María Naya-Plasencia

Orcid: 0000-0002-0059-5417

According to our database1, María Naya-Plasencia authored at least 87 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Quantum impossible differential attacks: applications to AES and SKINNY.
Des. Codes Cryptogr., March, 2024

A generic algorithm for efficient key recovery in differential attacks - and its associated tool.
IACR Cryptol. ePrint Arch., 2024

Improved Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2024

2023
Guessing Less and Better: Improved Attacks on GIFT-64.
IACR Cryptol. ePrint Arch., 2023

Truncated Differential Attacks: New Insights and 10-round Attacks on QARMA.
IACR Cryptol. ePrint Arch., 2023

Quantum Cryptanalysis (Dagstuhl Seminar 23421).
Dagstuhl Reports, 2023

2022
Improved Differential-Linear Attacks with Applications to ARX Ciphers.
J. Cryptol., 2022

Quantum Boomerang Attacks and Some Applications.
IACR Cryptol. ePrint Arch., 2022

Differential Meet-In-The-Middle Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

Better Steady than Speedy: Full break of SPEEDY-7-192.
IACR Cryptol. ePrint Arch., 2022

Safely Doubling your Block Ciphers for a Post-Quantum World.
IACR Cryptol. ePrint Arch., 2022

Symmetric Cryptography (Dagstuhl Seminar 22141).
Dagstuhl Reports, 2022

New Attacks from Old Distinguishers Improved Attacks on Serpent.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
J. Cryptol., 2021

Generic Framework for Key-Guessing Improvements.
IACR Cryptol. ePrint Arch., 2021

Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent.
IACR Cryptol. ePrint Arch., 2021

Quantum Linearization Attacks.
IACR Cryptol. ePrint Arch., 2021

Quantum Cryptanalysis (Dagstuhl Seminar 21421).
Dagstuhl Reports, 2021

2020
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
IACR Trans. Symmetric Cryptol., 2020

Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.
IACR Cryptol. ePrint Arch., 2020

New results on Gimli: full-permutation distinguishers and improved collisions.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis Results on Spook.
IACR Cryptol. ePrint Arch., 2020

QCB: Efficient Quantum-secure Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2020

On the security of the Rescue hash function.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

Optimal Merging in Quantum k-xor and k-xor-sum Algorithms.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Optimal Merging in Quantum k-xor and k-sum Algorithms.
IACR Cryptol. ePrint Arch., 2019

Quantum Security Analysis of AES.
IACR Cryptol. ePrint Arch., 2019

Quantum Attacks without Superposition Queries: the Offline Simon Algorithm.
IACR Cryptol. ePrint Arch., 2019

Quantum Cryptanalysis (Dagstuhl Seminar 19421).
Dagstuhl Reports, 2019

Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Preface to Volume 2018, Issue 1.
IACR Trans. Symmetric Cryptol., 2018

State-Recovery Attacks on Modified Ketje Jr.
IACR Trans. Symmetric Cryptol., 2018

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
J. Cryptol., 2018

Making the Impossible Possible.
J. Cryptol., 2018

On Quantum Slide Attacks.
IACR Cryptol. ePrint Arch., 2018

Hidden Shift Quantum Cryptanalysis and Implications.
IACR Cryptol. ePrint Arch., 2018

Quantum Algorithms for the k -xor Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Preface.
IACR Trans. Symmetric Cryptol., 2017

An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2017

Symmetric Cryptography for Long-Term Security.
, 2017

2016
Quantum Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2016

Breaking Symmetric Cryptosystems Using Quantum Period Finding.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Cryptanalysis of Full Sprout.
IACR Cryptol. ePrint Arch., 2015

Related-Key Attack on Full-Round PICARO.
IACR Cryptol. ePrint Arch., 2015

How to Compress Homomorphic Ciphertexts.
IACR Cryptol. ePrint Arch., 2015

2014
Improved Cryptanalysis of AES-like Permutations.
J. Cryptol., 2014

Cryptanalysis of KLEIN (Full version).
IACR Cryptol. ePrint Arch., 2014

Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version).
IACR Cryptol. ePrint Arch., 2014

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version).
IACR Cryptol. ePrint Arch., 2014

Improved Impossible Differential Attacks against Round-Reduced LBlock.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of KLEIN.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Multiple Differential Cryptanalysis of Round-Reduced PRINCE.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Quark: A Lightweight Hash.
J. Cryptol., 2013

Multiple Limited-Birthday Distinguishers and Applications.
IACR Cryptol. ePrint Arch., 2013

Block Ciphers that are Easier to Mask: How Far Can we Go?
IACR Cryptol. ePrint Arch., 2013

Sieve-in-the-Middle: Improved MITM Attacks (Full Version).
IACR Cryptol. ePrint Arch., 2013

Sieve-in-the-Middle: Improved MITM Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Parity-Check Relations on Combination Generators.
IEEE Trans. Inf. Theory, 2012

A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock.
Inf. Process. Lett., 2012

A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2012

Correlation attacks on combination generators.
Cryptogr. Commun., 2012

Practical Cryptanalysis of ARMADILLO2.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Improved Rebound Attack on the Finalist Grøstl.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Analysis of reduced-SHAvite-3-256 v2.
IACR Cryptol. ePrint Arch., 2011

Improved Analysis of ECHO-256.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of ARMADILLO2.
IACR Cryptol. ePrint Arch., 2011

Conditional Differential Cryptanalysis of Trivium and KATAN.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Analysis of Reduced-Round Keccak.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Rebound Attack on JH42.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
How to Improve Rebound Attacks.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis of <i>Luffa</i> v2 Components.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Proceedings of the Progress in Cryptology, 2010

2009
Cryptanalysis of ESSENCE.
IACR Cryptol. ePrint Arch., 2009

Rebound Attack on the Full LANE Compression Function.
IACR Cryptol. ePrint Arch., 2009

Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009

Computing the biases of parity-check relations.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Internal collision attack on Maraca.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Inside the Hypercube.
IACR Cryptol. ePrint Arch., 2008

2007
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

Cryptanalysis of Achterbahn-128/80.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Cryptanalyse de Achterbahn-128/80
CoRR, 2006


  Loading...