Christina Boura
Christina Boura
Adresse e-mail validée de uvsq.fr - Page d'accueil
Titre
Citée par
Citée par
Année
Higher-order differential properties of Keccak and Luffa
C Boura, A Canteaut, C De Canniere
International Workshop on Fast Software Encryption, 252-269, 2011
1402011
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
C Boura, M Naya-Plasencia, V Suder
International Conference on the Theory and Application of Cryptology and …, 2014
118*2014
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
C Boura, A Canteaut
International Workshop on Selected Areas in Cryptography, 1-17, 2010
712010
On the Influence of the Algebraic Degree ofon the Algebraic Degree of
C Boura, A Canteaut
IEEE Transactions on Information Theory 59 (1), 691-702, 2012
462012
Another view of the division property
C Boura, A Canteaut
Annual International Cryptology Conference, 654-682, 2016
362016
Key difference invariant bias in block ciphers
A Bogdanov, C Boura, V Rijmen, M Wang, L Wen, J Zhao
International Conference on the Theory and Application of Cryptology and …, 2013
312013
A zero-sum property for the Keccak-f permutation with 18 rounds
C Boura, A Canteaut
2010 IEEE International Symposium on Information Theory, 2488-2492, 2010
312010
On the boomerang uniformity of cryptographic sboxes
C Boura, A Canteaut
IACR Transactions on Symmetric Cryptology, 290-310, 2018
282018
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning.
C Boura, N Gama, M Georgieva
IACR Cryptol. ePrint Arch. 2018, 758, 2018
222018
Improved impossible differential attacks against round-reduced LBlock
C Boura, M Minier, M Naya-Plasencia, V Suder
202014
Making the impossible possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31 (1), 101-133, 2018
162018
Side-channel analysis of Grøstl and Skein
C Boura, S Lévêque, D Vigilant
2012 IEEE Symposium on Security and Privacy Workshops, 16-26, 2012
122012
Two notions of differential equivalence on Sboxes
C Boura, A Canteaut, J Jean, V Suder
Designs, Codes and Cryptography 87 (2-3), 185-202, 2019
102019
Reflection ciphers
C Boura, A Canteaut, LR Knudsen, G Leander
Designs, Codes and Cryptography 82 (1-2), 3-25, 2017
102017
Key Recovery Attack Against 2.5-Round -Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
International Conference on Fast Software Encryption, 535-553, 2016
82016
A general proof framework for recent AES distinguishers
C Boura, A Canteaut, D Coggia
IACR Transactions on Symmetric Cryptology, 170-191, 2019
72019
Boomerang uniformity of popular S-box constructions
C Boura, L Perrin, S Tian
WCC 2019: The Eleventh International Workshop on Coding and Cryptography, 2019
62019
High-precision privacy-preserving real-valued function evaluation
C Boura, I Chillotti, N Gama, D Jetchev, S Peceny, A Petric
International Conference on Financial Cryptography and Data Security, 183-202, 2018
62018
A new criterion for avoiding the propagation of linear relations through an Sbox
C Boura, A Canteaut
International Workshop on Fast Software Encryption, 585-604, 2013
62013
The BMM symmetrising trace conjecture for groups G4, G5, G6, G7, G8
C Boura, E Chavli, M Chlouveraki, K Karvounis
Journal of Symbolic Computation 96, 62-84, 2020
52020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20