Filtrer vos résultats
- 78
- 74
- 74
- 27
- 23
- 10
- 7
- 5
- 4
- 1
- 1
- 17
- 1
- 144
- 11
- 3
- 1
- 10
- 4
- 7
- 10
- 10
- 14
- 10
- 12
- 13
- 11
- 12
- 4
- 4
- 5
- 2
- 5
- 1
- 7
- 3
- 4
- 1
- 1
- 1
- 1
- 128
- 24
- 80
- 70
- 12
- 10
- 8
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 152
- 12
- 10
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
152 résultats
Similarities between Encryption and Decryption: How far can we go?Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada
Communication dans un congrès
hal-00858933v1
|
|||
|
Distinguishing and Key-recovery Attacks against Wheesht2014
Pré-publication, Document de travail
hal-00966346v2
|
||
Sur la résistance aux cryptanalyses différentielles et linéairesJournées Codage et Cryptographie 2015, Oct 2015, La Londe-les-Maures, France
Communication dans un congrès
hal-01237299v1
|
|||
Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part IISpringer, 12106, 2020, Lecture Notes in Computer Science, 978-3-030-45723-5. ⟨10.1007/978-3-030-45724-2⟩
Ouvrages
hal-03090164v1
|
|||
Parity-Check Relations on Combination GeneratorsIEEE Transactions on Information Theory, 2012, 58 (6), pp.3900-3911. ⟨10.1109/TIT.2012.2184736⟩
Article dans une revue
hal-01110509v1
|
|||
|
Ciphertext only Reconstruction of LFSR-based Stream Ciphers[Research Report] RR-3887, INRIA. 2000
Rapport
inria-00072766v1
|
||
Higher Order Differentials, Integral Attacks and VariantsChristina Boura; María Naya-Plasencia. Symmetric Cryptography 2: Cryptanalysis and Future Directions, John Wiley & Sons, Ltd, pp.123--132, 2023, 9781394256327. ⟨10.1002/9781394256327.ch10⟩
Chapitre d'ouvrage
hal-04333167v1
|
|||
|
Nonlinear Approximations in Cryptanalysis RevisitedIACR Transactions on Symmetric Cryptology, 2018, 2018 (4), pp.80-101. ⟨10.13154/tosc.v2018.i4.80-101⟩
Article dans une revue
hal-01944995v2
|
||
|
Proving Resistance against Invariant Attacks: Properties of the Linear Layer ESC 2017 - Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
Communication dans un congrès
hal-01649994v1
|
||
|
Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof SystemsCRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.299-328, ⟨10.1007/978-3-030-56877-1_11⟩
Communication dans un congrès
hal-03090185v1
|
||
Chiffrer mieux pour chiffrer plus2014
Autre publication scientifique
hal-01099759v1
|
|||
On the algebraic degree of iterated power functionsDesigns, Codes and Cryptography, 2023, 91 (3), pp.997-1033. ⟨10.1007/s10623-022-01136-x⟩
Article dans une revue
hal-03901713v1
|
|||
|
On the Origin of Trust: Struggle for Secure CryptographyDot Security 2016, Apr 2016, Paris, France
Communication dans un congrès
hal-01401311v1
|
||
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers[Research Report] 2009/299, IACR Cryptology ePrint Archive. 2009
Rapport
hal-00771272v1
|
|||
|
DFA on LS-Designs with a Practical Implementation on SCREAMCOSADE 2017 - Constructive Side-Channel Analysis and Secure Design, Apr 2017, Paris, France. pp.223--247, ⟨10.1007/978-3-319-64647-3_14⟩
Communication dans un congrès
hal-01649974v1
|
||
On Almost Perfect Nonlinear mappingsIEEE Transactions on Information Theory, 2006, 52, pp.4160-4170, n°9
Article dans une revue
hal-00112955v1
|
|||
Stream ciphersSummer school on design and security of cryptographic algorithms and devices for real-world applications, Jun 2014, Sibenik, Croatia
Communication dans un congrès
hal-01092636v1
|
|||
|
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of G ∘ FIEEE Transactions on Information Theory, 2013, 59 (1), pp.691-702. ⟨10.1109/TIT.2012.2214203⟩
Article dans une revue
hal-00738398v1
|
||
|
Reflection Ciphers (Extended abstract)Workshop on Coding and Cryptography - WCC 2015, Apr 2015, Paris, France
Communication dans un congrès
hal-01237291v1
|
||
|
A new criterion for avoiding the propagation of linear relations through an SboxFast Software Encryption - FSE 2013, Mar 2013, Singapore, Singapore. pp.585--604, ⟨10.1007/978-3-662-43933-3_30⟩
Communication dans un congrès
hal-00931535v1
|
||
|
On the security of the Rescue hash function2020/820, IACR Cryptology ePrint Archive. 2020
Rapport
hal-04331826v1
|
||
|
Attaques par invariant : comment s'en protéger?Journées codage et cryptographie 2017, Apr 2017, La Bresse, France. pp.1
Communication dans un congrès
hal-01633519v1
|
||
|
On the importance of considering physical attacks when implementing lightweight cryptographyLightweight Cryptography Workshop 2016 | NIST, NIST, Oct 2016, Gaithersburg, United States
Communication dans un congrès
cea-01436006v1
|
||
|
Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part ISpringer, 12105, 2020, Lecture Notes in Computer Science, 978-3-030-45720-4. ⟨10.1007/978-3-030-45721-1⟩
Ouvrages
hal-03090162v1
|
||
|
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size $2^{4k+2}$[Research Report] 2016/887, IACR Cryptology ePrint Archive. 2016, pp.29
Rapport
hal-01401245v1
|
||
Related-Key Attack on Full-Round PICAROSelected Areas in Cryptography - SAC 2015, Aug 2015, Sackville, Canada
Communication dans un congrès
hal-01205209v1
|
|||
|
Report on the Security of STARK-friendly Hash Functions (Version 2.0)2020
Pré-publication, Document de travail
hal-02883253v1
|
||
|
Le traçage anonyme, dangereux oxymoreLe droit face au coronavirus, LexisNexis, pp.468--480, 2021, 9782711036394
Chapitre d'ouvrage
hal-02997228v1
|
||
Contemporary Developments in Finite Fields and ApplicationsWorld Scientific, pp.362, 2016, ⟨10.1142/9762⟩
Ouvrages
hal-01401266v1
|
|||
|
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AESIACR Transactions on Symmetric Cryptology, 2023, 2023 (4), pp.270-298. ⟨10.46586/tosc.v2023.i4.270-298⟩
Article dans une revue
hal-04361453v2
|