Anne Canteaut

From MaRDI portal
Person:510442

Available identifiers

zbMath Open canteaut.anneWikidataQ21769908 ScholiaQ21769908MaRDI QIDQ510442

List of research outcomes

PublicationDate of PublicationType
On the algebraic degree of iterated power functions2023-03-17Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Recovering or Testing Extended-Affine Equivalence2022-10-11Paper
Autocorrelations of vectorial Boolean functions2022-06-15Paper
If a generalised butterfly is APN then it operates on 6 bits2020-05-12Paper
BISON instantiating the whitened swap-or-not construction2020-02-04Paper
DFA on LS-Designs with a Practical Implementation on SCREAM2019-09-16Paper
On CCZ-equivalence, extended-affine equivalence, and function twisting2019-03-27Paper
Two notions of differential equivalence on Sboxes2019-02-20Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression2018-09-14Paper
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$2018-06-27Paper
Attacks Against Filter Generators Exploiting Monomial Mappings2018-05-09Paper
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression2018-05-09Paper
A new algorithm for finding minimum-weight words in large linear codes2018-03-21Paper
Proving resistance against invariant attacks: how to choose the round constants2017-11-15Paper
Parity-Check Relations on Combination Generators2017-07-12Paper
Differential Properties of ${x\mapsto x^{2^{t}-1}}$2017-07-12Paper
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$2017-06-08Paper
Reflection ciphers2017-02-10Paper
Another View of the Division Property2016-11-30Paper
Extended differential properties of cryptographic functions2016-09-02Paper
Related-Key Attack on Full-Round PICARO2016-05-19Paper
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures2016-05-19Paper
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations2015-11-11Paper
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks2015-09-30Paper
Differential Attacks Against SPN: A Thorough Analysis2015-09-21Paper
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox2015-09-18Paper
Multiple Differential Cryptanalysis of Round-Reduced PRINCE2015-09-18Paper
Construction of t-Resilient Functions over a Finite Alphabet2014-08-20Paper
Sieve-in-the-Middle: Improved MITM Attacks2013-09-02Paper
Correlation attacks on combination generators2013-06-24Paper
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications2013-03-19Paper
Higher-Order Differential Properties of Keccak and Luffa2011-07-07Paper
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-2562011-03-15Paper
Differential properties of power functions2011-02-04Paper
https://portal.mardi4nfdi.de/entity/Q30622652011-01-03Paper
Decomposing bent functions2008-12-21Paper
Symmetric Boolean Functions2008-12-21Paper
On Almost Perfect Nonlinear Functions Over$mmb F_2^n$2008-12-21Paper
A new class of monomial bent functions2008-02-06Paper
Coding and Cryptography2007-05-02Paper
Construction of bent functions via Niho power functions2006-08-04Paper
Finding nonnormal bent functions2006-04-28Paper
https://portal.mardi4nfdi.de/entity/Q33749322006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q46650292005-04-09Paper
https://portal.mardi4nfdi.de/entity/Q47372682004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47885582003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45379902002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q49418122002-10-09Paper
On the weight distributions of optimal cosets of the first-order Reed-Muller codes2002-08-04Paper
On cryptographic properties of the cosets of R(1, m)2002-08-04Paper
Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture2000-09-07Paper
Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography2000-05-22Paper
Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42492662000-02-15Paper
Couples de suites binaires de longueur maximale ayant une corrélation croisée à trois valeurs: conjecture de Welch1999-06-29Paper
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 5111998-08-10Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Anne Canteaut