Anne Canteaut

Orcid: 0000-0002-6292-8336

Affiliations:
  • INRIA, France


According to our database1, Anne Canteaut authored at least 122 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the algebraic degree of iterated power functions.
Des. Codes Cryptogr., March, 2023

Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES.
IACR Trans. Symmetric Cryptol., 2023

2022
Practical Cube Attack against Nonce-Misused Ascon.
IACR Trans. Symmetric Cryptol., 2022

Recovering or Testing Extended-Affine Equivalence.
IEEE Trans. Inf. Theory, 2022

2021
Autocorrelations of vectorial Boolean functions.
IACR Cryptol. ePrint Arch., 2021

2020
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
IACR Trans. Symmetric Cryptol., 2020

On the security of the Rescue hash function.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

Editorial: Coding and Cryptography 2019.
Des. Codes Cryptogr., 2020

2019
A General Proof Framework for Recent AES Distinguishers.
IACR Trans. Symmetric Cryptol., 2019

Observations on the DLCT and Absolute Indicators.
IACR Cryptol. ePrint Arch., 2019

On CCZ-equivalence, extended-affine equivalence, and function twisting.
Finite Fields Their Appl., 2019

Two notions of differential equivalence on Sboxes.
Des. Codes Cryptogr., 2019

On the Differential-Linear Connectivity Table of Vectorial Boolean Functions.
CoRR, 2019

If a generalised butterfly is APN then it operates on 6 bits.
Cryptogr. Commun., 2019

2018
On the Boomerang Uniformity of Cryptographic Sboxes.
IACR Trans. Symmetric Cryptol., 2018

Nonlinear Approximations in Cryptanalysis Revisited.
IACR Trans. Symmetric Cryptol., 2018

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
J. Cryptol., 2018

BISON - Instantiating the Whitened Swap-Or-Not Construction.
IACR Cryptol. ePrint Arch., 2018

Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

2017
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Trans. Symmetric Cryptol., 2017

A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size 2<sup>4k+2</sup>.
IEEE Trans. Inf. Theory, 2017

Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC).
IACR Cryptol. ePrint Arch., 2017

DFA on LS-Designs with a Practical Implementation on SCREAM (extended version).
IACR Cryptol. ePrint Arch., 2017

A First DFA on PRIDE: from Theory to Practice (extended version).
IACR Cryptol. ePrint Arch., 2017

Proving Resistance against Invariant Attacks: How to Choose the Round Constants.
IACR Cryptol. ePrint Arch., 2017

Reflection ciphers.
Des. Codes Cryptogr., 2017

DFA on LS-Designs with a Practical Implementation on SCREAM.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
Attacks against Filter Generators Exploiting Monomial Mappings.
IACR Cryptol. ePrint Arch., 2016

A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 2<sup>4k+2</sup>.
IACR Cryptol. ePrint Arch., 2016

Another view of the division property.
IACR Cryptol. ePrint Arch., 2016

A First DFA on PRIDE: From Theory to Practice.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks.
IACR Cryptol. ePrint Arch., 2015

Related-Key Attack on Full-Round PICARO.
IACR Cryptol. ePrint Arch., 2015

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version).
IACR Cryptol. ePrint Arch., 2015

How to Compress Homomorphic Ciphertexts.
IACR Cryptol. ePrint Arch., 2015

Construction of Lightweight S-Boxes Using Feistel and MISTY Structures.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Differential Attacks Against SPN: A Thorough Analysis.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version).
IACR Cryptol. ePrint Arch., 2014

Multiple Differential Cryptanalysis of Round-Reduced PRINCE.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
On the Influence of the Algebraic Degree of F<sup>-1</sup> on the Algebraic Degree of G ∘ F.
IEEE Trans. Inf. Theory, 2013

Sieve-in-the-Middle: Improved MITM Attacks (Full Version).
IACR Cryptol. ePrint Arch., 2013

A new criterion for avoiding the propagation of linear relations through an Sbox (Full version).
IACR Cryptol. ePrint Arch., 2013

