Anne Canteaut

According to our database1, Anne Canteaut authored at least 115 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A General Proof Framework for Recent AES Distinguishers.
IACR Trans. Symmetric Cryptol., 2019

Observations on the DLCT and Absolute Indicators.
IACR Cryptology ePrint Archive, 2019

A General Proof Framework for Recent AES Distinguishers.
IACR Cryptology ePrint Archive, 2019

On CCZ-equivalence, extended-affine equivalence, and function twisting.
Finite Fields and Their Applications, 2019

Two notions of differential equivalence on Sboxes.
Des. Codes Cryptogr., 2019

bison Instantiating the Whitened Swap-Or-Not Construction.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
On the Boomerang Uniformity of Cryptographic Sboxes.
IACR Trans. Symmetric Cryptol., 2018

Nonlinear Approximations in Cryptanalysis Revisited.
IACR Trans. Symmetric Cryptol., 2018

If a Generalised Butterfly is APN then it Operates on 6 Bits.
IACR Cryptology ePrint Archive, 2018

On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting.
IACR Cryptology ePrint Archive, 2018

BISON - Instantiating the Whitened Swap-Or-Not Construction.
IACR Cryptology ePrint Archive, 2018

Two Notions of Differential Equivalence on Sboxes.
IACR Cryptology ePrint Archive, 2018

Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

2017
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Trans. Symmetric Cryptol., 2017

A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size 24k+2.
IEEE Trans. Information Theory, 2017

Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC).
IACR Cryptology ePrint Archive, 2017

DFA on LS-Designs with a Practical Implementation on SCREAM (extended version).
IACR Cryptology ePrint Archive, 2017

A First DFA on PRIDE: from Theory to Practice (extended version).
IACR Cryptology ePrint Archive, 2017

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Cryptology ePrint Archive, 2017

Reflection ciphers.
Des. Codes Cryptogr., 2017

Proving Resistance Against Invariant Attacks: How to Choose the Round Constants.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

DFA on LS-Designs with a Practical Implementation on SCREAM.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 24k+2.
IACR Cryptology ePrint Archive, 2016

Attacks Against Filter Generators Exploiting Monomial Mappings.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Another View of the Division Property.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

A First DFA on PRIDE: From Theory to Practice.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version).
IACR Cryptology ePrint Archive, 2015

How to Compress Homomorphic Ciphertexts.
IACR Cryptology ePrint Archive, 2015

Related-Key Attack on Full-Round PICARO.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Construction of Lightweight S-Boxes Using Feistel and MISTY Structures.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Differential Attacks Against SPN: A Thorough Analysis.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version).
IACR Cryptology ePrint Archive, 2014

Multiple Differential Cryptanalysis of Round-Reduced PRINCE.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
On the Influence of the Algebraic Degree of F-1 on the Algebraic Degree of G ∘ F.
IEEE Trans. Information Theory, 2013

Sieve-in-the-Middle: Improved MITM Attacks (Full Version).
IACR Cryptology ePrint Archive, 2013

A new criterion for avoiding the propagation of linear relations through an Sbox (Full version).
IACR Cryptology ePrint Archive, 2013

Editorial.
Des. Codes Cryptogr., 2013

A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Sieve-in-the-Middle: Improved MITM Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Parity-Check Relations on Combination Generators.
IEEE Trans. Information Theory, 2012

A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions.
IACR Cryptology ePrint Archive, 2012

PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptology ePrint Archive, 2012

Correlation attacks on combination generators.
Cryptography and Communications, 2012

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Running-Key.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Minimal Polynomial.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Syndrome Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Feedback Shift Register.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Cryptanalysis for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Consistency Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Complexity.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Inversion Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Filter Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Fast Correlation Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Correlation Attack for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Combination Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Berlekamp-Massey Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A5/1.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Differential Properties of ${x\mapsto x^{2^{t}-1}}$.
IEEE Trans. Information Theory, 2011

On the influence of the algebraic degree of F-1 on the algebraic degree of G circ F.
IACR Cryptology ePrint Archive, 2011

Higher-Order Differential Properties of Keccak and Luffa.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Higher-order differential properties of Keccak and Luffa.
IACR Cryptology ePrint Archive, 2010

Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

A zero-sum property for the KECCAK-f permutation with 18 rounds.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Differential properties of power functions.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptology ePrint Archive, 2009

Computing the biases of parity-check relations.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Internal collision attack on Maraca.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


2006
On Almost Perfect Nonlinear Functions Over F2n.
IEEE Trans. Information Theory, 2006

Construction of bent functions via Niho power functions.
J. Comb. Theory, Ser. A, 2006

Finding nonnormal bent functions.
Discrete Applied Mathematics, 2006

A new class of monomial bent functions.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Analyse et conception de chiffrements à clef secrète. (Analysis and design of secret-key ciphers).
, 2006

2005
Stream Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Running-key.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Minimal Polynomial.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Syndrome Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Feedback Shift Register.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Cryptanalysis for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Consistency Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Complexity.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Inversion attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Filter Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Fast Correlation Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Correlation Attack for Stream Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Combination generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Berlekamp-Massey algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

A5/1.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Symmetric Boolean functions.
IEEE Trans. Information Theory, 2005

Open Problems Related to Algebraic Attacks on Stream Ciphers.
Proceedings of the Coding and Cryptography, International Workshop, 2005

On almost perfect nonlinear mappings over F/sup n//sub 2/.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Fast correlation attacks against stream ciphers and related open problems.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2003
Decomposing bent functions.
IEEE Trans. Information Theory, 2003

2002
On the correlations between a combining function and functions of fewer variables.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2001
On cryptographic properties of the cosets of R(1, m).
IEEE Trans. Information Theory, 2001

On the weight distributions of optimal cosets of the first-order Reed-Muller codes.
IEEE Trans. Information Theory, 2001

Cryptographic Functions and Design Criteria for Block Ciphers.
Proceedings of the Progress in Cryptology, 2001

2000
Binary m-sequences with three-valued crosscorrelation: A proof of Welch's conjecture.
IEEE Trans. Information Theory, 2000

Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences.
SIAM J. Discrete Math., 2000

Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5.
Proceedings of the Advances in Cryptology, 2000

Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000

1999
Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography.
Des. Codes Cryptogr., 1999

A New Characterization of Almost Bent Functions.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511.
IEEE Trans. Information Theory, 1998

Cryptanalysis of the Original McEliece Cryptosystem.
Proceedings of the Advances in Cryptology, 1998

1996
Construction of t-Resilient Functions over a Finite Alphabet.
Proceedings of the Advances in Cryptology, 1996

Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations.
Proceedings of the Advances in Cryptology, 1996

1995
A New Algorithm for Finding Minimum-Weight Words in Large Linear Codes.
Proceedings of the Cryptography and Coding, 1995


  Loading...