María Naya-Plasencia

From MaRDI portal
Person:456063


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The state-test technique on differential attacks: a 26-round attack on Craft and other applications
 
2026-03-31Paper
Cryptanalysis of algebraic verifiable delay functions
 
2024-12-13Paper
Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-64
Designs, Codes and Cryptography
2024-12-11Paper
A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
 
2024-11-12Paper
Improved differential meet-in-the-middle cryptanalysis
 
2024-11-12Paper
Quantum boomerang attacks and some applications
 
2024-10-14Paper
Quantum impossible differential attacks: applications to AES and SKINNY
Designs, Codes and Cryptography
2024-04-03Paper
Differential meet-in-the-middle cryptanalysis
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
QCB: efficient quantum-secure authenticated encryption
Lecture Notes in Computer Science
2023-05-12Paper
Quantum linearization attacks
Lecture Notes in Computer Science
2023-05-12Paper
Generic framework for key-guessing improvements
Lecture Notes in Computer Science
2023-05-12Paper
New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
 
2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
 
2022-12-07Paper
Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
 
2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers
Journal of Cryptology
2022-11-14Paper
New attacks from old distinguishers improved attacks on serpent
 
2022-07-06Paper
Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms
 
2022-03-23Paper
Improving key-recovery in linear attacks: application to 28-round PRESENT
 
2021-12-01Paper
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
Journal of Cryptology
2021-11-24Paper
On quantum slide attacks
 
2020-07-21Paper
Quantum attacks without superposition queries: the offline Simon's algorithm
 
2020-05-20Paper
Hidden shift quantum cryptanalysis and implications
 
2018-12-20Paper
Quantum algorithms for the \(k\)-XOR problem
 
2018-12-20Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
Journal of Cryptology
2018-09-14Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
Fast Software Encryption
2018-05-09Paper
Making the impossible possible
Journal of Cryptology
2018-04-26Paper
An efficient quantum collision search algorithm and implications on symmetric cryptography
 
2018-03-08Paper
Parity-Check Relations on Combination Generators
IEEE Transactions on Information Theory
2017-07-12Paper
Breaking symmetric cryptosystems using quantum period finding
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Related-key attack on full-round PICARO
Lecture Notes in Computer Science
2016-05-19Paper
Cryptanalysis of full sprout
Lecture Notes in Computer Science
2015-12-10Paper
Multiple limited-birthday distinguishers and applications
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Cryptanalysis of KLEIN
Fast Software Encryption
2015-09-18Paper
Multiple differential cryptanalysis of round-reduced \textsc{PRINCE}
Fast Software Encryption
2015-09-18Paper
Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
Lecture Notes in Computer Science
2015-01-16Paper
Improved cryptanalysis of AES-like permutations
Journal of Cryptology
2015-01-07Paper
Block ciphers that are easier to mask: how far can we go?
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Sieve-in-the-middle: improved MITM attacks
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Quark: a lightweight hash
Journal of Cryptology
2013-06-27Paper
Correlation attacks on combination generators
Cryptography and Communications
2013-06-24Paper
Improved rebound attack on the finalist Grøstl
Fast Software Encryption
2013-01-08Paper
Practical cryptanalysis of ARMADILLO2
Fast Software Encryption
2013-01-08Paper
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
Information Processing Letters
2012-10-23Paper
Conditional Differential Cryptanalysis of Trivium and KATAN
Selected Areas in Cryptography
2012-06-08Paper
Improved analysis of ECHO-256
Selected Areas in Cryptography
2012-06-08Paper
Practical Analysis of Reduced-Round Keccak
Lecture Notes in Computer Science
2011-12-16Paper
Practical attack on 8 rounds of the lightweight block cipher KLEIN
Lecture Notes in Computer Science
2011-12-16Paper
Rebound attack on JH42
Lecture Notes in Computer Science
2011-12-02Paper
Cryptanalysis of ARMADILLO2
Lecture Notes in Computer Science
2011-12-02Paper
How to improve rebound attacks
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Analysis of Reduced-SHAvite-3-256 v2
Fast Software Encryption
2011-07-07Paper
Cryptanalysis of Luffa v2 components
Selected Areas in Cryptography
2011-03-15Paper
Conditional differential cryptanalysis of NLFSR-based cryptosystems
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Quark: a lightweight hash
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Cryptanalysis of ESSENCE
Fast Software Encryption
2010-07-13Paper
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Rebound attack on the full Lane compression function
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Inside the Hypercube
Information Security and Privacy
2009-06-25Paper
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
Research in Cryptology
2009-01-22Paper
Cryptanalysis of Achterbahn-128/80
Fast Software Encryption
2008-09-16Paper


Research outcomes over time


This page was built for person: María Naya-Plasencia