Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

152 résultats

Similarities between Encryption and Decryption: How far can we go?

Anne Canteaut
Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada
Communication dans un congrès hal-00858933v1
Image document

Distinguishing and Key-recovery Attacks against Wheesht

Anne Canteaut , Gaëtan Leurent
2014
Pré-publication, Document de travail hal-00966346v2

Sur la résistance aux cryptanalyses différentielles et linéaires

Anne Canteaut
Journées Codage et Cryptographie 2015, Oct 2015, La Londe-les-Maures, France
Communication dans un congrès hal-01237299v1

Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part II

Anne Canteaut , Yuval Ishai
Springer, 12106, 2020, Lecture Notes in Computer Science, 978-3-030-45723-5. ⟨10.1007/978-3-030-45724-2⟩
Ouvrages hal-03090164v1

Parity-Check Relations on Combination Generators

Anne Canteaut , María Naya-Plasencia
IEEE Transactions on Information Theory, 2012, 58 (6), pp.3900-3911. ⟨10.1109/TIT.2012.2184736⟩
Article dans une revue hal-01110509v1
Image document

Ciphertext only Reconstruction of LFSR-based Stream Ciphers

Anne Canteaut , Eric Filiol
[Research Report] RR-3887, INRIA. 2000
Rapport inria-00072766v1

Higher Order Differentials, Integral Attacks and Variants

Anne Canteaut
Christina Boura; María Naya-Plasencia. Symmetric Cryptography 2: Cryptanalysis and Future Directions, John Wiley & Sons, Ltd, pp.123--132, 2023, 9781394256327. ⟨10.1002/9781394256327.ch10⟩
Chapitre d'ouvrage hal-04333167v1
Image document

Nonlinear Approximations in Cryptanalysis Revisited

Christof Beierle , Anne Canteaut , Gregor Leander
IACR Transactions on Symmetric Cryptology, 2018, 2018 (4), pp.80-101. ⟨10.13154/tosc.v2018.i4.80-101⟩
Article dans une revue hal-01944995v2
Image document

Proving Resistance against Invariant Attacks: Properties of the Linear Layer

Christof Beierle , Anne Canteaut , Gregor Leander , Yann Rotella
ESC 2017 - Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
Communication dans un congrès hal-01649994v1
Image document

Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems

Tim Beyne , Anne Canteaut , Itai Dinur , Maria Eichlseder , Gregor Leander , et al.
CRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.299-328, ⟨10.1007/978-3-030-56877-1_11⟩
Communication dans un congrès hal-03090185v1

Chiffrer mieux pour chiffrer plus

Anne Canteaut
2014
Autre publication scientifique hal-01099759v1

On the algebraic degree of iterated power functions

Clémence Bouvier , Anne Canteaut , Léo Perrin
Designs, Codes and Cryptography, 2023, 91 (3), pp.997-1033. ⟨10.1007/s10623-022-01136-x⟩
Article dans une revue hal-03901713v1
Image document

On the Origin of Trust: Struggle for Secure Cryptography

Anne Canteaut
Dot Security 2016, Apr 2016, Paris, France
Communication dans un congrès hal-01401311v1

Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers

Emmanuel Bresson , Anne Canteaut , Benoit Chevallier-Mames , Christophe Clavier , Thomas Fuhr , et al.
[Research Report] 2009/299, IACR Cryptology ePrint Archive. 2009
Rapport hal-00771272v1
Image document

DFA on LS-Designs with a Practical Implementation on SCREAM

Benjamin Lac , Anne Canteaut , Jacques Jean-Alain Fournier , Renaud Sirdey
COSADE 2017 - Constructive Side-Channel Analysis and Secure Design, Apr 2017, Paris, France. pp.223--247, ⟨10.1007/978-3-319-64647-3_14⟩
Communication dans un congrès hal-01649974v1

On Almost Perfect Nonlinear mappings

Thierry Pierre Berger , Anne Canteaut , Pascale Charpin , Yann Laigle-Chapuy
IEEE Transactions on Information Theory, 2006, 52, pp.4160-4170, n°9
Article dans une revue hal-00112955v1

