Christina Boura

Orcid: 0000-0001-6796-8874

According to our database1, Christina Boura authored at least 37 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Preface to Volume 2024, Issue 1.
IACR Trans. Symmetric Cryptol., 2024

Alternative Key Schedules for the AES.
IACR Cryptol. ePrint Arch., 2024

A generic algorithm for efficient key recovery in differential attacks - and its associated tool.
IACR Cryptol. ePrint Arch., 2024

2023
Preface to Volume 2023, Issue 1.
IACR Trans. Symmetric Cryptol., 2023

Related-Key Differential Analysis of the AES.
IACR Trans. Symmetric Cryptol., 2023

Differential analysis of the ternary hash function Troika.
IACR Cryptol. ePrint Arch., 2023

2022
Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

Better Steady than Speedy: Full break of SPEEDY-7-192.
IACR Cryptol. ePrint Arch., 2022

Breaking Panther.
IACR Cryptol. ePrint Arch., 2022

2020
Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers.
IACR Trans. Symmetric Cryptol., 2020

The BMM symmetrising trace conjecture for groups <i>G</i><sub>4</sub>,  <i>G</i><sub>5</sub>,  <i>G</i><sub>6</sub>,  <i>G</i><sub>7</sub>,  <i>G</i><sub>8</sub>.
J. Symb. Comput., 2020

CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes.
J. Math. Cryptol., 2020

Boomerang uniformity of popular S-box constructions.
Des. Codes Cryptogr., 2020

2019
Simulating Homomorphic Evaluation of Deep Learning Predictions.
IACR Cryptol. ePrint Arch., 2019

A General Proof Framework for Recent AES Distinguishers.
IACR Cryptol. ePrint Arch., 2019

Two notions of differential equivalence on Sboxes.
Des. Codes Cryptogr., 2019

2018
On the Boomerang Uniformity of Cryptographic Sboxes.
IACR Trans. Symmetric Cryptol., 2018

Making the Impossible Possible.
J. Cryptol., 2018

Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning.
IACR Cryptol. ePrint Arch., 2018

2017
High-Precision Privacy-Preserving Real-Valued Function Evaluation.
IACR Cryptol. ePrint Arch., 2017

Reflection ciphers.
Des. Codes Cryptogr., 2017

2016
Key Recovery Attack against 2.5-round pi-Cipher.
IACR Cryptol. ePrint Arch., 2016

Another view of the division property.
IACR Cryptol. ePrint Arch., 2016

2014
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version).
IACR Cryptol. ePrint Arch., 2014

Improved Impossible Differential Attacks against Round-Reduced LBlock.
IACR Cryptol. ePrint Arch., 2014

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
On the Influence of the Algebraic Degree of F<sup>-1</sup> on the Algebraic Degree of G ∘ F.
IEEE Trans. Inf. Theory, 2013

A new criterion for avoiding the propagation of linear relations through an Sbox (Full version).
IACR Cryptol. ePrint Arch., 2013

A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Key Difference Invariant Bias in Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Analyse de fonctions de hachage cryptographiques. (Analysis of cryptographic hash functions).
PhD thesis, 2012

Side-Channel Analysis of Grøstl and Skein.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2011
On the influence of the algebraic degree of F<sup>-1</sup> on the algebraic degree of G circ F.
IACR Cryptol. ePrint Arch., 2011

Higher-Order Differential Properties of Keccak and <i>Luffa</i>.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Higher-order differential properties of Keccak and Luffa.
IACR Cryptol. ePrint Arch., 2010

Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-<i>f</i> and Hamsi-256.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

A zero-sum property for the KECCAK-f permutation with 18 rounds.
Proceedings of the IEEE International Symposium on Information Theory, 2010


  Loading...