Editorial.
Des. Codes Cryptogr., 2013

A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Sieve-in-the-Middle: Improved MITM Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Parity-Check Relations on Combination Generators.
IEEE Trans. Inf. Theory, 2012

A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2012

PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptol. ePrint Arch., 2012

Correlation attacks on combination generators.
Cryptogr. Commun., 2012

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Running-Key.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Minimal Polynomial.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Syndrome Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Feedback Shift Register.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Cryptanalysis for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Consistency Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Complexity.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Inversion Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Filter Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Fast Correlation Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Correlation Attack for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Combination Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Berlekamp-Massey Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Differential Properties of ${x\mapsto x^{2^{t}-1}}$.
IEEE Trans. Inf. Theory, 2011

On the influence of the algebraic degree of F<sup>-1</sup> on the algebraic degree of G circ F.
IACR Cryptol. ePrint Arch., 2011

Differential properties of functions x -> x^{2^t-1} -- extended version
CoRR, 2011

Higher-Order Differential Properties of Keccak and <i>Luffa</i>.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Differential properties of power functions.
Int. J. Inf. Coding Theory, 2010

Higher-order differential properties of Keccak and Luffa.
IACR Cryptol. ePrint Arch., 2010

Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-<i>f</i> and Hamsi-256.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

A zero-sum property for the KECCAK-f permutation with 18 rounds.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009

Computing the biases of parity-check relations.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Internal collision attack on Maraca.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


A new class of monomial bent functions.
Finite Fields Their Appl., 2008

SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

2006
On Almost Perfect Nonlinear Functions Over F<sub>2</sub><sup>n</sup>.
IEEE Trans. Inf. Theory, 2006

Construction of bent functions via Niho power functions.
J. Comb. Theory A, 2006

Finding nonnormal bent functions.
Discret. Appl. Math., 2006

Analyse et conception de chiffrements à clef secrète. (Analysis and design of secret-key ciphers).
, 2006

2005
Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Running-key.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Minimal Polynomial.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Syndrome Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Feedback Shift Register.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Cryptanalysis for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Consistency Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Complexity.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Inversion attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Filter Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Fast Correlation Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Correlation Attack for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Combination generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Berlekamp-Massey algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Symmetric Boolean functions.
IEEE Trans. Inf. Theory, 2005

Open Problems Related to Algebraic Attacks on Stream Ciphers.
Proceedings of the Coding and Cryptography, International Workshop, 2005

On almost perfect nonlinear mappings over F<sup>n</sup><sub>2</sub>.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Fast correlation attacks against stream ciphers and related open problems.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2003
Decomposing bent functions.
IEEE Trans. Inf. Theory, 2003

2002
On the correlations between a combining function and functions of fewer variables.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2001
On cryptographic properties of the cosets of R(1, m).
IEEE Trans. Inf. Theory, 2001

On the weight distributions of optimal cosets of the first-order Reed-Muller codes.
IEEE Trans. Inf. Theory, 2001

Cryptographic Functions and Design Criteria for Block Ciphers.
Proceedings of the Progress in Cryptology, 2001

2000
Binary m-sequences with three-valued crosscorrelation: A proof of Welch's conjecture.
IEEE Trans. Inf. Theory, 2000

Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F<sub>2<sup><i>m</i></sup></sub>, and Crosscorrelation of Maximum-Length Sequences.
SIAM J. Discret. Math., 2000

Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5.
Proceedings of the Advances in Cryptology, 2000

Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000

1999
Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography.
Des. Codes Cryptogr., 1999

A New Characterization of Almost Bent Functions.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511.
IEEE Trans. Inf. Theory, 1998

Cryptanalysis of the Original McEliece Cryptosystem.
Proceedings of the Advances in Cryptology, 1998

1996
Construction of t-Resilient Functions over a Finite Alphabet.
Proceedings of the Advances in Cryptology, 1996

Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations.
Proceedings of the Advances in Cryptology, 1996

1995
A New Algorithm for Finding Minimum-Weight Words in Large Linear Codes.
Proceedings of the Cryptography and Coding, 1995


  Loading...