User profiles for Pouyan Sepehrdad
Pouyan SepehrdadSenior Staff Engineer / Manager at Qualcomm Technologies Inc. Verified email at qti.qualcomm.com Cited by 770 |
Recursive diffusion layers for block ciphers and hash functions
Many modern block ciphers use maximum distance separable (MDS) matrices as the main
part of their diffusion layers. In this paper, we propose a new class of diffusion layers …
part of their diffusion layers. In this paper, we propose a new class of diffusion layers …
Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT
J Nakahara, P Sepehrdad, B Zhang… - Cryptology and Network …, 2009 - Springer
The contributions of this paper include the first linear hull and a revisit of the algebraic
cryptanalysis of reduced-round variants of the block cipher PRESENT, under known-plaintext and …
cryptanalysis of reduced-round variants of the block cipher PRESENT, under known-plaintext and …
ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware
…, J Nakahara Jr, K Ouafi, N Reffé, P Sepehrdad… - … and Embedded Systems, 2010 - Springer
This paper describes and analyzes the security of a general-purpose cryptographic function
design, with application in RFID tags and sensor networks. Based on these analyzes, we …
design, with application in RFID tags and sensor networks. Based on these analyzes, we …
Discovery and exploitation of new biases in RC4
In this paper, we present several weaknesses in the stream cipher RC4. First, we present a
technique to automatically reveal linear correlations in the PRGA of RC4. With this method, …
technique to automatically reveal linear correlations in the PRGA of RC4. With this method, …
Statistical attack on RC4: distinguishing WPA
In this paper we construct several tools for manipulating pools of biases in the analysis of
RC4. Then, we show that optimized strategies can break WEP based on 4 000 packets by …
RC4. Then, we show that optimized strategies can break WEP based on 4 000 packets by …
Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers
…, NT Courtois, J Nakahara, P Sepehrdad… - Progress in Cryptology …, 2010 - Springer
This paper presents the first results on AIDA/cube, algebraic and side-channel attacks on
variable number of rounds of all members of the KATAN family of block ciphers. Our cube …
variable number of rounds of all members of the KATAN family of block ciphers. Our cube …
Statistical and algebraic cryptanalysis of lightweight and ultra-lightweight symmetric primitives
P Sepehrdad - 2012 - infoscience.epfl.ch
Symmetric cryptographic primitives such as block and stream ciphers are the building
blocks in many cryptographic protocols. Having such blocks which provide provable security …
blocks in many cryptographic protocols. Having such blocks which provide provable security …
ElimLin algorithm revisited
NT Courtois, P Sepehrdad, P Sušil… - International Workshop on …, 2012 - Springer
ElimLin is a simple algorithm for solving polynomial systems of multivariate equations over
small finite fields. It was initially proposed as a single tool by Courtois to attack DES. It can …
small finite fields. It was initially proposed as a single tool by Courtois to attack DES. It can …
Efficient recursive diffusion layers for block ciphers and hash functions
Many modern block ciphers use maximum distance separable (MDS) matrices as the main
part of their diffusion layers. In this paper, we propose a very efficient new class of diffusion …
part of their diffusion layers. In this paper, we propose a very efficient new class of diffusion …
Combined algebraic and truncated differential cryptanalysis on reduced-round simon
…, T Mourouzis, G Song, P Sepehrdad… - … on Security and …, 2014 - ieeexplore.ieee.org
Recently, two families of ultra-lightweight block ciphers were proposed, SIMON and SPECK,
which come in a variety of block and key sizes (Beaulieu et al., 2013). They are designed to …
which come in a variety of block and key sizes (Beaulieu et al., 2013). They are designed to …