Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: María Naya-Plasencia
@article{DBLP:journals/iacr/BouraDDBN24, author = {Christina Boura and Nicolas David and Patrick Derbez and Rachelle Heim Boissier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {A generic algorithm for efficient key recovery in differential attacks - and its associated tool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2024}, url = {https://eprint.iacr.org/2024/288}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BouraDDBN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadianKMMN24, author = {Zahra Ahmadian and Akram Khalesi and Dounia M'foukh and Hossein Moghimi and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Improved Differential Meet-In-The-Middle Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2024}, url = {https://eprint.iacr.org/2024/351}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AhmadianKMMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BouraDDLN23, author = {Christina Boura and Nicolas David and Patrick Derbez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Differential Meet-In-The-Middle Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {240--272}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_9}, doi = {10.1007/978-3-031-38548-3\_9}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BouraDDLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BouraDBN23, author = {Christina Boura and Nicolas David and Rachelle Heim Boissier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Carmit Hazay and Martijn Stam}, title = {Better Steady than Speedy: Full Break of {SPEEDY-7-192}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {36--66}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_2}, doi = {10.1007/978-3-031-30634-1\_2}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BouraDBN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanaleN23, author = {Federico Canale and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Guessing Less and Better: Improved Attacks on {GIFT-64}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2023}, url = {https://eprint.iacr.org/2023/354}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanaleN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadianKMMN23, author = {Zahra Ahmadian and Akram Khalesi and Dounia M'foukh and Hossein Moghimi and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Truncated Differential Attacks: New Insights and 10-round Attacks on {QARMA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1449}, year = {2023}, url = {https://eprint.iacr.org/2023/1449}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadianKMMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BeierleBCDFLNT22, author = {Christof Beierle and Marek Broll and Federico Canale and Nicolas David and Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia and Yosuke Todo}, title = {Improved Differential-Linear Attacks with Applications to {ARX} Ciphers}, journal = {J. Cryptol.}, volume = {35}, number = {4}, pages = {29}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09437-z}, doi = {10.1007/S00145-022-09437-Z}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BeierleBCDFLNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BrollCDFLNT22, author = {Marek Broll and Federico Canale and Nicolas David and Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia and Yosuke Todo}, editor = {Steven D. Galbraith}, title = {New Attacks from Old Distinguishers Improved Attacks on Serpent}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {484--510}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_20}, doi = {10.1007/978-3-030-95312-6\_20}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BrollCDFLNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/LeanderMNSL22, author = {Nils Gregor Leander and Bart Mennink and Mar{\'{\i}}a Naya{-}Plasencia and Yu Sasaki and Eran Lambooij}, title = {Symmetric Cryptography (Dagstuhl Seminar 22141)}, journal = {Dagstuhl Reports}, volume = {12}, number = {4}, pages = {1--12}, year = {2022}, url = {https://doi.org/10.4230/DagRep.12.4.1}, doi = {10.4230/DAGREP.12.4.1}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/LeanderMNSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrixonsNS22, author = {Paul Frixons and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum Boomerang Attacks and Some Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2022}, url = {https://eprint.iacr.org/2022/060}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FrixonsNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidNS22, author = {Nicolas David and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum impossible differential attacks: Applications to {AES} and {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2022}, url = {https://eprint.iacr.org/2022/754}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DavidNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikCFN22, author = {Ritam Bhaumik and Andr{\'{e}} Chailloux and Paul Frixons and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Safely Doubling your Block Ciphers for a Post-Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1342}, year = {2022}, url = {https://eprint.iacr.org/2022/1342}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikCFN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraDBN22, author = {Christina Boura and Nicolas David and Rachelle Heim Boissier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Better Steady than Speedy: Full break of {SPEEDY-7-192}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1351}, year = {2022}, url = {https://eprint.iacr.org/2022/1351}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BouraDBN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraDDLN22, author = {Christina Boura and Nicolas David and Patrick Derbez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Differential Meet-In-The-Middle Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1640}, year = {2022}, url = {https://eprint.iacr.org/2022/1640}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BouraDDLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Florez-Gutierrez21, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher and Ferdinand Sibleyras}, title = {Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli}, journal = {J. Cryptol.