Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon., , and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 179-199. Springer, (2014)On inverses of APN exponents., and . ISIT, page 1207-1211. IEEE, (2012)Key Recovery Attack Against 2.5-Round -Cipher., , , , , , and . FSE, volume 9783 of Lecture Notes in Computer Science, page 535-553. Springer, (2016)On Inversion in Z_2^n-1, and . CoRR, (2013)Propriétés Différentielles des Permutations et Application en Cryptographie Symétrique. (Differential Properties of Permutations and Application in Symmetric Cryptography).. Pierre and Marie Curie University, Paris, France, (2014)Two notions of differential equivalence on Sboxes., , , and . Des. Codes Cryptogr., 87 (2-3): 185-202 (2019)Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)., , and . IACR Cryptology ePrint Archive, (2014)The Simeck Family of Lightweight Block Ciphers., , , , and . CHES, volume 9293 of Lecture Notes in Computer Science, page 307-329. Springer, (2015)Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble., , and . ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 510-532. Springer, (2015)Sparse permutations with low differential uniformity., , and . Finite Fields Their Appl., (2014)