Céline Blondeau

Orcid: 0000-0002-7777-8545

According to our database1, Céline Blondeau authored at least 31 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Differential attacks: using alternative operations.
Des. Codes Cryptogr., 2019

2017
Accurate Estimate of the Advantage of Impossible Differential Attacks.
IACR Trans. Symmetric Cryptol., 2017

Differential-Linear Cryptanalysis Revisited.
J. Cryptol., 2017

Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity.
Des. Codes Cryptogr., 2017

2016
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2016

2015
Reflection Cryptanalysis of PRINCE-Like Ciphers.
J. Cryptol., 2015

Impossible differential attack on 13-round Camellia-192.
Inf. Process. Lett., 2015

Known-key Distinguisher on Full PRESENT.
IACR Cryptol. ePrint Arch., 2015

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks.
IACR Cryptol. ePrint Arch., 2015

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
IACR Cryptol. ePrint Arch., 2015

New Links Between Differential and Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015

Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method.
IACR Cryptol. ePrint Arch., 2015

Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation.
IACR Cryptol. ePrint Arch., 2015

Perfect nonlinear functions and cryptography.
Finite Fields Their Appl., 2015

2014
More differentially 6-uniform power functions.
Des. Codes Cryptogr., 2014

On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Bounds in Shallows and in Miseries.
IACR Cryptol. ePrint Arch., 2013

Improbable Differential from Impossible Differential: On the Validity of the Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

2012
Multiple Differential Cryptanalysis using \LLR and χ<sup>2</sup> Statistics.
IACR Cryptol. ePrint Arch., 2012

Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

2011
La cryptanalyse différentielle et ses généralisations. (Differential cryptanalysis and its generalizations).
PhD thesis, 2011

Differential Properties of ${x\mapsto x^{2^{t}-1}}$.
IEEE Trans. Inf. Theory, 2011

Multiple Differential Cryptanalysis: Theory and Practice (Corrected).
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of ARMADILLO2.
IACR Cryptol. ePrint Arch., 2011

Accurate estimates of the data complexity and success probability for various cryptanalyses.
Des. Codes Cryptogr., 2011

Differential properties of functions x -> x^{2^t-1} -- extended version
CoRR, 2011

Multiple Differential Cryptanalysis: Theory and Practice.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Differential properties of power functions.
Int. J. Inf. Coding Theory, 2010

Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT.
IACR Cryptol. ePrint Arch., 2010

2009
On the Data Complexity of Statistical Attacks Against Block Ciphers (full version).
IACR Cryptol. ePrint Arch., 2009


  Loading...