Section: New Results
Participants : Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent.
Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard (SAC '09)
Practical Electromagnetic Template Attack on HMAC (CHES '09)
Besides the design of a hash function, have also attacked some schemes: such as Edon-R (recovering an equivalent key when the MAC function is H(k||m) ) and we have the best attacks on the Lesamnta hash function.
Following the work of Eurocrypt last year  on cryptanalysis of mode of operation for hash functions, some new attacks have been proposed at SAC  . Finally, in order to attack some standards such as HMAC-SHA1, we have used side channel attacks  .