BibTeX records: María Naya-Plasencia

download as .bib file

@article{DBLP:journals/iacr/BouraDDBN24,
  author       = {Christina Boura and
                  Nicolas David and
                  Patrick Derbez and
                  Rachelle Heim Boissier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {A generic algorithm for efficient key recovery in differential attacks
                  - and its associated tool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/288},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraDDBN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadianKMMN24,
  author       = {Zahra Ahmadian and
                  Akram Khalesi and
                  Dounia M'foukh and
                  Hossein Moghimi and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Improved Differential Meet-In-The-Middle Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/351},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadianKMMN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BouraDDLN23,
  author       = {Christina Boura and
                  Nicolas David and
                  Patrick Derbez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Differential Meet-In-The-Middle Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {240--272},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_9},
  doi          = {10.1007/978-3-031-38548-3\_9},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BouraDDLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BouraDBN23,
  author       = {Christina Boura and
                  Nicolas David and
                  Rachelle Heim Boissier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Better Steady than Speedy: Full Break of {SPEEDY-7-192}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {36--66},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_2},
  doi          = {10.1007/978-3-031-30634-1\_2},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BouraDBN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanaleN23,
  author       = {Federico Canale and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Guessing Less and Better: Improved Attacks on {GIFT-64}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/354},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanaleN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadianKMMN23,
  author       = {Zahra Ahmadian and
                  Akram Khalesi and
                  Dounia M'foukh and
                  Hossein Moghimi and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Truncated Differential Attacks: New Insights and 10-round Attacks
                  on {QARMA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1449},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1449},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadianKMMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BeierleBCDFLNT22,
  author       = {Christof Beierle and
                  Marek Broll and
                  Federico Canale and
                  Nicolas David and
                  Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yosuke Todo},
  title        = {Improved Differential-Linear Attacks with Applications to {ARX} Ciphers},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {4},
  pages        = {29},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09437-z},
  doi          = {10.1007/S00145-022-09437-Z},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BeierleBCDFLNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BrollCDFLNT22,
  author       = {Marek Broll and
                  Federico Canale and
                  Nicolas David and
                  Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yosuke Todo},
  editor       = {Steven D. Galbraith},
  title        = {New Attacks from Old Distinguishers Improved Attacks on Serpent},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {484--510},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_20},
  doi          = {10.1007/978-3-030-95312-6\_20},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BrollCDFLNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/LeanderMNSL22,
  author       = {Nils Gregor Leander and
                  Bart Mennink and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yu Sasaki and
                  Eran Lambooij},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 22141)},
  journal      = {Dagstuhl Reports},
  volume       = {12},
  number       = {4},
  pages        = {1--12},
  year         = {2022},
  url          = {https://doi.org/10.4230/DagRep.12.4.1},
  doi          = {10.4230/DAGREP.12.4.1},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/LeanderMNSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrixonsNS22,
  author       = {Paul Frixons and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Boomerang Attacks and Some Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/060},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FrixonsNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidNS22,
  author       = {Nicolas David and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum impossible differential attacks: Applications to {AES} and
                  {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/754},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikCFN22,
  author       = {Ritam Bhaumik and
                  Andr{\'{e}} Chailloux and
                  Paul Frixons and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Safely Doubling your Block Ciphers for a Post-Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1342},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1342},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikCFN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraDBN22,
  author       = {Christina Boura and
                  Nicolas David and
                  Rachelle Heim Boissier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Better Steady than Speedy: Full break of {SPEEDY-7-192}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1351},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1351},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraDBN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraDDLN22,
  author       = {Christina Boura and
                  Nicolas David and
                  Patrick Derbez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Differential Meet-In-The-Middle Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1640},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1640},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraDDLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Florez-Gutierrez21,
  author       = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher and
                  Ferdinand Sibleyras},
  title        = {Internal Symmetries and Linear Properties: Full-permutation Distinguishers
                  and Improved Collisions on Gimli},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {4},
  pages        = {45},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09413-z},
  doi          = {10.1007/S00145-021-09413-Z},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Florez-Gutierrez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonnetainLNS21,
  author       = {Xavier Bonnetain and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Quantum Linearization Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {422--452},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_15},
  doi          = {10.1007/978-3-030-92062-3\_15},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonnetainLNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrollCFLN21,
  author       = {Marek Broll and
                  Federico Canale and
