Christophe De Cannière

According to our database1, Christophe De Cannière authored at least 51 papers between 2003 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
TWOFISH.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Triple DES.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SERPENT.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Kasumi/Misty1.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Interpolation Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Camellia.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Blowfish.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Data Encryption Standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

The Additive Differential Probability of ARX.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Higher-Order Differential Properties of Keccak and <i>Luffa</i>.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Higher-order differential properties of Keccak and Luffa.
IACR Cryptol. ePrint Arch., 2010

The Differential Analysis of S-Functions.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2009
Finding Collisions for a 45-Step Simplified HAS-V.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

The Lane hash function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Trivium.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

eSTREAM Software Performance.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

Preimages for Reduced SHA-0 and SHA-1.
Proceedings of the Advances in Cryptology, 2008

Analysis of Grain's Initialization Algorithm.
Proceedings of the Progress in Cryptology, 2008

2007
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2006
An introduction to Block Cipher Cryptanalysis.
Proc. IEEE, 2006

Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles.
Proceedings of the Information Security, 9th International Conference, 2006

Finding SHA-1 Characteristics: General Results and Applications.
Proceedings of the Advances in Cryptology, 2006

2005
Twofish.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Triple-DES.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Serpent.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Kasumi/Misty1.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Interpolation Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Camellia.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Blowfish.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Linear Cryptanalysis for Block Ciphers.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Data encryption standard (DES).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm.
EURASIP J. Adv. Signal Process., 2005

2004
On Multiple Linear Approximations.
IACR Cryptol. ePrint Arch., 2004

Non-randomness of the Full 4 and 5-Pass HAVAL.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

2003
Crytanalysis of SAFER++.
IACR Cryptol. ePrint Arch., 2003

A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Block Ciphers and Systems of Quadratic Equations.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Cryptanalysis of SOBER-t32.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
Proceedings of the Advances in Cryptology, 2003

Cryptanalysis of SAFER++.
Proceedings of the Advances in Cryptology, 2003


  Loading...