Anne Canteaut

From MaRDI portal
Person:510442

Available identifiers

zbMath Open canteaut.anneDBLP56/3453WikidataQ21769908 ScholiaQ21769908MaRDI QIDQ510442

List of research outcomes





PublicationDate of PublicationType
On the algebraic degree of iterated power functions2023-03-17Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Recovering or Testing Extended-Affine Equivalence2022-10-11Paper
Autocorrelations of vectorial Boolean functions2022-06-15Paper
If a generalised butterfly is APN then it operates on 6 bits2020-05-12Paper
BISON instantiating the whitened swap-or-not construction2020-02-04Paper
DFA on LS-Designs with a Practical Implementation on SCREAM2019-09-16Paper
On CCZ-equivalence, extended-affine equivalence, and function twisting2019-03-27Paper
Two notions of differential equivalence on Sboxes2019-02-20Paper
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression2018-09-14Paper
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$2018-06-27Paper
Attacks Against Filter Generators Exploiting Monomial Mappings2018-05-09Paper
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression2018-05-09Paper
A new algorithm for finding minimum-weight words in large linear codes2018-03-21Paper
Proving resistance against invariant attacks: how to choose the round constants2017-11-15Paper
Differential Properties of ${x\mapsto x^{2^{t}-1}}$2017-07-12Paper
Parity-Check Relations on Combination Generators2017-07-12Paper
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$2017-06-08Paper
Reflection ciphers2017-02-10Paper
Another View of the Division Property2016-11-30Paper
Extended differential properties of cryptographic functions2016-09-02Paper
Related-Key Attack on Full-Round PICARO2016-05-19Paper
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures2016-05-19Paper
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations2015-11-11Paper
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks2015-09-30Paper
Differential Attacks Against SPN: A Thorough Analysis2015-09-21Paper
Multiple Differential Cryptanalysis of Round-Reduced PRINCE2015-09-18Paper
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox2015-09-18Paper
Construction of t-Resilient Functions over a Finite Alphabet2014-08-20Paper
Sieve-in-the-Middle: Improved MITM Attacks2013-09-02Paper
Correlation attacks on combination generators2013-06-24Paper
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications2013-03-19Paper
Higher-order differential properties of Keccak and Luffa2011-07-07Paper
Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-2562011-03-15Paper
Differential properties of power functions2011-02-04Paper
Structural weaknesses of permutations with a low differential uniformity and generalized crooked functions2011-01-03Paper
Symmetric Boolean Functions2008-12-21Paper
On Almost Perfect Nonlinear Functions Over$mmb F_2^n$2008-12-21Paper
Decomposing bent functions2008-12-21Paper
A new class of monomial bent functions2008-02-06Paper
Coding and Cryptography2007-05-02Paper
Construction of bent functions via Niho power functions2006-08-04Paper
Finding nonnormal bent functions2006-04-28Paper
Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions2006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q46650292005-04-09Paper
https://portal.mardi4nfdi.de/entity/Q47372682004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47885582003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45379902002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q49418122002-10-09Paper
On cryptographic properties of the cosets of R(1, m)2002-08-04Paper
On the weight distributions of optimal cosets of the first-order Reed-Muller codes2002-08-04Paper
Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture2000-09-07Paper
Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography2000-05-22Paper
Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42492662000-02-15Paper
Couples de suites binaires de longueur maximale ayant une corrélation croisée à trois valeurs: conjecture de Welch1999-06-29Paper
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 5111998-08-10Paper

Research outcomes over time

This page was built for person: Anne Canteaut