                  Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Generic Framework for Key-Guessing Improvements},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {453--483},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_16},
  doi          = {10.1007/978-3-030-92062-3\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrollCFLN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BhaumikBCLNSS21,
  author       = {Ritam Bhaumik and
                  Xavier Bonnetain and
                  Andr{\'{e}} Chailloux and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher and
                  Yannick Seurin},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {{QCB:} Efficient Quantum-Secure Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {668--698},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_23},
  doi          = {10.1007/978-3-030-92062-3\_23},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BhaumikBCLNSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FrixonsNS21,
  author       = {Paul Frixons and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Riham AlTawy and
                  Andreas H{\"{u}}lsing},
  title        = {Quantum Boomerang Attacks and Some Applications},
  booktitle    = {Selected Areas in Cryptography - 28th International Conference, {SAC}
                  2021, Virtual Event, September 29 - October 1, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13203},
  pages        = {332--352},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-99277-4\_16},
  doi          = {10.1007/978-3-030-99277-4\_16},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FrixonsNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/JefferyMNS21,
  author       = {Stacey Jeffery and
                  Michele Mosca and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Rainer Steinwandt},
  title        = {Quantum Cryptanalysis (Dagstuhl Seminar 21421)},
  journal      = {Dagstuhl Reports},
  volume       = {11},
  number       = {9},
  pages        = {64--79},
  year         = {2021},
  url          = {https://doi.org/10.4230/DagRep.11.9.64},
  doi          = {10.4230/DAGREP.11.9.64},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/JefferyMNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrollCDFLNT21,
  author       = {Marek Broll and
                  Federico Canale and
                  Nicolas David and
                  Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yosuke Todo},
  title        = {Further Improving Differential-Linear Attacks: Applications to Chaskey
                  and Serpent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/820},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrollCDFLNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrollCFLN21,
  author       = {Marek Broll and
                  Federico Canale and
                  Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Generic Framework for Key-Guessing Improvements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1238},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1238},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrollCFLN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainLNS21,
  author       = {Xavier Bonnetain and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Linearization Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1239},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainLNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HosoyamadaNS20,
  author       = {Akinori Hosoyamada and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yu Sasaki},
  title        = {Improved Attacks on sLiSCP Permutation and Tight Bound of Limited
                  Birthday Distinguishers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {147--172},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.147-172},
  doi          = {10.46586/TOSC.V2020.I4.147-172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HosoyamadaNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CanteautDLNPPS20,
  author       = {Anne Canteaut and
                  S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Thomas Pornin and
                  Andr{\'{e}} Schrottenloher},
  title        = {Saturnin: a suite of lightweight symmetric algorithms for post-quantum
                  security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {160--207},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.160-207},
  doi          = {10.13154/TOSC.V2020.IS1.160-207},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CanteautDLNPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Florez-Gutierrez20,
  author       = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher and
                  Ferdinand Sibleyras},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {New Results on Gimli: Full-Permutation Distinguishers and Improved
                  Collisions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_2},
  doi          = {10.1007/978-3-030-64837-4\_2},
  timestamp    = {Thu, 10 Dec 2020 09:57:08 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Florez-Gutierrez20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Itai Dinur and
                  Maria Eichlseder and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Yu Sasaki and
                  Yosuke Todo and
                  Friedrich Wiemer},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives
                  Optimized for Integrity Proof Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {299--328},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_11},
  doi          = {10.1007/978-3-030-56877-1\_11},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DerbezHLNPS20,
  author       = {Patrick Derbez and
                  Paul Huynh and
                  Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to
                  the Light},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {359--388},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_13},
  doi          = {10.1007/978-3-030-56877-1\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DerbezHLNPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Florez-Gutierrez20,
  author       = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Improving Key-Recovery in Linear Attacks: Application to 28-Round
                  {PRESENT}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {221--249},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_9},
  doi          = {10.1007/978-3-030-45721-1\_9},
  timestamp    = {Mon, 04 May 2020 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Florez-Gutierrez20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Naya-PlasenciaS20,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Optimal Merging in Quantum k-xor and k-xor-sum Algorithms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {311--340},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_11},
  doi          = {10.1007/978-3-030-45724-2\_11},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Naya-PlasenciaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-12439,
  author       = {Xavier Bonnetain and
                  Akinori Hosoyamada and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yu Sasaki and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Attacks without Superposition Queries: the Offline Simon's
                  Algorithm},
  journal      = {CoRR},
  volume       = {abs/2002.12439},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.12439},
  eprinttype    = {arXiv},
  eprint       = {2002.12439},
  timestamp    = {Tue, 05 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-12439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeyneCDELLNPSTW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Itai Dinur and
                  Maria Eichlseder and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Yu Sasaki and
                  Yosuke Todo and
                  Friedrich Wiemer},