Stream ciphers

Anne Canteaut
Summer school on design and security of cryptographic algorithms and devices for real-world applications, Jun 2014, Sibenik, Croatia
Communication dans un congrès hal-01092636v1
Image document

On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of G ∘ F

Christina Boura , Anne Canteaut
IEEE Transactions on Information Theory, 2013, 59 (1), pp.691-702. ⟨10.1109/TIT.2012.2214203⟩
Article dans une revue hal-00738398v1
Image document

Reflection Ciphers (Extended abstract)

Christina Boura , Anne Canteaut , Lars R. Knudsen , Gregor Leander
Workshop on Coding and Cryptography - WCC 2015, Apr 2015, Paris, France
Communication dans un congrès hal-01237291v1
Image document

A new criterion for avoiding the propagation of linear relations through an Sbox

Christina Boura , Anne Canteaut
Fast Software Encryption - FSE 2013, Mar 2013, Singapore, Singapore. pp.585--604, ⟨10.1007/978-3-662-43933-3_30⟩
Communication dans un congrès hal-00931535v1
Image document

On the security of the Rescue hash function

Tim Beyne , Anne Canteaut , Gregor Leander , Maria Naya Plasencia , Léo Perrin , et al.
2020/820, IACR Cryptology ePrint Archive. 2020
Rapport hal-04331826v1
Image document

Attaques par invariant : comment s'en protéger?

Christof Beierle , Anne Canteaut , Gregor Leander , Yann Rotella
Journées codage et cryptographie 2017, Apr 2017, La Bresse, France. pp.1
Communication dans un congrès hal-01633519v1
Image document

On the importance of considering physical attacks when implementing lightweight cryptography

Alexandre Adomnicai , Benjamin Lac , Anne Canteaut , Jacques Jean-Alain Fournier , Laurent Masson , et al.
Lightweight Cryptography Workshop 2016 | NIST, NIST, Oct 2016, Gaithersburg, United States
Communication dans un congrès cea-01436006v1

Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part I

Anne Canteaut , Yuval Ishai
Springer, 12105, 2020, Lecture Notes in Computer Science, 978-3-030-45720-4. ⟨10.1007/978-3-030-45721-1⟩
Ouvrages hal-03090162v1
Image document

A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size $2^{4k+2}$

Anne Canteaut , Sébastien Duval , Léo Perrin
[Research Report] 2016/887, IACR Cryptology ePrint Archive. 2016, pp.29
Rapport hal-01401245v1

Related-Key Attack on Full-Round PICARO

Anne Canteaut , Virginie Lallemand , Maria Naya-Plasencia
Selected Areas in Cryptography - SAC 2015, Aug 2015, Sackville, Canada
Communication dans un congrès hal-01205209v1
Image document

Report on the Security of STARK-friendly Hash Functions (Version 2.0)

Anne Canteaut , Tim Beyne , Itai Dinur , Maria Eichlseder , Gregor Leander , et al.
2020
Pré-publication, Document de travail hal-02883253v1
Image document

Le traçage anonyme, dangereux oxymore

Xavier Bonnetain , Anne Canteaut , Véronique Cortier , Pierrick Gaudry , Lucca Hirschi , et al.
Le droit face au coronavirus, LexisNexis, pp.468--480, 2021, 9782711036394
Chapitre d'ouvrage hal-02997228v1

Contemporary Developments in Finite Fields and Applications

Anne Canteaut , Gove Effinger , Sophie Huczynska , Daniel Panario , Leo Storme
World Scientific, pp.362, 2016, ⟨10.1142/9762⟩
Ouvrages hal-01401266v1
Image document

Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES

Aurélien Boeuf , Anne Canteaut , Léo Perrin
IACR Transactions on Symmetric Cryptology, 2023, 2023 (4), pp.270-298. ⟨10.46586/tosc.v2023.i4.270-298⟩
Article dans une revue hal-04361453v2