Christina Boura

From MaRDI portal
(Redirected from Person:510441)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A generic algorithm for efficient key recovery in differential attacks -- and its associated tool2024-11-12Paper
Differential analysis of the ternary hash function Troika2024-10-16Paper
Differential meet-in-the-middle cryptanalysis
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Breaking \textsc{Panther}
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
CHIMERA: combining ring-LWE-based fully homomorphic encryption schemes
Journal of Mathematical Cryptology
2021-05-03Paper
High-precision privacy-preserving real-valued function evaluation2021-03-17Paper
Boomerang uniformity of popular S-box constructions
Designs, Codes and Cryptography
2020-09-22Paper
The BMM symmetrising trace conjecture for the exceptional 2-reflection groups of rank 2
Journal of Algebra
2020-05-23Paper
The BMM symmetrising trace conjecture for groups \(G_{4}\), \(G_{5}\), \(G_{6}\), \(G_{7}\), \(G_{8}\)
Journal of Symbolic Computation
2019-06-28Paper
Two notions of differential equivalence on Sboxes
Designs, Codes and Cryptography
2019-02-20Paper
Key recovery attack against 2.5-round \(\pi\)-Cipher
Fast Software Encryption
2018-05-09Paper
Making the impossible possible
Journal of Cryptology
2018-04-26Paper
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
IEEE Transactions on Information Theory
2017-06-08Paper
Reflection ciphers
Designs, Codes and Cryptography
2017-02-10Paper
Another view of the division property
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
A new criterion for avoiding the propagation of linear relations through an sbox
Fast Software Encryption
2015-09-18Paper
Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
Lecture Notes in Computer Science
2015-01-16Paper
Key difference invariant bias in block ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Higher-order differential properties of Keccak and Luffa
Fast Software Encryption
2011-07-07Paper
Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
Selected Areas in Cryptography
2011-03-15Paper


Research outcomes over time


This page was built for person: Christina Boura