Bibliography
Major publications by the team in recent years
-
1C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]
https://hal.inria.fr/hal-01631130 -
2K. Bhargavan, G. Leurent.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
https://hal.inria.fr/hal-01404208 -
3A. Canteaut, J. Roué.
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
https://hal.inria.fr/hal-01104051 -
4A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]
https://hal.inria.fr/hal-01651007 -
5K. Chakraborty, A. Chailloux, A. Leverrier.
Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
https://hal.inria.fr/hal-01237241 -
6P. Charpin, G. M. Kyureghyan, V. Suder.
Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
https://hal.archives-ouvertes.fr/hal-01068860 -
7N. Courtois, M. Finiasz, N. Sendrier.
How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174. -
8A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
https://hal.inria.fr/hal-01661935 -
9M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
https://hal.inria.fr/hal-01404196 -
10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
https://hal.inria.fr/hal-00870929
Doctoral Dissertations and Habilitation Theses
-
11S. Duval.
Constructions for Lightweight Cryptography, Sorbonne Université , UPMC, October 2018.
https://hal.inria.fr/tel-01900290 -
12Y. Rotella.
Discrete Mathematics for symmetric cryptography, Sorbonne Université, September 2018.
https://hal.inria.fr/tel-01944827
Articles in International Peer-Reviewed Journals
-
13C. Beierle, A. Canteaut, G. Leander.
Nonlinear Approximations in Cryptanalysis Revisited, in: IACR Transactions on Symmetric Cryptology, December 2018, vol. 2018, no 4, pp. 80-101. [ DOI : 10.13154/tosc.v2018.i4.80-101 ]
https://hal.inria.fr/hal-01944995 -
14C. Boura, A. Canteaut.
On the Boomerang Uniformity of Cryptographic Sboxes, in: IACR Transactions on Symmetric Cryptology, September 2018, vol. 2018, no 3, pp. 290-310. [ DOI : 10.13154/tosc.v2018.i3.290-310 ]
https://hal.inria.fr/hal-01944598 -
15C. Boura, A. Canteaut, J. Jean, V. Suder.
Two Notions of Differential Equivalence on Sboxes, in: Designs, Codes and Cryptography, 2018. [ DOI : 10.1007/s10623-018-0496-z ]
https://hal.inria.fr/hal-01944565 -
16C. Boura, V. Lallemand, V. Suder, M. Naya-Plasencia.
Making the Impossible Possible, in: Journal of Cryptology, January 2018, vol. 31, no 1, pp. 101-133. [ DOI : 10.1007/s00145-016-9251-7 ]
https://hal.inria.fr/hal-01953916 -
17A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: Journal of Cryptology, July 2018, vol. 31, no 3, pp. 885-916. [ DOI : 10.1007/s00145-017-9273-9 ]
https://hal.inria.fr/hal-01650012 -
18A. Canteaut, L. Perrin.
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 209-246. [ DOI : 10.1016/j.ffa.2018.11.008 ]
https://hal.inria.fr/hal-01953353 -
19P. Charpin, J. Peng.
New links between nonlinearity and differential uniformity, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 188-208. [ DOI : 10.1016/j.ffa.2018.12.001 ]
https://hal.inria.fr/hal-01907499 -
20S. Duval, G. Leurent.
MDS Matrices with Lightweight Circuits, in: IACR Transactions on Symmetric Cryptology, June 2018. [ DOI : 10.13154/tosc.v2018.i2.48-78 ]
https://hal.inria.fr/hal-01944495 -
21T. Fuhr, M. Naya-Plasencia, Y. Rotella.
State-Recovery Attacks on modified Ketje Jr, in: IACR Transactions on Symmetric Cryptology, March 2018, vol. 2018, no 1, pp. 29-56. [ DOI : 10.13154/tosc.v2018.i1.29-56 ]
https://hal.inria.fr/hal-01944785 -
22S. Ghorai, E. Diamanti, A. Leverrier.
Composable security of two-way continuous-variable quantum key distribution without active symmetrization, in: Physical Review A, 2019, https://arxiv.org/abs/1806.11356. [ DOI : 10.1103/PhysRevA.99.012311 ]
https://hal.inria.fr/hal-01951932 -
23A. Leverrier.
coherent states and a Gaussian de Finetti theorem, in: Journal of Mathematical Physics, 2018, vol. 59, 042202 p, https://arxiv.org/abs/1612.05080. [ DOI : 10.1063/1.5007334 ]
https://hal.inria.fr/hal-01652084 -
24A. Olivo, F. Grosshans.
Ancilla-assisted linear optical Bell measurements and their optimality, in: Physical Review A, October 2018, vol. 98, no 4, 042323 p. [ DOI : 10.1103/PhysRevA.98.042323 ]
https://hal.inria.fr/hal-01951361
Invited Conferences
-
25C. Boura, A. Canteaut, J. Jean, V. Suder.
On Sboxes sharing the same DDT, in: Dagstuhl Seminar 18021 Symmetric Cryptography, Dagstuhl, Germany, January 2018. [ DOI : 10.4230/DAGREP.8.1.1 ]
https://hal.inria.fr/hal-01955256 -
26A. Canteaut, C. Beierle, G. Leander.
On nonlinear approximations and the linear hull effect, in: ASK 2018 - 8th Asian Workshop on Symmetric Key Cryptography, Kolkata, India, November 2018.
https://hal.inria.fr/hal-01955286 -
27A. Canteaut.
Desperately Seeking Sboxes, in: Eurocrypt 2018, Tel Aviv, Israel, April 2018.
https://hal.inria.fr/hal-01944401 -
28A. Canteaut.
L'insoutenable légèreté du chiffrement, in: Journées Scientifiques Inria 2018, Bordeaux, France, June 2018.
https://hal.inria.fr/hal-01955337 -
29A. Canteaut, L. Perrin.
On CCZ-Equivalence, Extended-Affine Equivalence and Function Twisting, in: BFA 2018 - 3rd International Workshop on Boolean Functions and their Applications, Loen, Norway, June 2018.
https://hal.inria.fr/hal-01953349 -
30A. Chailloux.
Relativistic commitment and zero-knowledge proofs, in: Seventeenth Bellairs Crypto-Workshop 2018, Holetown, Barbados, March 2018.
https://hal.inria.fr/hal-01950643 -
31G. Leurent.
MDS Matrices with Lightweight Circuits, in: The Challenges of Lightweight Cryptanalysis, Tel Aviv, Israel, April 2018.
https://hal.inria.fr/hal-01953383 -
32G. Leurent.
Security Issues with Small Block Sizes, in: Lightweight Crypto Day 2018, Tel Aviv, Israel, April 2018.
https://hal.inria.fr/hal-01966550 -
33A. Leverrier.
Introduction to quantum computing, in: Lecture series on Quantum Engineering at University Paris-Saclay, Palaiseau, France, May 2018.
https://hal.inria.fr/hal-01955373 -
34M. Naya-Plasencia, T. Fuhr, Y. Rotella.
New Results on Modified Versions of Ketje Jr, in: Dagstuhl Seminar 18021 Symmetric Cryptography, Dagstuhl, Germany, January 2018. [ DOI : 10.4230/DagRep.8.1.1 ]
https://hal.archives-ouvertes.fr/hal-01953975 -
35M. Naya-Plasencia.
New Results on Quantum Symmetric Cryptanalysis, in: Journées Nationales 2018 du GDR Informatique Mathématique, Palaiseau, France, April 2018.
https://hal.inria.fr/hal-01954618 -
36M. Naya-Plasencia.
New results on symmetric quantum cryptanalysis (Keynote speaker), in: QUANTALGO Quantum Algorithms and Applications, Paris, France, September 2018.
https://hal.inria.fr/hal-01953994 -
37M. Naya-Plasencia.
New results on symmetric quantum cryptanalysis, in: Crossfyre 2018 - 8th international workshop on cryptography, robustness, and provably secure schemes for female young researchers, Surrey, United Kingdom, September 2018, Keynote speaker at Crossfyre 2018.
https://hal.inria.fr/hal-01953997 -
38M. Naya-Plasencia.
Symmetric lightweight primitives: (Design and) Cryptanalysis, in: Lightweight Crypto Day 2018, Tel Aviv, Israel, April 2018.
https://hal.inria.fr/hal-01953947 -
39L. Perrin.
Generalized Feistel Networks with Optimal Diffusion, in: Dagstuhl Seminar 18021 Symmetric Cryptography, Dagstuhl, Germany, January 2018. [ DOI : 10.4230/DAGREP.8.1.1 ]
https://hal.inria.fr/hal-01953351 -
40L. Perrin.
S-Box Reverse-Engineering: Boolean Functions, American/Russian Standards, and Butterflies, in: CECC 2018 - Central European Conference on Cryptology, Smolenice, Slovakia, June 2018, pp. 1-99.
https://hal.inria.fr/hal-01953348
International Conferences with Proceedings
-
41N. Aragon, P. Gaborit, A. Hauteville, J.-P. Tillich.
A New Algorithm for Solving the Rank Syndrome Decoding Problem, in: ISIT 2018 - IEEE International Symposium on Information Theory, Vail, United States, June 2018, pp. 2421-2425. [ DOI : 10.1109/ISIT.2018.8437464 ]
https://hal.inria.fr/hal-01957179 -
42T. Ashur, M. Eichlseder, M. M. Lauridsen, G. Leurent, B. Minaud, Y. Rotella, Y. Sasaki, B. Viguier.
Cryptanalysis of MORUS, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11273, pp. 35-64. [ DOI : 10.1007/978-3-030-03329-3_2 ]
https://hal.inria.fr/hal-01944776 -
43X. Bonnetain, M. Naya-Plasencia.
Hidden Shift Quantum Cryptanalysis and Implications, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11272, pp. 560-592. [ DOI : 10.1007/978-3-030-03326-2_19 ]
https://hal.inria.fr/hal-01953914 -
44G. Couteau, A. Dupin, P. Méaux, M. Rossi, Y. Rotella.
On the Concrete Security of Goldreich’s Pseudorandom Generator, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11273, pp. 96-124. [ DOI : 10.1007/978-3-030-03329-3_4 ]
https://hal.inria.fr/hal-01944772 -
45T. Debris-Alazard, J.-P. Tillich.
Two attacks on rank metric code-based schemes: RankSign and an IBE scheme, in: ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11272, pp. 62-92. [ DOI : 10.1007/978-3-030-03326-2_3 ]
https://hal.inria.fr/hal-01957207 -
46E. Eaton, M. Lequesne, A. Parent, N. Sendrier.
QC-MDPC: A Timing Attack and a CCA2 KEM, in: PQCrypto 2018 - Ninth International Conference on Post-Quantum Cryptography, Fort Lauderdale, United States, LNCS - Lecture Notes in Computer Science, Springer, April 2018, vol. 10786. [ DOI : 10.1007/978-3-319-79063-3_3 ]
https://hal.inria.fr/hal-01949590 -
47O. Fawzi, A. Grospellier, A. Leverrier.
Constant overhead quantum fault-tolerance with quantum expander codes, in: FOCS 2018 - 59th Annual IEEE Symposium on Foundations of Computer Science, Paris, France, October 2018, pp. 743-754, https://arxiv.org/abs/1808.03821. [ DOI : 10.1109/FOCS.2018.00076 ]
https://hal.archives-ouvertes.fr/hal-01895430 -
48O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, in: STOC 2018 - 50th Annual ACM Symposium on the Theory of Computing, Los Angeles, United States, June 2018, pp. 521-534, https://arxiv.org/abs/1711.08351. [ DOI : 10.1145/3188745.3188886 ]
https://hal.archives-ouvertes.fr/hal-01895427 -
49L. Grassi, M. Naya-Plasencia, A. Schrottenloher.
Quantum Algorithms for the k-xor Problem, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11272, pp. 527-559. [ DOI : 10.1007/978-3-030-03326-2_18 ]
https://hal.inria.fr/hal-01896036 -
50B. Lac, A. Canteaut, J. J.-A. Fournier, R. Sirdey.
Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions, in: ISCAS 2018 - IEEE International Symposium on Circuits and Systems, Florence, Italy, May 2018, pp. 1-5. [ DOI : 10.1109/ISCAS.2018.8351693 ]
https://hal-cea.archives-ouvertes.fr/cea-01746138 -
51M. Lequesne, J.-P. Tillich.
Attack on the Edon-K Key Encapsulation Mechanism, in: ISIT 2018 - IEEE International Symposium on Information Theory, Vail, United States, June 2018, pp. 981-985. [ DOI : 10.1109/ISIT.2018.8437498 ]
https://hal.inria.fr/hal-01949569 -
52G. Leurent, M. Nandi, F. Sibleyras.
Generic Attacks Against Beyond-Birthday-Bound MACs, in: Crypto 2018 - 38th International Cryptology Conference, Santa Barbara, United States, LNCS - Lecture Notes in Computer Science, Springer, August 2018, vol. 10991, pp. 306-336. [ DOI : 10.1007/978-3-319-96884-1_11 ]
https://hal.inria.fr/hal-01944318 -
53G. Leurent, F. Sibleyras.
The Missing Difference Problem, and Its Applications to Counter Mode Encryption, in: Eurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, LNCS - Lecture Notes in Computer Science, April 2018, vol. 10821, pp. 745-770. [ DOI : 10.1007/978-3-319-78375-8_24 ]
https://hal.inria.fr/hal-01944288 -
54J.-P. Tillich.
The decoding failure probability of MDPC codes, in: ISIT 2018 - IEEE International Symposium on Information Theory, Vail, United States, June 2018, pp. 941-945. [ DOI : 10.1109/ISIT.2018.8437843 ]
https://hal.inria.fr/hal-01957037
Conferences without Proceedings
-
55P. Charpin, J. Peng.
New links between nonlinearity and differential uniformity, in: Sequences and Their Applications (SETA) 2018, Hong-Kong, China, October 2018.
https://hal.inria.fr/hal-01836184 -
56O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, in: QIP 2018 - 21th Annual Conference on Quantum Information Processing, Delft, Netherlands, QuTech, January 2018, pp. 1-31, https://arxiv.org/abs/1711.08351 - 31 pages.
https://hal.archives-ouvertes.fr/hal-01654670 -
57G. Leurent.
The Missing Difference Problem: And its Applications to Counter Mode Encryption, in: Flexible Symmetric Cryptography, Leiden, Netherlands, March 2018.
https://hal.inria.fr/hal-01953390 -
58A. Olivo, F. Grosshans.
Optimality of linear optical Bell measurements. How much can ancillae help?, in: GDR IQFA 9th Colloquium, Montpellier, France, November 2018.
https://hal.inria.fr/hal-01951749 -
59A. Olivo, F. Grosshans.
Optimality of linear optical Bell measurements. How much can ancillae help?, in: ICIQP 2018 - International Conference on Integrated Quantum Photonics, Paris, France, October 2018.
https://hal.inria.fr/hal-01951728 -
60A. Olivo, F. Grosshans.
Optimality of linear optical Bell measurements. How much can ancillae help?, in: Q-Turn: changing paradigms in quantum science, Florianopolis, Brazil, November 2018.
https://hal.inria.fr/hal-01951753
Scientific Popularization
-
61A. Canteaut.
Chut ! On nous écoute, in: Semaine des Maths 2018, Paris, France, March 2018.
https://hal.inria.fr/hal-01955267 -
62A. Canteaut.
Chut ! On nous écoute, in: Conférence de clôture des Olympiades Nationales de Mathématiques 2018, Paris, France, June 2018.
https://hal.inria.fr/hal-01955273 -
63A. Chailloux.
L'algorithme quantique de Shor, in: Interstices, March 2018.
https://hal.inria.fr/hal-01827601 -
64G. Leurent, M. Naya-Plasencia.
La fragilité inattendue du chiffrement symétrique, in: La Recherche : l'actualité des sciences, November 2018, vol. Novembre 2018.
https://hal.inria.fr/hal-01953448 -
65L. Perrin.
Building Light but not Weak Protections for the IoT, in: PhD Graduation Ceremony of the University of Luxembourg (2018), Belval, Luxembourg, December 2018.
https://hal.inria.fr/hal-01959751
Other Publications
-
66X. Bonnetain, M. Naya-Plasencia, A. Schrottenloher.
On Quantum Slide Attacks, December 2018, working paper or preprint.
https://hal.inria.fr/hal-01946399 -
67X. Bonnetain, M. Naya-Plasencia, A. Schrottenloher.
Quantum Cryptanalysis of AES, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01955534 -
68X. Bonnetain, A. Schrottenloher.
Quantum Security Analysis of CSIDH and Ordinary Isogeny-based Schemes, October 2018, working paper or preprint.
https://hal.inria.fr/hal-01896046 -
69X. Bonnetain, A. Schrottenloher.
Submerging CSIDH, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01961633 -
70A. Canteaut.
Exploiting algebraic properties of block ciphers, February 2018, COST Training School on Symmetric Cryptography and Blockchain, Torremolinos, Spain.
https://hal.inria.fr/hal-01955320 -
71A. Canteaut.
Secure building-blocks against differential and linear attacks, February 2018, COST Training School on Symmetric Cryptography and Blockchain, Torremolinos, Spain.
https://hal.inria.fr/hal-01955315 -
72A. Canteaut, L. Perrin.
On CCZ-Equivalence, Extended-Affine Equivalence and Function Twisting, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01959749 -
73K. Carrier, J.-P. Tillich.