  title        = {Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives
                  Optimized for Integrity Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/188},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BeyneCDELLNPSTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerbezHLNPS20,
  author       = {Patrick Derbez and
                  Paul Huynh and
                  Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher},
  title        = {Cryptanalysis Results on Spook},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerbezHLNPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Florez-Gutierrez20,
  author       = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher and
                  Ferdinand Sibleyras},
  title        = {New results on Gimli: full-permutation distinguishers and improved
                  collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/744},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Florez-Gutierrez20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeyneCLNPW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Friedrich Wiemer},
  title        = {On the security of the Rescue hash function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/820},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeyneCLNPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaNS20,
  author       = {Akinori Hosoyamada and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yu Sasaki},
  title        = {Improved Attacks on sLiSCP Permutation and Tight Bound of Limited
                  Birthday Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1089},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikBCLNSS20,
  author       = {Ritam Bhaumik and
                  Xavier Bonnetain and
                  Andr{\'{e}} Chailloux and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher and
                  Yannick Seurin},
  title        = {{QCB:} Efficient Quantum-secure Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1304},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1304},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikBCLNSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BonnetainNS19,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Security Analysis of {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {55--93},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.55-93},
  doi          = {10.13154/TOSC.V2019.I2.55-93},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BonnetainNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonnetainHNSS19,
  author       = {Xavier Bonnetain and
                  Akinori Hosoyamada and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yu Sasaki and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Quantum Attacks Without Superposition Queries: The Offline Simon's
                  Algorithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {552--583},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_20},
  doi          = {10.1007/978-3-030-34578-5\_20},
  timestamp    = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonnetainHNSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BonnetainNS19,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {On Quantum Slide Attacks},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {492--519},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_20},
  doi          = {10.1007/978-3-030-38471-5\_20},
  timestamp    = {Mon, 28 Aug 2023 21:17:39 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BonnetainNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/MoscaNS19,
  author       = {Michele Mosca and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Rainer Steinwandt},
  title        = {Quantum Cryptanalysis (Dagstuhl Seminar 19421)},
  journal      = {Dagstuhl Reports},
  volume       = {9},
  number       = {10},
  pages        = {47--60},
  year         = {2019},
  url          = {https://doi.org/10.4230/DagRep.9.10.47},
  doi          = {10.4230/DAGREP.9.10.47},
  timestamp    = {Fri, 28 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/MoscaNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainNS19,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Security Analysis of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naya-PlasenciaS19,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Optimal Merging in Quantum k-xor and k-sum Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naya-PlasenciaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainHNSS19,
  author       = {Xavier Bonnetain and
                  Akinori Hosoyamada and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yu Sasaki and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Attacks without Superposition Queries: the Offline Simon Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainHNSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BouraLNS18,
  author       = {Christina Boura and
                  Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Valentin Suder},
  title        = {Making the Impossible Possible},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {1},
  pages        = {101--133},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-016-9251-7},
  doi          = {10.1007/S00145-016-9251-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BouraLNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanteautCFLNPS18,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  title        = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
                  Compression},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {3},
  pages        = {885--916},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9273-9},
  doi          = {10.1007/S00145-017-9273-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanteautCFLNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MendelN18,
  author       = {Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Preface to Volume 2018, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.1-4},
  doi          = {10.13154/TOSC.V2018.I1.1-4},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MendelN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FuhrNR18,
  author       = {Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yann Rotella},
  title        = {State-Recovery Attacks on Modified Ketje Jr},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {29--56},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.29-56},
  doi          = {10.13154/TOSC.V2018.I1.29-56},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GrassiNS18,
  author       = {Lorenzo Grassi and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Quantum Algorithms for the k -xor Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11272},
  pages        = {527--559},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03326-2\_18},
  doi          = {10.1007/978-3-030-03326-2\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GrassiNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonnetainN18,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Hidden Shift Quantum Cryptanalysis and Implications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11272},
  pages        = {560--592},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03326-2\_19},
  doi          = {10.1007/978-3-030-03326-2\_19},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonnetainN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainN18,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Hidden Shift Quantum Cryptanalysis and Implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainNS18,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {On Quantum Slide Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1067},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Plasencia17,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Symmetric Cryptography for Long-Term Security},
