Anne Canteaut
Orcid: 0000-0002-6292-8336Affiliations:
- INRIA, France
According to our database1,
Anne Canteaut
authored at least 122 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2023
Des. Codes Cryptogr., March, 2023
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES.
IACR Trans. Symmetric Cryptol., 2023
2022
IACR Trans. Symmetric Cryptol., 2022
2021
2020
IACR Trans. Symmetric Cryptol., 2020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Finite Fields Their Appl., 2019
CoRR, 2019
Cryptogr. Commun., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Symmetric Cryptol., 2018
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
J. Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018
2017
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Trans. Symmetric Cryptol., 2017
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size 2<sup>4k+2</sup>.
IEEE Trans. Inf. Theory, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
2016
IACR Cryptol. ePrint Arch., 2016
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 2<sup>4k+2</sup>.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks.
IACR Cryptol. ePrint Arch., 2015
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version).
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
On the Influence of the Algebraic Degree of F<sup>-1</sup> on the Algebraic Degree of G ∘ F.
IEEE Trans. Inf. Theory, 2013
IACR Cryptol. ePrint Arch., 2013
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version).
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2012
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptol. ePrint Arch., 2012
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
On the influence of the algebraic degree of F<sup>-1</sup> on the algebraic degree of G circ F.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-<i>f</i> and Hamsi-256.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
2006
IEEE Trans. Inf. Theory, 2006
Analyse et conception de chiffrements à clef secrète. (Analysis and design of secret-key ciphers).
, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Coding and Cryptography, International Workshop, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
2003
2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
IEEE Trans. Inf. Theory, 2001
Proceedings of the Progress in Cryptology, 2001
2000
Binary m-sequences with three-valued crosscorrelation: A proof of Welch's conjecture.
IEEE Trans. Inf. Theory, 2000
Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F<sub>2<sup><i>m</i></sup></sub>, and Crosscorrelation of Maximum-Length Sequences.
SIAM J. Discret. Math., 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Proceedings of the Advances in Cryptology, 2000
1999
Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography.
Des. Codes Cryptogr., 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
1998
A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511.
IEEE Trans. Inf. Theory, 1998
Proceedings of the Advances in Cryptology, 1998
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Cryptography and Coding, 1995