Céline Blondeau

Orcid: 0000-0002-7777-8545

According to our database1, Céline Blondeau authored at least 31 papers between 2009 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Accurate Estimate of the Advantage of Impossible Differential Attacks.
IACR Trans. Symmetric Cryptol., 2017

Differential Attacks: Using Alternative Operations.
IACR Cryptol. ePrint Arch., 2017

Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity.
Des. Codes Cryptogr., 2017

2016
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2016

2015
Impossible differential attack on 13-round Camellia-192.
Inf. Process. Lett., 2015

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks.
IACR Cryptol. ePrint Arch., 2015

Perfect nonlinear functions and cryptography.
Finite Fields Their Appl., 2015

Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Known-Key Distinguisher on Full PRESENT.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
More differentially 6-uniform power functions.
Des. Codes Cryptogr., 2014

Differential-Linear Cryptanalysis Revisited.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Improbable Differential from Impossible Differential: On the Validity of the Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Reflection Cryptanalysis of PRINCE-Like Ciphers.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

New Links between Differential and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2013

Bounds in Shallows and in Miseries.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Multiple Differential Cryptanalysis using \LLR and χ<sup>2</sup> Statistics.
IACR Cryptol. ePrint Arch., 2012

Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

2011
La cryptanalyse différentielle et ses généralisations. (Differential cryptanalysis and its generalizations).
PhD thesis, 2011

Differential Properties of ${x\mapsto x^{2^{t}-1}}$.
IEEE Trans. Inf. Theory, 2011

Multiple Differential Cryptanalysis: Theory and Practice (Corrected).
IACR Cryptol. ePrint Arch., 2011

Accurate estimates of the data complexity and success probability for various cryptanalyses.
Des. Codes Cryptogr., 2011

Differential properties of functions x -> x^{2^t-1} -- extended version
CoRR, 2011

Multiple Differential Cryptanalysis: Theory and Practice.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Cryptanalysis of ARMADILLO2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT.
IACR Cryptol. ePrint Arch., 2010

Differential properties of power functions.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
On the Data Complexity of Statistical Attacks Against Block Ciphers (full version).
IACR Cryptol. ePrint Arch., 2009


  Loading...