  year         = {2017},
  url          = {https://tel.archives-ouvertes.fr/tel-01656036},
  timestamp    = {Mon, 30 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Plasencia17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Naya-PlasenciaP17,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Bart Preneel},
  title        = {Preface},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.1-3},
  doi          = {10.13154/TOSC.V2017.I1.1-3},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Naya-PlasenciaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChaillouxNS17,
  author       = {Andr{\'{e}} Chailloux and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {An Efficient Quantum Collision Search Algorithm and Implications on
                  Symmetric Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  pages        = {211--240},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9\_8},
  doi          = {10.1007/978-3-319-70697-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChaillouxNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaillouxNS17,
  author       = {Andr{\'{e}} Chailloux and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {An Efficient Quantum Collision Search Algorithm and Implications on
                  Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/847},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaillouxNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Quantum Differential and Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {71--94},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.71-94},
  doi          = {10.13154/TOSC.V2016.I1.71-94},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Breaking Symmetric Cryptosystems Using Quantum Period Finding},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {207--237},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_8},
  doi          = {10.1007/978-3-662-53008-5\_8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  editor       = {Thomas Peyrin},
  title        = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
                  Compression},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {313--333},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_16},
  doi          = {10.1007/978-3-662-52993-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Breaking Symmetric Cryptosystems using Quantum Period Finding},
  journal      = {CoRR},
  volume       = {abs/1602.05973},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.05973},
  eprinttype    = {arXiv},
  eprint       = {1602.05973},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LallemandN15,
  author       = {Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Cryptanalysis of Full Sprout},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {663--682},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_32},
  doi          = {10.1007/978-3-662-47989-6\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LallemandN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CanteautLN15,
  author       = {Anne Canteaut and
                  Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Related-Key Attack on Full-Round {PICARO}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_5},
  doi          = {10.1007/978-3-319-31301-6\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CanteautLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KaplanLLN15,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Quantum Differential and Linear Cryptanalysis},
  journal      = {CoRR},
  volume       = {abs/1510.05836},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.05836},
  eprinttype    = {arXiv},
  eprint       = {1510.05836},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KaplanLLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautCFLNPS15,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  title        = {How to Compress Homomorphic Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LallemandN15,
  author       = {Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Cryptanalysis of Full Sprout},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LallemandN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNP15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Improved Cryptanalysis of AES-like Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautLN15,
  author       = {Anne Canteaut and
                  Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Related-Key Attack on Full-Round {PICARO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JeanNP14,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Improved Cryptanalysis of AES-like Permutations},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {4},
  pages        = {772--798},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9156-7},
  doi          = {10.1007/S00145-013-9156-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JeanNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BouraNS14,
  author       = {Christina Boura and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Valentin Suder},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Scrutinizing and Improving Impossible Differential Attacks: Applications
                  to CLEFIA, Camellia, LBlock and Simon},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {179--199},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_10},
  doi          = {10.1007/978-3-662-45611-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BouraNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LallemandN14,
  author       = {Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Cryptanalysis of {KLEIN}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {451--470},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_23},
  doi          = {10.1007/978-3-662-46706-0\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LallemandN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Canteaut0GNR14,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Multiple Differential Cryptanalysis of Round-Reduced {PRINCE}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {591--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_30},
  doi          = {10.1007/978-3-662-46706-0\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Canteaut0GNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFGNR14,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Multiple Di fferential Cryptanalysis of Round-Reduced {PRINCE} (Full
                  version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFGNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LallemandN14,
  author       = {Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Cryptanalysis of {KLEIN} (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LallemandN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraMNS14,
  author       = {Christina Boura and
                  Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Valentin Suder},
  title        = {Improved Impossible Differential Attacks against Round-Reduced LBlock},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraMNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraNS14a,
  author       = {Christina Boura and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Valentin Suder},
  title        = {Scrutinizing and Improving Impossible Differential Attacks: Applications
                  to CLEFIA, Camellia, LBlock and Simon (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {699},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/699},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraNS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AumassonHMN13,
  author       = {Jean{-}Philippe Aumasson and
                  Luca Henzen and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Quark: {A} Lightweight Hash},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {2},