}, volume = {34}, number = {4}, pages = {45}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09413-z}, doi = {10.1007/S00145-021-09413-Z}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Florez-Gutierrez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonnetainLNS21, author = {Xavier Bonnetain and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Quantum Linearization Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {422--452}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_15}, doi = {10.1007/978-3-030-92062-3\_15}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonnetainLNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BrollCFLN21, author = {Marek Broll and Federico Canale and Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Generic Framework for Key-Guessing Improvements}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {453--483}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_16}, doi = {10.1007/978-3-030-92062-3\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BrollCFLN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BhaumikBCLNSS21, author = {Ritam Bhaumik and Xavier Bonnetain and Andr{\'{e}} Chailloux and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher and Yannick Seurin}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {{QCB:} Efficient Quantum-Secure Authenticated Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {668--698}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_23}, doi = {10.1007/978-3-030-92062-3\_23}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BhaumikBCLNSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FrixonsNS21, author = {Paul Frixons and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Riham AlTawy and Andreas H{\"{u}}lsing}, title = {Quantum Boomerang Attacks and Some Applications}, booktitle = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13203}, pages = {332--352}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-99277-4\_16}, doi = {10.1007/978-3-030-99277-4\_16}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/FrixonsNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/JefferyMNS21, author = {Stacey Jeffery and Michele Mosca and Mar{\'{\i}}a Naya{-}Plasencia and Rainer Steinwandt}, title = {Quantum Cryptanalysis (Dagstuhl Seminar 21421)}, journal = {Dagstuhl Reports}, volume = {11}, number = {9}, pages = {64--79}, year = {2021}, url = {https://doi.org/10.4230/DagRep.11.9.64}, doi = {10.4230/DAGREP.11.9.64}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/JefferyMNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrollCDFLNT21, author = {Marek Broll and Federico Canale and Nicolas David and Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia and Yosuke Todo}, title = {Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {820}, year = {2021}, url = {https://eprint.iacr.org/2021/820}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrollCDFLNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrollCFLN21, author = {Marek Broll and Federico Canale and Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Generic Framework for Key-Guessing Improvements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1238}, year = {2021}, url = {https://eprint.iacr.org/2021/1238}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrollCFLN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainLNS21, author = {Xavier Bonnetain and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum Linearization Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2021}, url = {https://eprint.iacr.org/2021/1239}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainLNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HosoyamadaNS20, author = {Akinori Hosoyamada and Mar{\'{\i}}a Naya{-}Plasencia and Yu Sasaki}, title = {Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {147--172}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.147-172}, doi = {10.46586/TOSC.V2020.I4.147-172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HosoyamadaNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CanteautDLNPPS20, author = {Anne Canteaut and S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Thomas Pornin and Andr{\'{e}} Schrottenloher}, title = {Saturnin: a suite of lightweight symmetric algorithms for post-quantum security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {160--207}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.160-207}, doi = {10.13154/TOSC.V2020.IS1.160-207}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CanteautDLNPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Florez-Gutierrez20, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher and Ferdinand Sibleyras}, editor = {Shiho Moriai and Huaxiong Wang}, title = {New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {33--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_2}, doi = {10.1007/978-3-030-64837-4\_2}, timestamp = {Thu, 10 Dec 2020 09:57:08 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Florez-Gutierrez20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {299--328}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_11}, doi = {10.1007/978-3-030-56877-1\_11}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DerbezHLNPS20, author = {Patrick Derbez and Paul Huynh and Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {359--388}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_13}, doi = {10.1007/978-3-030-56877-1\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DerbezHLNPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Florez-Gutierrez20, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Anne Canteaut and Yuval Ishai}, title = {Improving Key-Recovery in Linear Attacks: Application to 28-Round {PRESENT}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {221--249}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_9}, doi = {10.1007/978-3-030-45721-1\_9}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Florez-Gutierrez20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Naya-PlasenciaS20, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Anne Canteaut and Yuval Ishai}, title = {Optimal Merging in Quantum k-xor and k-xor-sum Algorithms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {311--340}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_11}, doi = {10.1007/978-3-030-45724-2\_11}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Naya-PlasenciaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-12439, author = {Xavier Bonnetain and Akinori Hosoyamada and Mar{\'{\i}}a Naya{-}Plasencia and Yu Sasaki and Andr{\'{e}} Schrottenloher}, title = {Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm}, journal = {CoRR}, volume = {abs/2002.12439}, year = {2020}, url = {https://arxiv.org/abs/2002.12439}, eprinttype = {arXiv}, eprint = {2002.12439}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-12439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeyneCDELLNPSTW20, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, title = {Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2020}, url = {https://eprint.iacr.org/2020/188}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BeyneCDELLNPSTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerbezHLNPS20, author = {Patrick Derbez and Paul Huynh and Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher}, title = {Cryptanalysis Results on Spook}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2020}, url = {https://eprint.iacr.org/2020/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerbezHLNPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Florez-Gutierrez20, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher and Ferdinand Sibleyras}, title = {New results on Gimli: full-permutation distinguishers and improved collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2020}, url = {https://eprint.iacr.org/2020/744}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Florez-Gutierrez20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeyneCLNPW20, author = {Tim Beyne and Anne Canteaut and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Friedrich Wiemer}, title = {On the security of the Rescue hash function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {820}, year = {2020}, url = {https://eprint.iacr.org/2020/820}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeyneCLNPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaNS20, author = {Akinori Hosoyamada and Mar{\'{\i}}a Naya{-}Plasencia and Yu Sasaki}, title = {Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2020}, url = {https://eprint.iacr.org/2020/1089}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikBCLNSS20, author = {Ritam Bhaumik and Xavier Bonnetain and Andr{\'{e}} Chailloux and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher and Yannick Seurin}, title = {{QCB:} Efficient Quantum-secure Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1304}, year = {2020}, url = {https://eprint.iacr.org/2020/1304}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikBCLNSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BonnetainNS19, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum Security Analysis of {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {55--93}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.55-93}, doi = {10.13154/TOSC.V2019.I2.55-93}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BonnetainNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonnetainHNSS19, author = {Xavier Bonnetain and Akinori Hosoyamada and Mar{\'{\i}}a Naya{-}Plasencia and Yu Sasaki and Andr{\'{e}} Schrottenloher}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {552--583}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_20}, doi = {10.1007/978-3-030-34578-5\_20}, timestamp = {Tue, 26 Nov 2019 14:11:51 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonnetainHNSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BonnetainNS19, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {On Quantum Slide Attacks}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {492--519}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_20}, doi = {10.1007/978-3-030-38471-5\_20}, timestamp = {Mon, 28 Aug 2023 21:17:39 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BonnetainNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/MoscaNS19, author = {Michele Mosca and Mar{\'{\i}}a Naya{-}Plasencia and Rainer Steinwandt}, title = {Quantum Cryptanalysis (Dagstuhl Seminar 19421)}, journal = {Dagstuhl Reports}, volume = {9}, number = {10}, pages = {47--60}, year = {2019}, url = {https://doi.org/10.4230/DagRep.9.10.47}, doi = {10.4230/DAGREP.9.10.47}, timestamp = {Fri, 28 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/MoscaNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainNS19, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum Security Analysis of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2019}, url = {https://eprint.iacr.org/2019/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naya-PlasenciaS19, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Optimal Merging in Quantum k-xor and k-sum Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2019}, url = {https://eprint.iacr.org/2019/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naya-PlasenciaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainHNSS19, author = {Xavier Bonnetain and Akinori Hosoyamada and Mar{\'{\i}}a Naya{-}Plasencia and Yu Sasaki and Andr{\'{e}} Schrottenloher}, title = {Quantum Attacks without Superposition Queries: the Offline Simon Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2019}, url = {https://eprint.iacr.org/2019/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainHNSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BouraLNS18, author = {Christina Boura and Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia and Valentin Suder}, title = {Making the Impossible Possible}, journal = {J. Cryptol.