Chair for FSE 2013

  • Program Committee for 
  • CRYPTO 2010, CRYPTO 2012CRYPTO 2015
  • EUROCRYPT 2012
  • ASIACRYPT 2011ASIACRYPT 2014   
  • FSE 2011FSE 2014FSE 2015
  • SAC 2011 
  • INDOCRYPT 2013INDOCRYPT 2014
  • WEWoRC 2011WeWORC 2013WeWORC 2015
  • ACNS 2015
  • LatinCrypt 2014
  • SCN 2014 
  • COSADE 2015
  • LightSec 2015
  • ACSA 2011 
  • ISC 2009 
  • CANS 2011CANS 2013 
  • ECRYPT LC 2011 
  • IWSEC 2012IWSEC 2013IWSEC 2014IWSEC 2015
  • AIM 2012 

  • External Rewiever for CRYPTO, EUROCRYPT, ASIACRYPT, FSE, CHES, ...

  • Member of IACR.



  • Updated: September 23th, 2014