  pages        = {313--339},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9125-6},
  doi          = {10.1007/S00145-012-9125-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AumassonHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GerardGNS13,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Vincent Grosso and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Block Ciphers That Are Easier to Mask: How Far Can We Go?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {383--399},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_22},
  doi          = {10.1007/978-3-642-40349-1\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GerardGNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanteautNV13,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Bastien Vayssi{\`{e}}re},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Sieve-in-the-Middle: Improved {MITM} Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {222--240},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_13},
  doi          = {10.1007/978-3-642-40041-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanteautNV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanNP13,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Multiple Limited-Birthday Distinguishers and Applications},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {533--550},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_27},
  doi          = {10.1007/978-3-662-43414-7\_27},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JeanNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautNV13,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Bastien Vayssi{\`{e}}re},
  title        = {Sieve-in-the-Middle: Improved {MITM} Attacks (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautNV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GerardGNS13,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Vincent Grosso and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Block Ciphers that are Easier to Mask: How Far Can we Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GerardGNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNP13,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Multiple Limited-Birthday Distinguishers and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CanteautN12,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Correlation attacks on combination generators},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {147--171},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0069-3},
  doi          = {10.1007/S12095-012-0069-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CanteautN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MinierN12,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {A related key impossible differential attack against 22 rounds of
                  the lightweight block cipher LBlock},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {16},
  pages        = {624--629},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.04.012},
  doi          = {10.1016/J.IPL.2012.04.012},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MinierN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CanteautN12,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Parity-Check Relations on Combination Generators},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {6},
  pages        = {3900--3911},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2184736},
  doi          = {10.1109/TIT.2012.2184736},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CanteautN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanNP12,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Anne Canteaut},
  title        = {Improved Rebound Attack on the Finalist Gr{\o}stl},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_7},
  doi          = {10.1007/978-3-642-34047-5\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/JeanNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-PlasenciaP12,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Anne Canteaut},
  title        = {Practical Cryptanalysis of {ARMADILLO2}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_9},
  doi          = {10.1007/978-3-642-34047-5\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-PlasenciaP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFNPRV12,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Naya-PlasenciaTV11,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Rebound Attack on {JH42}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {252--269},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_14},
  doi          = {10.1007/978-3-642-25385-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Naya-PlasenciaTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdelraheemBNVZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  C{\'{e}}line Blondeau and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Marion Videau and
                  Erik Zenner},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of {ARMADILLO2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_17},
  doi          = {10.1007/978-3-642-25385-0\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdelraheemBNVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Naya-Plasencia11,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Phillip Rogaway},
  title        = {How to Improve Rebound Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {188--205},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_11},
  doi          = {10.1007/978-3-642-22792-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Naya-Plasencia11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinierNP11,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Antoine Joux},
  title        = {Analysis of Reduced-SHAvite-3-256 v2},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_5},
  doi          = {10.1007/978-3-642-21702-9\_5},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MinierNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AumassonNS11,
  author       = {Jean{-}Philippe Aumasson and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Markku{-}Juhani O. Saarinen},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Practical Attack on 8 Rounds of the Lightweight Block Cipher {KLEIN}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {134--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_11},
  doi          = {10.1007/978-3-642-25578-6\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AumassonNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Naya-PlasenciaRM11,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Willi Meier},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Practical Analysis of Reduced-Round Keccak},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {236--254},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_18},
  doi          = {10.1007/978-3-642-25578-6\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Naya-PlasenciaRM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanNS11,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Martin Schl{\"{a}}ffer},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Improved Analysis of {ECHO-256}},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_2},
  doi          = {10.1007/978-3-642-28496-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JeanNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KnellwolfMN11,
  author       = {Simon Knellwolf and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Conditional Differential Cryptanalysis of Trivium and {KATAN}},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {200--212},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_12},
  doi          = {10.1007/978-3-642-28496-0\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KnellwolfMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemBNVZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  C{\'{e}}line Blondeau and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Marion Videau and
