Filtrer vos résultats
- 78
- 74
- 74
- 27
- 23
- 10
- 7
- 5
- 4
- 1
- 1
- 17
- 1
- 144
- 11
- 3
- 1
- 10
- 4
- 7
- 10
- 10
- 14
- 10
- 12
- 13
- 11
- 12
- 4
- 4
- 5
- 2
- 5
- 1
- 7
- 3
- 4
- 1
- 1
- 1
- 1
- 128
- 24
- 80
- 70
- 12
- 10
- 8
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 152
- 12
- 10
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
152 résultats
Similarities between Encryption and Decryption: How far can we go?Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada
Communication dans un congrès
hal-00858933v1
|
|||
|
Distinguishing and Key-recovery Attacks against Wheesht2014
Pré-publication, Document de travail
hal-00966346v2
|
||
Sur la résistance aux cryptanalyses différentielles et linéairesJournées Codage et Cryptographie 2015, Oct 2015, La Londe-les-Maures, France
Communication dans un congrès
hal-01237299v1
|
|||
Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part IISpringer, 12106, 2020, Lecture Notes in Computer Science, 978-3-030-45723-5. ⟨10.1007/978-3-030-45724-2⟩
Ouvrages
hal-03090164v1
|
|||
Parity-Check Relations on Combination GeneratorsIEEE Transactions on Information Theory, 2012, 58 (6), pp.3900-3911. ⟨10.1109/TIT.2012.2184736⟩
Article dans une revue
hal-01110509v1
|
|||
|
Ciphertext only Reconstruction of LFSR-based Stream Ciphers[Research Report] RR-3887, INRIA. 2000
Rapport
inria-00072766v1
|
||
Higher Order Differentials, Integral Attacks and VariantsChristina Boura; María Naya-Plasencia. Symmetric Cryptography 2: Cryptanalysis and Future Directions, John Wiley & Sons, Ltd, pp.123--132, 2023, 9781394256327. ⟨10.1002/9781394256327.ch10⟩
Chapitre d'ouvrage
hal-04333167v1
|
|||
|
Nonlinear Approximations in Cryptanalysis RevisitedIACR Transactions on Symmetric Cryptology, 2018, 2018 (4), pp.80-101. ⟨10.13154/tosc.v2018.i4.80-101⟩
Article dans une revue
hal-01944995v2
|
||
|
Proving Resistance against Invariant Attacks: Properties of the Linear Layer ESC 2017 - Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
Communication dans un congrès
hal-01649994v1
|
||
|
Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof SystemsCRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.299-328, ⟨10.1007/978-3-030-56877-1_11⟩
Communication dans un congrès
hal-03090185v1
|
||
Chiffrer mieux pour chiffrer plus2014
Autre publication scientifique
hal-01099759v1
|
|||
On the algebraic degree of iterated power functionsDesigns, Codes and Cryptography, 2023, 91 (3), pp.997-1033. ⟨10.1007/s10623-022-01136-x⟩
Article dans une revue
hal-03901713v1
|
|||
|
On the Origin of Trust: Struggle for Secure CryptographyDot Security 2016, Apr 2016, Paris, France
Communication dans un congrès
hal-01401311v1
|
||
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers[Research Report] 2009/299, IACR Cryptology ePrint Archive. 2009
Rapport
hal-00771272v1
|
|||
|
DFA on LS-Designs with a Practical Implementation on SCREAMCOSADE 2017 - Constructive Side-Channel Analysis and Secure Design, Apr 2017, Paris, France. pp.223--247, ⟨10.1007/978-3-319-64647-3_14⟩
Communication dans un congrès
hal-01649974v1
|
||
Iterated Power Functions: from Univariate Polynomial Representation to Multivariate DegreeFq15 - International Conference on Finite Fields and Their Applications 2023, Jun 2023, Aubervilliers, France
Communication dans un congrès
hal-04277028v1
|
|||
|
Two Notions of Differential Equivalence on SboxesWCC 2017 - Workshop on Coding and Cryptography, Sep 2017, Saint Petersburg, Russia
Communication dans un congrès
hal-01650010v1
|
||
|
Recommandations sur les « éditeurs de la zone grise »Inria. 2023, pp.1-3
Rapport
hal-04001505v1
|
||
|
Understanding cache attacks[Research Report] RR-5881, INRIA. 2006
Rapport
inria-00071387v1
|
||
|
A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to Primitive Narrow-Sense BCH Codes of Length~511[Research Report] RR-2685, INRIA. 1995
Rapport
inria-00074006v1
|
||
|
Construction of Resilient Functions over a Finite Alphabet[Research Report] RR-2789, INRIA. 1996
Rapport
inria-00073902v1
|
||
|
Saturnin: a suite of lightweight symmetric algorithms for post-quantum securityIACR Transactions on Symmetric Cryptology, 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process, 2020 (S1), pp.160--207. ⟨10.13154/tosc.v2020.iS1.160-207⟩
Article dans une revue
hal-03046716v1
|
||
Chiffrements à bas coût : comment chiffrer et déchiffrer avec des opérations similairesJournées Nationales du GDR Informatique Mathématique, Jan 2014, Paris, France
Communication dans un congrès
hal-01092632v1
|
|||
Cryptanalysis of WheeshtDIAC 2014, Aug 2014, Santa Barbara, United States
Communication dans un congrès
hal-01093428v1
|
|||
Sieve-in-the-Middle: Improved MITM Attacks (Full Version)[Research Report] 2014/089, IACR Cryptology ePrint Archive. 2013
Rapport
hal-00857369v1
|
|||
Construction of Lightweight S-Boxes using Feistel and MISTY structuresSelected Areas in Cryptography - SAC 2015, Aug 2015, Sackville, Canada
Communication dans un congrès
hal-01205187v1
|
|||
|
Symmetric Boolean functionsIEEE Transactions on Information Theory, 2005, 51 (8), pp.2791- 2811. ⟨10.1109/TIT.2005.851743⟩
Article dans une revue
inria-00001148v1
|
||
|
Attacks Against Filter Generators Exploiting Monomial MappingsFast Software Encrytion - FSE 2016, Mar 2016, Bochum, Germany. pp.78 - 98, ⟨10.1007/978-3-662-52993-5_5⟩
Communication dans un congrès
hal-01401009v1
|
||
À propos de la cryptographieInterstices, 2011
Article dans une revue
hal-01350239v1
|
|||
|
On Sboxes sharing the same DDTDagstuhl Seminar 18021 Symmetric Cryptography, Jan 2018, Dagstuhl, Germany. ⟨10.4230/DAGREP.8.1.1⟩
Communication dans un congrès
hal-01955256v1
|