Anne Canteaut

From MaRDI portal
(Redirected from Person:510442)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Understanding unexpected fixed-key differential behaviours: how to avoid major weaknesses in lightweight designs2026-03-31Paper
On the algebraic degree of iterated power functions
Designs, Codes and Cryptography
2023-03-17Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Recovering or Testing Extended-Affine Equivalence
IEEE Transactions on Information Theory
2022-10-11Paper
Autocorrelations of vectorial Boolean functions2022-06-15Paper
If a generalised butterfly is APN then it operates on 6 bits
Cryptography and Communications
2020-05-12Paper
BISON instantiating the whitened swap-or-not construction2020-02-04Paper
DFA on LS-designs with a practical implementation on SCREAM
Constructive Side-Channel Analysis and Secure Design
2019-09-16Paper
On CCZ-equivalence, extended-affine equivalence, and function twisting
Finite Fields and their Applications
2019-03-27Paper
Two notions of differential equivalence on Sboxes
Designs, Codes and Cryptography
2019-02-20Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
Journal of Cryptology
2018-09-14Paper
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$
IEEE Transactions on Information Theory
2018-06-27Paper
Attacks against filter generators exploiting monomial mappings
Fast Software Encryption
2018-05-09Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
Fast Software Encryption
2018-05-09Paper
A new algorithm for finding minimum-weight words in large linear codes
Cryptography and Coding
2018-03-21Paper
Proving resistance against invariant attacks: how to choose the round constants2017-11-15Paper
Differential Properties of ${x\mapsto x^{2^{t}-1}}$
IEEE Transactions on Information Theory
2017-07-12Paper
Parity-Check Relations on Combination Generators
IEEE Transactions on Information Theory
2017-07-12Paper
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
IEEE Transactions on Information Theory
2017-06-08Paper
Reflection ciphers
Designs, Codes and Cryptography
2017-02-10Paper
Another view of the division property
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Extended differential properties of cryptographic functions
Topics in Finite Fields
2016-09-02Paper
Related-key attack on full-round PICARO
Lecture Notes in Computer Science
2016-05-19Paper
Construction of lightweight S-boxes using Feistel and MISTY structures
Lecture Notes in Computer Science
2016-05-19Paper
Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Differential attacks against SPN: a thorough analysis
Lecture Notes in Computer Science
2015-09-21Paper
Multiple differential cryptanalysis of round-reduced \textsc{PRINCE}
Fast Software Encryption
2015-09-18Paper
A new criterion for avoiding the propagation of linear relations through an sbox
Fast Software Encryption
2015-09-18Paper
Construction of \(t\)-resilient functions over a finite alphabet
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Sieve-in-the-middle: improved MITM attacks
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Correlation attacks on combination generators
Cryptography and Communications
2013-06-24Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Higher-order differential properties of Keccak and Luffa
Fast Software Encryption
2011-07-07Paper
Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
Selected Areas in Cryptography
2011-03-15Paper
Differential properties of power functions
International Journal of Information and Coding Theory
2011-02-04Paper
Structural weaknesses of permutations with a low differential uniformity and generalized crooked functions2011-01-03Paper
Symmetric Boolean Functions
IEEE Transactions on Information Theory
2008-12-21Paper
On Almost Perfect Nonlinear Functions Over$mmb F_2^n$
IEEE Transactions on Information Theory
2008-12-21Paper
Decomposing bent functions
IEEE Transactions on Information Theory
2008-12-21Paper
A new class of monomial bent functions
Finite Fields and their Applications
2008-02-06Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Construction of bent functions via Niho power functions
Journal of Combinatorial Theory. Series A
2006-08-04Paper
Finding nonnormal bent functions
Discrete Applied Mathematics
2006-04-28Paper
Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions2006-03-01Paper
scientific article; zbMATH DE number 2154504 (Why is no real title available?)2005-04-09Paper
scientific article; zbMATH DE number 2086728 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 1857509 (Why is no real title available?)2003-05-19Paper
scientific article; zbMATH DE number 1759269 (Why is no real title available?)2002-11-24Paper
scientific article; zbMATH DE number 1418253 (Why is no real title available?)2002-10-09Paper
On cryptographic properties of the cosets of R(1, m)
IEEE Transactions on Information Theory
2002-08-04Paper
On the weight distributions of optimal cosets of the first-order Reed-Muller codes
IEEE Transactions on Information Theory
2002-08-04Paper
Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture
IEEE Transactions on Information Theory
2000-09-07Paper
Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography
Designs, Codes and Cryptography
2000-05-22Paper
Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences
SIAM Journal on Discrete Mathematics
2000-03-19Paper
scientific article; zbMATH DE number 1302794 (Why is no real title available?)2000-02-15Paper
Couples de suites binaires de longueur maximale ayant une corrélation croisée à trois valeurs: conjecture de Welch
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics
1999-06-29Paper
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
IEEE Transactions on Information Theory
1998-08-10Paper


Research outcomes over time


This page was built for person: Anne Canteaut