                  Erik Zenner},
  title        = {Cryptanalysis of {ARMADILLO2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinierNP11,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Analysis of reduced-SHAvite-3-256 v2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinierNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNS11,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Martin Schl{\"{a}}ffer},
  title        = {Improved Analysis of {ECHO-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10,
  author       = {Praveen Gauravaram and
                  Ga{\"{e}}tan Leurent and
                  Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Cryptanalysis of the 10-Round Hash and Full Compression Function of
                  SHAvite-3-512},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {419--436},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_25},
  doi          = {10.1007/978-3-642-12678-9\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnellwolfMN10,
  author       = {Simon Knellwolf and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Masayuki Abe},
  title        = {Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_8},
  doi          = {10.1007/978-3-642-17373-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnellwolfMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AumassonHMN10,
  author       = {Jean{-}Philippe Aumasson and
                  Luca Henzen and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Quark: {A} Lightweight Hash},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_1},
  doi          = {10.1007/978-3-642-15031-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AumassonHMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Jean{-}Philippe Aumasson and
                  Yann Laigle{-}Chapuy and
                  Ga{\"{e}}tan Leurent and
                  Willi Meier and
                  Thomas Peyrin},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Cryptanalysis of {ESSENCE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {134--152},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_8},
  doi          = {10.1007/978-3-642-13858-4\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KhovratovichNRS10,
  author       = {Dmitry Khovratovich and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Martin Schl{\"{a}}ffer},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Cryptanalysis of \emph{Luffa} v2 Components},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {388--409},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_26},
  doi          = {10.1007/978-3-642-19574-7\_26},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KhovratovichNRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naya-Plasencia10,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {How to Improve Rebound Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naya-Plasencia10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonBMNP09,
  author       = {Jean{-}Philippe Aumasson and
                  Eric Brier and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Inside the Hypercube},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {202--213},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_14},
  doi          = {10.1007/978-3-642-02620-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AumassonBMNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MatusiewiczNNSS09,
  author       = {Krystian Matusiewicz and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {Rebound Attack on the Full Lane Compression Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_7},
  doi          = {10.1007/978-3-642-10366-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MatusiewiczNNSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CanteautN09,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Computing the biases of parity-check relations},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2009,
                  June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  pages        = {290--294},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISIT.2009.5205423},
  doi          = {10.1109/ISIT.2009.5205423},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CanteautN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CanteautN09,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Internal collision attack on Maraca},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1953/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CanteautN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0904-4412,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Computing the biases of parity-check relations},
  journal      = {CoRR},
  volume       = {abs/0904.4412},
  year         = {2009},
  url          = {http://arxiv.org/abs/0904.4412},
  eprinttype    = {arXiv},
  eprint       = {0904.4412},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0904-4412.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09,
  author       = {Emmanuel Bresson and
                  Anne Canteaut and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Christophe Clavier and
                  Thomas Fuhr and
                  Aline Gouget and
                  Thomas Icart and
                  Jean{-}Fran{\c{c}}ois Misarsky and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Thomas Pornin and
                  Jean{-}Ren{\'{e}} Reinhard and
                  C{\'{e}}line Thuillet and
                  Marion Videau},
  title        = {Indifferentiability with Distinguishers: Why Shabal Does Not Require
                  Ideal Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naya-PlasenciaRALLMP09,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Jean{-}Philippe Aumasson and
                  Yann Laigle{-}Chapuy and
                  Ga{\"{e}}tan Leurent and
                  Willi Meier and
                  Thomas Peyrin},
  title        = {Cryptanalysis of {ESSENCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naya-PlasenciaRALLMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatusiewiczNNSS09,
  author       = {Krystian Matusiewicz and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Martin Schl{\"{a}}ffer},
  title        = {Rebound Attack on the Full {LANE} Compression Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatusiewiczNNSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonBMNP08,
  author       = {Jean{-}Philippe Aumasson and
                  Eric Brier and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Inside the Hypercube},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonBMNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-Plasencia07,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Alex Biryukov},
  title        = {Cryptanalysis of Achterbahn-128/80},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_5},
  doi          = {10.1007/978-3-540-74619-5\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-Plasencia07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/Naya-Plasencia07,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {142--152},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_12},
  doi          = {10.1007/978-3-540-88353-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/Naya-Plasencia07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0611033,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Cryptanalyse de Achterbahn-128/80},
  journal      = {CoRR},
  volume       = {abs/cs/0611033},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0611033},
  eprinttype    = {arXiv},
  eprint       = {cs/0611033},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0611033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics