Projects per year
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Study of cryptographic techniques with a focus on practical aspects of symmetric key algorithms and hash functions
Bruyninckx, H. (Promotor), Petit, J. (Promotor) & Lafitte, F. (Researcher)
1/01/22 → 31/12/25
Project: Research
-
DAP/16-2: Study of cryptographic techniques with a focus on practical aspects of symmetric key algorithms and hash functions
Petit, J. (Promotor) & Lafitte, F. (Researcher)
1/01/16 → 31/12/21
Project: Research
-
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality
Liénardy, J. & Lafitte, F., Jan 2024, In: Information Processing Letters. 183, 106404.Research output: Contribution to journal › Article › peer-review
-
CryptoSAT: A tool for SAT-based cryptanalysis
Lafitte, F., 1 Nov 2018, In: IET Information Security. 12, 6, p. 463-474 12 p.Research output: Contribution to journal › Article › peer-review
-
Blinded additively homomorphic encryption schemes for self-tallying voting
Dossogne, J. & Lafitte, F., Jun 2015, In: Journal of Information Security and Applications. 22, p. 40-53 14 p.Research output: Contribution to journal › Article › peer-review
-
SAT based analysis of LTE stream cipher ZUC
Lafitte, F., Markowitch, O. & Van Heule, D., Jun 2015, In: Journal of Information Security and Applications. 22, p. 54-65 12 p.Research output: Contribution to journal › Article › peer-review
-
A note on a signature building block and relevant security reduction in the green-hohenberger ot scheme
Cao, Z., Lafitte, F. & Markowitch, O., 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer, p. 282-288 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Activities
-
DAP-16/02: Study of cryptographic techniques with focus on symmetric key algorithms and hash functions
Neyt, A. (Co-author), Lafitte, F. (Poster presenter) & Bruyninckx, H. (Co-author)
23 May 2018Activity: Talk or presentation › Scientific poster presentation
-
Consultancy for the F-35 Pilot Training Devices program
Jacqmin, P.-A. (Subject Matter Expert), Lafitte, F. (Subject Matter Expert), Liénardy, J. (Subject Matter Expert) & Petit, J. (Promotor)
11 Feb 2025 → 17 Feb 2025Activity: Expertise / Valorisation › Expertise
-
Consultancy on Elliptic Curve Cryptography
Jacqmin, P.-A. (Subject Matter Expert), Lafitte, F. (Subject Matter Expert), Liénardy, J. (Subject Matter Expert) & Petit, J. (Promotor)
4 Apr 2024 → 11 Jul 2024Activity: Expertise / Valorisation › Expertise
-
Eurocrypt 2023
Jacqmin, P.-A. (Participant), Liénardy, J. (Participant), Lafitte, F. (Participant) & Neyt, A. (Participant)
23 Apr 2023 → 27 Apr 2023Activity: Participating in or organising an event (conference, measurement campaign, ...) › Participating in a conference, workshop, ...
-
Fast Software Encryption 2018
Neyt, A. (Participant) & Lafitte, F. (Participant)
5 Mar 2018 → 7 Mar 2018Activity: Participating in or organising an event (conference, measurement campaign, ...) › Participating in a conference, workshop, ...
Thesis
-
On the automated verification of symmetric-key cryptographic algorithms: an approach based on SAT-solvers
Lafitte, F. (Author), Van Heule, D. (Supervisor) & Markowitch, O. (Supervisor), 18 Sept 2017Student thesis: Doctoral Thesis