Near collisions search and generic decoding, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01959614 -
74A. Chailloux.
A note on the quantum query complexity of permutation symmetric functions, December 2018, https://arxiv.org/abs/1810.01790 - 8 pages. [ DOI : 10.01790 ]
https://hal.inria.fr/hal-01950650 -
75A. Chailloux.
DEREC - Développement de la cryptographie relativiste, October 2018, WISG 2018 - 12ème Workshop Interdisciplinaire sur la Sécurité Globale, Poster.
https://hal.inria.fr/hal-01950649 -
76P. Charpin, J. Peng.
Differential uniformity and the associated codes of cryptographic functions, November 2018, working paper or preprint.
https://hal.inria.fr/hal-01908336 -
77D. Coggia.
On subspace trails cryptanalysis, Université Paris Diderot (Paris 7), September 2018.
https://hal.inria.fr/hal-01955305 -
78D. Coggia.
On subspace trails cryptanalysis, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01960306 -
79A. Couvreur, M. Lequesne, J.-P. Tillich.
Recovering short secret keys of RLCE encryption scheme in polynomial time, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01959617 -
80A. Couvreur, M. Lequesne, J.-P. Tillich.
Recovering short secret keys of RLCE in polynomial time, May 2018, https://arxiv.org/abs/1805.11489 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01803440 -
81T. Debris-Alazard, N. Sendrier, J.-P. Tillich.
Wave: A New Code-Based Signature Scheme, December 2018, preprint IACR disponible sur https://eprint.iacr.org/2018/996/20181022:154324.
https://hal.inria.fr/hal-01958175 -
82T. Debris-Alazard, J.-P. Tillich.
Deux attaques contre des schémas se fondant sur les codes en métrique rang : Ranksign et un chiffrement basé sur l'identité, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01959613 -
83A. Grospellier, A. Krishna.
Numerical estimate of the threshold for quantum expander codes, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.archives-ouvertes.fr/hal-01955453 -
84A. Grospellier, A. Krishna.
Numerical study of hypergraph product codes, October 2018, https://arxiv.org/abs/1810.03681 - 10 pages, 2 figures. [ DOI : 10.03681 ]
https://hal.archives-ouvertes.fr/hal-01895436 -
85M. Lequesne, J.-P. Tillich.
Attack on the EDON-K Key Encapsulation Mechanism, November 2018, https://arxiv.org/abs/1802.06157 - Submitted to ISIT 2018.
https://hal.sorbonne-universite.fr/hal-01925323 -
86G. Leurent.
How Not to Use a Blockcipher, February 2018, COST Training School on Symmetric Cryptography and Blockchain, Torremolinos, Spain.
https://hal.inria.fr/hal-01953398 -
87G. Leurent, F. Sibleyras.
The Missing Difference Problem, and its Applications to Counter Mode Encryption, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01961739 -
88A. Leverrier.
Security of continuous-variable quantum key distribution, May 2018, Secure Quantum Communications School, Baiona, Spain.
https://hal.inria.fr/hal-01955365 -
89F. Mendel, M. Naya-Plasencia.
Preface, March 2018, vol. 2018, no 1, pp. 1 - 4, IACR Transactions on Symmetric Cryptology (ToSC). [ DOI : 10.13154/tosc.v2018.i1.1-4 ]
https://hal.inria.fr/hal-01953923 -
90M. Naya-Plasencia.
Introduction to Symmetric Cryptography, June 2018, Summer School on real-world crypto and privacy.
https://hal.inria.fr/hal-01953897 -
91M. Naya-Plasencia.
Lightweight Cryptography, June 2018, Summer School on real-world crypto and privacy.
https://hal.inria.fr/hal-01953789 -
92M. Naya-Plasencia.
New results on symmetric quantum cryptanalysis, March 2018, Keynote speaker at Flexible symmetric cryptography -Lorentz Center.
https://hal.inria.fr/hal-01954599 -
93M. Naya-Plasencia.
New results on symmetric quantum cryptanalysis, March 2018, Seminaire CCA.
https://hal.inria.fr/hal-01954616 -
94M. Naya-Plasencia.
Symmetric Cryptanalysis: the Foundation of Trust, March 2018, Lorentz Center Highlights.
https://hal.inria.fr/hal-01954612 -
95A. Querol Cruz.
Conditional Differential Cryptanalysis of the Post-Quantum ARX Symmetric Primitive Salsa20, Univeristé Denis Diderot Paris 7, September 2018.
https://hal.inria.fr/hal-01893824