Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

20 résultats
Image document

Collision Attacks against CAESAR Candidates

Thomas Fuhr , Gaëtan Leurent , Valentin Suder
Advances in Cryptology - ASIACRYPT 2015 - Part II, Apr 2015, Sofia, Bulgaria. pp.510, ⟨10.1007/978-3-662-48800-3_21⟩
Communication dans un congrès hal-01102031v3
Image document

Two Notions of Differential Equivalence on Sboxes

Christina Boura , Anne Canteaut , Jérémy Jean , Valentin Suder
Designs, Codes and Cryptography, In press, 87 (2-3), pp.185-202. ⟨10.1007/s10623-018-0496-z⟩
Article dans une revue hal-01944565v1

F 2 n → F 2 n Functions with Fast Points

Valentin Suder
Fq14 International COnference on Finite FIelds and their Applications, Jun 2019, Vancouver, Canada
Communication dans un congrès hal-02346303v1
Image document

Two Notions of Differential Equivalence on Sboxes

Christina Boura , Anne Canteaut , Jérémy Jean , Valentin Suder
WCC 2017 - Workshop on Coding and Cryptography, Sep 2017, Saint Petersburg, Russia
Communication dans un congrès hal-01650010v1
Image document

On Sboxes sharing the same DDT

Christina Boura , Anne Canteaut , Jérémy Jean , Valentin Suder
Dagstuhl Seminar 18021 Symmetric Cryptography, Jan 2018, Dagstuhl, Germany. ⟨10.4230/DAGREP.8.1.1⟩
Communication dans un congrès hal-01955256v1
Image document

On Inverses of APN Exponents

Gohar Kyureghyan , Valentin Suder
IEEE International Symposium on Information Theory - ISIT 2012, Jul 2012, Cambridge, MA, United States. pp.1207-1211, ⟨10.1109/ISIT.2012.6283047⟩
Communication dans un congrès hal-00879498v1
Image document

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)

Christina Boura , María Naya-Plasencia , Valentin Suder
[Research Report] 2014/699, IACR Cryptology ePrint Archive. 2014
Rapport hal-01068894v1
Image document

Valentin Suder - Sparse Permutations with Low Differential Uniformity

Valentin Suder , Fanny Bastien
2014
Vidéo medihal-01346063v1
Image document

Propriétés Différentielles des Permutations et Application en Cryptographie Symétrique

Valentin Suder
Cryptographie et sécurité [cs.CR]. Université Pierre et Marie Curie, 2014. Français. ⟨NNT : ⟩
Thèse tel-01093026v1
Image document

Making the Impossible Possible

Christina Boura , Virginie Lallemand , Valentin Suder , María Naya-Plasencia
Journal of Cryptology, 2018, 31 (1), pp.101-133. ⟨10.1007/s00145-016-9251-7⟩
Article dans une revue hal-01953916v1

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon

Christina Boura , María Naya-Plasencia , Valentin Suder
Advances in Cryptology - Asiacrypt 2014, 2014, Kaoshiung, Taiwan. pp.179-199
Communication dans un congrès hal-01092274v1
Image document

Key Recovery Attack Against 2.5-Round Pi-Cipher

Christina Boura , Avik Chakraborti , Gaëtan Leurent , Goutam Paul , Dhiman Saha , et al.
FSE 2016 - 23rd International Conference Fast Software Encryption, Mar 2016, Bochum, Germany. pp.535 - 553, ⟨10.1007/978-3-662-52993-5_27⟩
Communication dans un congrès hal-01404164v1
Image document

Differential Equivalences on SBoxes

Valentin Suder , Christina Boura , Anne Canteaut , Jérémy Jean
CAEN2018, Cryptography and Algorithmic Number Theory, Jun 2018, CAEN, France
Communication dans un congrès hal-02346302v1

On Inversion in Z_{2^n-1}

Valentin Suder , Gohar Kyureghyan
The 11th International Conference on Finite Fields and their Applications - Fq11, Jul 2013, Magdeburg, Germany
Communication dans un congrès hal-00931646v1
Image document

Antiderivative Functions over F 2 n

Valentin Suder
WCC2015 - 9th International Workshop on Coding and Cryptography 2015 , Anne Canteaut; Gaëtan Leurent; Maria Naya-Plasencia, Apr 2015, Paris, France
Communication dans un congrès hal-01275708v1

Sparse Permutations with Low Differential Uniformity

Pascale Charpin , Gohar M. Kyureghyan , Valentin Suder
Finite Fields and Their Applications, 2014, 28, pp.214-243. ⟨10.1016/j.ffa.2014.02.003⟩
Article dans une revue hal-01068860v1
Image document

Improved Impossible Differential Attacks against Round-Reduced LBlock

Christina Boura , Marine Minier , María Naya-Plasencia , Valentin Suder
[Research Report] 2014/279, IACR Cryptology ePrint Archive. 2014
Rapport hal-01068887v1
Image document

On inversion in $Z_{2^n-1}$

Gohar Kyureghyan , Valentin Suder
Finite Fields and Their Applications, 2014, 25, pp.234-254
Article dans une revue hal-00879490v1

Sparse Permutations with Low Differential Uniformity

Pascale Charpin , Gohar Kyureghyan , Valentin Suder
Journées codage et cryptographie 2014, Mar 2014, Les sept Laux, France
Communication dans un congrès hal-01100190v1

Key Recovery Attack Against 2.5-Round π-Cipher

Christina Boura , Avik Chakraborti , Gaetan Leurent , Goutam Paul , Dhiman Saha , et al.
Fast Software Encryption - 23rd International Conference, FSE 2016, 2016, Bochum, Germany. pp.535-553
Communication dans un congrès hal-02171948v1