María Naya-Plasencia

From MaRDI portal
Person:456063

Available identifiers

zbMath Open naya-plasencia.mariaWikidataQ27996440 ScholiaQ27996440MaRDI QIDQ456063

List of research outcomes





PublicationDate of PublicationType
Cryptanalysis of algebraic verifiable delay functions2024-12-13Paper
Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-642024-12-11Paper
A generic algorithm for efficient key recovery in differential attacks -- and its associated tool2024-11-12Paper
Improved differential meet-in-the-middle cryptanalysis2024-11-12Paper
Quantum boomerang attacks and some applications2024-10-14Paper
Quantum impossible differential attacks: applications to AES and SKINNY2024-04-03Paper
Differential meet-in-the-middle cryptanalysis2024-02-02Paper
QCB: efficient quantum-secure authenticated encryption2023-05-12Paper
Quantum linearization attacks2023-05-12Paper
Generic framework for key-guessing improvements2023-05-12Paper
New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Cryptanalysis results on spook. Bringing full-round shadow-512 to the light2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers2022-11-14Paper
New attacks from old distinguishers improved attacks on serpent2022-07-06Paper
Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms2022-03-23Paper
Improving key-recovery in linear attacks: application to 28-round PRESENT2021-12-01Paper
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}2021-11-24Paper
On quantum slide attacks2020-07-21Paper
Quantum attacks without superposition queries: the offline Simon's algorithm2020-05-20Paper
Hidden shift quantum cryptanalysis and implications2018-12-20Paper
Quantum algorithms for the \(k\)-XOR problem2018-12-20Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression2018-09-14Paper
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression2018-05-09Paper
Making the impossible possible2018-04-26Paper
An efficient quantum collision search algorithm and implications on symmetric cryptography2018-03-08Paper
Parity-Check Relations on Combination Generators2017-07-12Paper
Breaking Symmetric Cryptosystems Using Quantum Period Finding2016-10-27Paper
Related-Key Attack on Full-Round PICARO2016-05-19Paper
Cryptanalysis of Full Sprout2015-12-10Paper
Multiple Limited-Birthday Distinguishers and Applications2015-10-01Paper
Cryptanalysis of KLEIN2015-09-18Paper
Multiple Differential Cryptanalysis of Round-Reduced PRINCE2015-09-18Paper
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon2015-01-16Paper
Improved cryptanalysis of AES-like permutations2015-01-07Paper
Block Ciphers That Are Easier to Mask: How Far Can We Go?2013-10-10Paper
Sieve-in-the-Middle: Improved MITM Attacks2013-09-02Paper
Quark: a lightweight hash2013-06-27Paper
Correlation attacks on combination generators2013-06-24Paper
Improved Rebound Attack on the Finalist Grøstl2013-01-08Paper
Practical Cryptanalysis of ARMADILLO22013-01-08Paper
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock2012-10-23Paper
Conditional Differential Cryptanalysis of Trivium and KATAN2012-06-08Paper
Improved Analysis of ECHO-2562012-06-08Paper
Practical Analysis of Reduced-Round Keccak2011-12-16Paper
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN2011-12-16Paper
Rebound Attack on JH422011-12-02Paper
Cryptanalysis of ARMADILLO22011-12-02Paper
How to Improve Rebound Attacks2011-08-12Paper
Analysis of Reduced-SHAvite-3-256 v22011-07-07Paper
Cryptanalysis of Luffa v2 Components2011-03-15Paper
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems2010-12-07Paper
Quark: a lightweight hash2010-08-17Paper
Cryptanalysis of ESSENCE2010-07-13Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-5122010-05-04Paper
Rebound attack on the full Lane compression function2009-12-15Paper
Inside the Hypercube2009-06-25Paper
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation2009-01-22Paper
Cryptanalysis of Achterbahn-128/802008-09-16Paper

Research outcomes over time

This page was built for person: María Naya-Plasencia