What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
David Gérault
Google Scholar
20
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ctrsa
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.
Emanuele Bellini
David Gérault
Juan Grados
Thomas Peyrin
2025
conf/latincrypt
Generic Partial Decryption as Feature Engineering for Neural Distinguishers.
Emanuele Bellini
Rocco Brunelli
David Gérault
Anna Hambitzer
Marco Pedicini
2023
journals/tosc
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences.
Emanuele Bellini
David Gérault
Anna Hambitzer
Matteo Rossi
2023
journals/tosc
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP.
Emanuele Bellini
David Gérault
Juan Grados
Rusydi H. Makarim
Thomas Peyrin
2023
conf/ctrsa
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher.
Anna Hambitzer
David Gérault
Yun Ju Huang
Najwa Aaraj
Emanuele Bellini
2023
conf/ctrsa
Fully Automated Differential-Linear Attacks Against ARX Ciphers.
Emanuele Bellini
David Gérault
Juan Grados
Rusydi H. Makarim
Thomas Peyrin
2023
conf/sacrypt
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.
Amirhossein Ebrahimi
David Gérault
Paolo Palmieri
2023
conf/sacrypt
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives.
Emanuele Bellini
David Gérault
Juan Grados
Yun Ju Huang
Rusydi H. Makarim
Mohamed Rachidi
Sharwan K. Tiwari
2023
conf/cans
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives.
Emanuele Bellini
Alessandro De Piccoli
Mattia Formenti
David Gérault
Paul Huynh
Simone Pelizzola
Sergio Polese
Andrea Visconti
2022
conf/africacrypt
And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael.
Loïc Rouquette
David Gérault
Marine Minier
Christine Solnon
2021
journals/tosc
Exploring Differential-Based Distinguishers and Forgeries for ASCON.
David Gérault
Thomas Peyrin
Quan Quan Tan
2021
conf/fc
Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models.
David Gérault
2021
conf/eurocrypt
A Deeper Look at Machine Learning-Based Cryptanalysis.
Adrien Benamira
David Gérault
Thomas Peyrin
Quan Quan Tan
2020
journals/tosc
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers.
Ling Sun
David Gérault
Wei Wang
Meiqin Wang
2019
conf/wisec
Distance bounding under different assumptions: opinion.
David Gérault
Ioana Boureanu
2017
journals/tosc
Analysis of AES, SKINNY, and Others with Constraint Programming.
Siwei Sun
David Gérault
Pascal Lafourcade
Qianqian Yang
Yosuke Todo
Kexin Qiao
Lei Hu
2017
conf/ccs
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
Gildas Avoine
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
2017
conf/provsec
Verifiable Private Polynomial Evaluation.
Xavier Bultel
Manik Lal Das
Hardik Gajera
David Gérault
Matthieu Giraud
Pascal Lafourcade
2017
conf/wisec
Breaking and fixing the HB+DB protocol.
Ioana Boureanu
David Gérault
Pascal Lafourcade
Cristina Onete
2016
conf/wisec
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
Coauthors
Adrien Benamira
(1)
Alessandro De Piccoli
(1)
Amirhossein Ebrahimi
(1)
Andrea Visconti
(1)
Anna Hambitzer
(3)
Christine Solnon
(1)
Cristina Onete
(3)
David Gérault
(20)
Emanuele Bellini
(8)
Gildas Avoine
(1)
Hardik Gajera
(1)
Ioana Boureanu
(2)
Jean-Marc Robert
(2)
Juan Grados
(4)
Kexin Qiao
(1)
Lei Hu
(1)
Ling Sun
(1)
Loïc Rouquette
(1)
Manik Lal Das
(1)
Marco Pedicini
(1)
Marine Minier
(1)
Matteo Rossi
(1)
Matthieu Giraud
(1)
Mattia Formenti
(1)
Meiqin Wang
(1)
Mohamed Rachidi
(1)
Najwa Aaraj
(1)
Paolo Palmieri
(1)
Pascal Lafourcade
(5)
Paul Huynh
(1)
Qianqian Yang
(1)
Quan Quan Tan
(2)
Rocco Brunelli
(1)
Rusydi H. Makarim
(3)
Sébastien Gambs
(2)
Sergio Polese
(1)
Sharwan K. Tiwari
(1)
Simone Pelizzola
(1)
Siwei Sun
(1)
Thomas Peyrin
(5)
Wei Wang
(1)
Xavier Bultel
(3)
Yosuke Todo
(1)
Yun Ju Huang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to