Christina Boura
Orcid: 0000-0001-6796-8874
According to our database1,
Christina Boura
authored at least 40 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A generic algorithm for efficient key recovery in differential attacks - and its associated tool.
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
On the security of symmetric primitives and the properties of their inner components.
, 2023
2022
IACR Cryptol. ePrint Arch., 2022
2020
IACR Trans. Symmetric Cryptol., 2020
The BMM symmetrising trace conjecture for groups <i>G</i><sub>4</sub>, <i>G</i><sub>5</sub>, <i>G</i><sub>6</sub>, <i>G</i><sub>7</sub>, <i>G</i><sub>8</sub>.
J. Symb. Comput., 2020
J. Math. Cryptol., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning.
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
2014
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version).
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
On the Influence of the Algebraic Degree of F<sup>-1</sup> on the Algebraic Degree of G ∘ F.
IEEE Trans. Inf. Theory, 2013
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version).
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Analyse de fonctions de hachage cryptographiques. (Analysis of cryptographic hash functions).
PhD thesis, 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
2011
On the influence of the algebraic degree of F<sup>-1</sup> on the algebraic degree of G circ F.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-<i>f</i> and Hamsi-256.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010