Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

152 résultats

Similarities between Encryption and Decryption: How far can we go?

Anne Canteaut
Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada
Communication dans un congrès hal-00858933v1
Image document

Distinguishing and Key-recovery Attacks against Wheesht

Anne Canteaut , Gaëtan Leurent
2014
Pré-publication, Document de travail hal-00966346v2

Sur la résistance aux cryptanalyses différentielles et linéaires

Anne Canteaut
Journées Codage et Cryptographie 2015, Oct 2015, La Londe-les-Maures, France
Communication dans un congrès hal-01237299v1

Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part II

Anne Canteaut , Yuval Ishai
Springer, 12106, 2020, Lecture Notes in Computer Science, 978-3-030-45723-5. ⟨10.1007/978-3-030-45724-2⟩
Ouvrages hal-03090164v1

Parity-Check Relations on Combination Generators

Anne Canteaut , María Naya-Plasencia
IEEE Transactions on Information Theory, 2012, 58 (6), pp.3900-3911. ⟨10.1109/TIT.2012.2184736⟩
Article dans une revue hal-01110509v1
Image document

Ciphertext only Reconstruction of LFSR-based Stream Ciphers

Anne Canteaut , Eric Filiol
[Research Report] RR-3887, INRIA. 2000
Rapport inria-00072766v1

Higher Order Differentials, Integral Attacks and Variants

Anne Canteaut
Christina Boura; María Naya-Plasencia. Symmetric Cryptography 2: Cryptanalysis and Future Directions, John Wiley & Sons, Ltd, pp.123--132, 2023, 9781394256327. ⟨10.1002/9781394256327.ch10⟩
Chapitre d'ouvrage hal-04333167v1
Image document

Nonlinear Approximations in Cryptanalysis Revisited

Christof Beierle , Anne Canteaut , Gregor Leander
IACR Transactions on Symmetric Cryptology, 2018, 2018 (4), pp.80-101. ⟨10.13154/tosc.v2018.i4.80-101⟩
Article dans une revue hal-01944995v2
Image document

Proving Resistance against Invariant Attacks: Properties of the Linear Layer

Christof Beierle , Anne Canteaut , Gregor Leander , Yann Rotella
ESC 2017 - Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
Communication dans un congrès hal-01649994v1
Image document

Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems

Tim Beyne , Anne Canteaut , Itai Dinur , Maria Eichlseder , Gregor Leander , et al.
CRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.299-328, ⟨10.1007/978-3-030-56877-1_11⟩
Communication dans un congrès hal-03090185v1

Chiffrer mieux pour chiffrer plus

Anne Canteaut
2014
Autre publication scientifique hal-01099759v1

On the algebraic degree of iterated power functions

Clémence Bouvier , Anne Canteaut , Léo Perrin
Designs, Codes and Cryptography, 2023, 91 (3), pp.997-1033. ⟨10.1007/s10623-022-01136-x⟩
Article dans une revue hal-03901713v1
Image document

On the Origin of Trust: Struggle for Secure Cryptography

Anne Canteaut
Dot Security 2016, Apr 2016, Paris, France
Communication dans un congrès hal-01401311v1

Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers

Emmanuel Bresson , Anne Canteaut , Benoit Chevallier-Mames , Christophe Clavier , Thomas Fuhr , et al.
[Research Report] 2009/299, IACR Cryptology ePrint Archive. 2009
Rapport hal-00771272v1
Image document

DFA on LS-Designs with a Practical Implementation on SCREAM

Benjamin Lac , Anne Canteaut , Jacques Jean-Alain Fournier , Renaud Sirdey
COSADE 2017 - Constructive Side-Channel Analysis and Secure Design, Apr 2017, Paris, France. pp.223--247, ⟨10.1007/978-3-319-64647-3_14⟩
Communication dans un congrès hal-01649974v1

Iterated Power Functions: from Univariate Polynomial Representation to Multivariate Degree

Clémence Bouvier , Anne Canteaut , Léo Perrin
Fq15 - International Conference on Finite Fields and Their Applications 2023, Jun 2023, Aubervilliers, France
Communication dans un congrès hal-04277028v1
Image document

Two Notions of Differential Equivalence on Sboxes

Christina Boura , Anne Canteaut , Jérémy Jean , Valentin Suder
WCC 2017 - Workshop on Coding and Cryptography, Sep 2017, Saint Petersburg, Russia
Communication dans un congrès hal-01650010v1
Image document

Recommandations sur les « éditeurs de la zone grise »

Frédéric Blanqui , Anne Canteaut , Hidde de Jong , Sébastien Imperiale , Nathalie Mitton , et al.
Inria. 2023, pp.1-3
Rapport hal-04001505v1
Image document

Understanding cache attacks

Anne Canteaut , Cédric Lauradoux , André Seznec
[Research Report] RR-5881, INRIA. 2006
Rapport inria-00071387v1
Image document

A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to Primitive Narrow-Sense BCH Codes of Length~511

Anne Canteaut , Florent Chabaud
[Research Report] RR-2685, INRIA. 1995
Rapport inria-00074006v1
Image document

Construction of Resilient Functions over a Finite Alphabet

Paul Camion , Anne Canteaut
[Research Report] RR-2789, INRIA. 1996
Rapport inria-00073902v1
Image document

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security

Anne Canteaut , Sébastien Duval , Gaëtan Leurent , María Naya-Plasencia , Léo Perrin , et al.
IACR Transactions on Symmetric Cryptology, 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process, 2020 (S1), pp.160--207. ⟨10.13154/tosc.v2020.iS1.160-207⟩
Article dans une revue hal-03046716v1

Chiffrements à bas coût : comment chiffrer et déchiffrer avec des opérations similaires

Anne Canteaut
Journées Nationales du GDR Informatique Mathématique, Jan 2014, Paris, France
Communication dans un congrès hal-01092632v1

Cryptanalysis of Wheesht

Anne Canteaut , Gaëtan Leurent
DIAC 2014, Aug 2014, Santa Barbara, United States
Communication dans un congrès hal-01093428v1

Sieve-in-the-Middle: Improved MITM Attacks (Full Version)

Anne Canteaut , María Naya-Plasencia , Bastien Vayssière
[Research Report] 2014/089, IACR Cryptology ePrint Archive. 2013
Rapport hal-00857369v1

Construction of Lightweight S-Boxes using Feistel and MISTY structures

Anne Canteaut , Sébastien Duval , Gaëtan Leurent
Selected Areas in Cryptography - SAC 2015, Aug 2015, Sackville, Canada
Communication dans un congrès hal-01205187v1
Image document

Symmetric Boolean functions

Anne Canteaut , Marion Videau
IEEE Transactions on Information Theory, 2005, 51 (8), pp.2791- 2811. ⟨10.1109/TIT.2005.851743⟩
Article dans une revue inria-00001148v1
Image document

Attacks Against Filter Generators Exploiting Monomial Mappings

Anne Canteaut , Yann Rotella
Fast Software Encrytion - FSE 2016, Mar 2016, Bochum, Germany. pp.78 - 98, ⟨10.1007/978-3-662-52993-5_5⟩
Communication dans un congrès hal-01401009v1

À propos de la cryptographie

Anne Canteaut , Joanna Jongwane
Interstices, 2011
Article dans une revue hal-01350239v1
Image document

On Sboxes sharing the same DDT

Christina Boura , Anne Canteaut , Jérémy Jean , Valentin Suder
Dagstuhl Seminar 18021 Symmetric Cryptography, Jan 2018, Dagstuhl, Germany. ⟨10.4230/DAGREP.8.1.1⟩
Communication dans un congrès hal-01955256v1