Folgen
María Naya-Plasencia
María Naya-Plasencia
INRIA Paris
Bestätigte E-Mail-Adresse bei inria.fr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Quark: A lightweight hash.
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
CHES 6225, 1-15, 2010
4152010
Breaking Symmetric Cryptosystems Using Quantum Period Finding
M Kaplan, L Anthony, G Leurent, M Naya-Plasencia
Advances in Cryptology–CRYPTO 2016, 207, 0
254*
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
International Conference on Fast Software Encryption, 313-333, 2016
1802016
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia, FX Standaert
International Workshop on Cryptographic Hardware and Embedded Systems, 383-399, 2013
1772013
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
C Boura, M Naya-Plasencia, V Suder
ASIACRYPT (1) 8873, 179-199, 2014
1542014
Conditional differential cryptanalysis of NLFSR-based cryptosystems
S Knellwolf, W Meier, M Naya-Plasencia
Advances in Cryptology-ASIACRYPT 2010, 130-145, 2010
1382010
Quantum differential and linear cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
1012015
Quantum Differential and Linear Cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
1012015
Quantum Security Analysis of AES
X Bonnetain, M Naya-Plasencia, A Schrottenloher
91*
An efficient quantum collision search algorithm and implications on symmetric cryptography
A Chailloux, M Naya-Plasencia, A Schrottenloher
International Conference on the Theory and Application of Cryptology and …, 2017
882017
Conditional differential cryptanalysis of trivium and KATAN
S Knellwolf, W Meier, M Naya-Plasencia
Selected Areas in Cryptography, 200-212, 2011
852011
Sieve-in-the-Middle: Improved MITM Attacks
A Canteaut, M Naya-Plasencia, B Vayssière
Advances in Cryptology–CRYPTO 2013, 222-240, 2013
802013
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
74*2008
Practical Analysis of Reduced-Round Keccak.
M Naya-Plasencia, A Röck, W Meier
INDOCRYPT 7107, 236-254, 2011
732011
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm
X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ...
70*
Rebound Attack on the Full Lane Compression Function.
K Matusiewicz, M Naya-Plasencia, I Nikolic, Y Sasaki, M Schläffer
Asiacrypt 5912, 106-125, 2009
682009
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
582008
How to improve rebound attacks
M Naya-Plasencia
Advances in Cryptology–CRYPTO 2011, 188-205, 2011
542011
Making the Impossible Possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31 (1), 101-133, 2018
502018
Cryptanalysis of full sprout
V Lallemand, M Naya-Plasencia
Annual Cryptology Conference, 663-682, 2015
502015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20