Anne Canteaut

From MaRDI portal
Person:510442

Available identifiers

zbMath Open canteaut.anneDBLP56/3453WikidataQ21769908 ScholiaQ21769908MaRDI QIDQ510442

List of research outcomes





PublicationDate of PublicationType
On the algebraic degree of iterated power functions2023-03-17Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Recovering or Testing Extended-Affine Equivalence2022-10-11Paper
Autocorrelations of vectorial Boolean functions2022-06-15Paper
If a generalised butterfly is APN then it operates on 6 bits2020-05-12Paper
BISON instantiating the whitened swap-or-not construction2020-02-04Paper
DFA on LS-designs with a practical implementation on SCREAM2019-09-16Paper
On CCZ-equivalence, extended-affine equivalence, and function twisting2019-03-27Paper
Two notions of differential equivalence on Sboxes2019-02-20Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression2018-09-14Paper
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$2018-06-27Paper
Attacks against filter generators exploiting monomial mappings2018-05-09Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression2018-05-09Paper
A new algorithm for finding minimum-weight words in large linear codes2018-03-21Paper
Proving resistance against invariant attacks: how to choose the round constants2017-11-15Paper
Differential Properties of ${x\mapsto x^{2^{t}-1}}$2017-07-12Paper
Parity-Check Relations on Combination Generators2017-07-12Paper
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$2017-06-08Paper
Reflection ciphers2017-02-10Paper
Another view of the division property2016-11-30Paper
Extended differential properties of cryptographic functions2016-09-02Paper
Related-key attack on full-round PICARO2016-05-19Paper
Construction of lightweight S-boxes using Feistel and MISTY structures2016-05-19Paper
Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations2015-11-11Paper
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks2015-09-30Paper
Differential attacks against SPN: a thorough analysis2015-09-21Paper
Multiple differential cryptanalysis of round-reduced \textsc{PRINCE}2015-09-18Paper
A new criterion for avoiding the propagation of linear relations through an sbox2015-09-18Paper
Construction of \(t\)-resilient functions over a finite alphabet2014-08-20Paper
Sieve-in-the-middle: improved MITM attacks2013-09-02Paper
Correlation attacks on combination generators2013-06-24Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract2013-03-19Paper
Higher-order differential properties of Keccak and Luffa2011-07-07Paper
Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-2562011-03-15Paper
Differential properties of power functions2011-02-04Paper
Structural weaknesses of permutations with a low differential uniformity and generalized crooked functions2011-01-03Paper
Symmetric Boolean Functions2008-12-21Paper
On Almost Perfect Nonlinear Functions Over$mmb F_2^n$2008-12-21Paper
Decomposing bent functions2008-12-21Paper
A new class of monomial bent functions2008-02-06Paper
Coding and Cryptography2007-05-02Paper
Construction of bent functions via Niho power functions2006-08-04Paper
Finding nonnormal bent functions2006-04-28Paper
Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions2006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q46650292005-04-09Paper
https://portal.mardi4nfdi.de/entity/Q47372682004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47885582003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45379902002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q49418122002-10-09Paper
On cryptographic properties of the cosets of R(1, m)2002-08-04Paper
On the weight distributions of optimal cosets of the first-order Reed-Muller codes2002-08-04Paper
Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture2000-09-07Paper
Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography2000-05-22Paper
Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42492662000-02-15Paper
Couples de suites binaires de longueur maximale ayant une corrélation croisée à trois valeurs: conjecture de Welch1999-06-29Paper
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 5111998-08-10Paper

Research outcomes over time

This page was built for person: Anne Canteaut