}, volume = {31}, number = {1}, pages = {101--133}, year = {2018}, url = {https://doi.org/10.1007/s00145-016-9251-7}, doi = {10.1007/S00145-016-9251-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BouraLNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanteautCFLNPS18, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, title = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext Compression}, journal = {J. Cryptol.}, volume = {31}, number = {3}, pages = {885--916}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9273-9}, doi = {10.1007/S00145-017-9273-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanteautCFLNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MendelN18, author = {Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Preface to Volume 2018, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.1-4}, doi = {10.13154/TOSC.V2018.I1.1-4}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MendelN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FuhrNR18, author = {Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Yann Rotella}, title = {State-Recovery Attacks on Modified Ketje Jr}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {29--56}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.29-56}, doi = {10.13154/TOSC.V2018.I1.29-56}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GrassiNS18, author = {Lorenzo Grassi and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Quantum Algorithms for the k -xor Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11272}, pages = {527--559}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03326-2\_18}, doi = {10.1007/978-3-030-03326-2\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GrassiNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonnetainN18, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Hidden Shift Quantum Cryptanalysis and Implications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11272}, pages = {560--592}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03326-2\_19}, doi = {10.1007/978-3-030-03326-2\_19}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonnetainN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainN18, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Hidden Shift Quantum Cryptanalysis and Implications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2018}, url = {https://eprint.iacr.org/2018/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainNS18, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {On Quantum Slide Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1067}, year = {2018}, url = {https://eprint.iacr.org/2018/1067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Plasencia17, author = {Mar{\'{\i}}a Naya{-}Plasencia}, title = {Symmetric Cryptography for Long-Term Security}, year = {2017}, url = {https://tel.archives-ouvertes.fr/tel-01656036}, timestamp = {Mon, 30 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Plasencia17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Naya-PlasenciaP17, author = {Mar{\'{\i}}a Naya{-}Plasencia and Bart Preneel}, title = {Preface}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.1-3}, doi = {10.13154/TOSC.V2017.I1.1-3}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Naya-PlasenciaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChaillouxNS17, author = {Andr{\'{e}} Chailloux and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {211--240}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_8}, doi = {10.1007/978-3-319-70697-9\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChaillouxNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaillouxNS17, author = {Andr{\'{e}} Chailloux and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2017}, url = {http://eprint.iacr.org/2017/847}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaillouxNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Quantum Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {71--94}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.71-94}, doi = {10.13154/TOSC.V2016.I1.71-94}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Breaking Symmetric Cryptosystems Using Quantum Period Finding}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {207--237}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_8}, doi = {10.1007/978-3-662-53008-5\_8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, editor = {Thomas Peyrin}, title = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext Compression}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {313--333}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_16}, doi = {10.1007/978-3-662-52993-5\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Breaking Symmetric Cryptosystems using Quantum Period Finding}, journal = {CoRR}, volume = {abs/1602.05973}, year = {2016}, url = {http://arxiv.org/abs/1602.05973}, eprinttype = {arXiv}, eprint = {1602.05973}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LallemandN15, author = {Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Cryptanalysis of Full Sprout}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {663--682}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_32}, doi = {10.1007/978-3-662-47989-6\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LallemandN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CanteautLN15, author = {Anne Canteaut and Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Orr Dunkelman and Liam Keliher}, title = {Related-Key Attack on Full-Round {PICARO}}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {86--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_5}, doi = {10.1007/978-3-319-31301-6\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CanteautLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KaplanLLN15, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Quantum Differential and Linear Cryptanalysis}, journal = {CoRR}, volume = {abs/1510.05836}, year = {2015}, url = {http://arxiv.org/abs/1510.05836}, eprinttype = {arXiv}, eprint = {1510.05836}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KaplanLLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautCFLNPS15, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, title = {How to Compress Homomorphic Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2015}, url = {http://eprint.iacr.org/2015/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LallemandN15, author = {Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Cryptanalysis of Full Sprout}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2015}, url = {http://eprint.iacr.org/2015/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LallemandN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNP15, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Improved Cryptanalysis of AES-like Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2015}, url = {http://eprint.iacr.org/2015/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautLN15, author = {Anne Canteaut and Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Related-Key Attack on Full-Round {PICARO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2015}, url = {http://eprint.iacr.org/2015/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JeanNP14, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Improved Cryptanalysis of AES-like Permutations}, journal = {J. Cryptol.}, volume = {27}, number = {4}, pages = {772--798}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9156-7}, doi = {10.1007/S00145-013-9156-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JeanNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BouraNS14, author = {Christina Boura and Mar{\'{\i}}a Naya{-}Plasencia and Valentin Suder}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {179--199}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_10}, doi = {10.1007/978-3-662-45611-8\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BouraNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LallemandN14, author = {Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Carlos Cid and Christian Rechberger}, title = {Cryptanalysis of {KLEIN}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {451--470}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_23}, doi = {10.1007/978-3-662-46706-0\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LallemandN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Canteaut0GNR14, author = {Anne Canteaut and Thomas Fuhr and Henri Gilbert and Mar{\'{\i}}a Naya{-}Plasencia and Jean{-}Ren{\'{e}} Reinhard}, editor = {Carlos Cid and Christian Rechberger}, title = {Multiple Differential Cryptanalysis of Round-Reduced {PRINCE}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {591--610}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_30}, doi = {10.1007/978-3-662-46706-0\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Canteaut0GNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautFGNR14, author = {Anne Canteaut and Thomas Fuhr and Henri Gilbert and Mar{\'{\i}}a Naya{-}Plasencia and Jean{-}Ren{\'{e}} Reinhard}, title = {Multiple Di fferential Cryptanalysis of Round-Reduced {PRINCE} (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2014}, url = {http://eprint.iacr.org/2014/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautFGNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LallemandN14, author = {Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Cryptanalysis of {KLEIN} (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2014}, url = {http://eprint.iacr.org/2014/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LallemandN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraMNS14, author = {Christina Boura and Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Valentin Suder}, title = {Improved Impossible Differential Attacks against Round-Reduced LBlock}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2014}, url = {http://eprint.iacr.org/2014/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraMNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraNS14a, author = {Christina Boura and Mar{\'{\i}}a Naya{-}Plasencia and Valentin Suder}, title = {Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {699}, year = {2014}, url = {http://eprint.iacr.org/2014/699}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraNS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AumassonHMN13, author = {Jean{-}Philippe Aumasson and Luca Henzen and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Quark: {A} Lightweight Hash}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {313--339}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9125-6}, doi = {10.1007/S00145-012-9125-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AumassonHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GerardGNS13, author = {Beno{\^{\i}}t G{\'{e}}rard and Vincent Grosso and Mar{\'{\i}}a Naya{-}Plasencia and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Block Ciphers That Are Easier to Mask: How Far Can We Go?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {383--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_22}, doi = {10.1007/978-3-642-40349-1\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GerardGNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanteautNV13, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia and Bastien Vayssi{\`{e}}re}, editor = {Ran Canetti and Juan A. Garay}, title = {Sieve-in-the-Middle: Improved {MITM} Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {222--240}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_13}, doi = {10.1007/978-3-642-40041-4\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanteautNV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JeanNP13, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Multiple Limited-Birthday Distinguishers and Applications}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {533--550}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_27}, doi = {10.1007/978-3-662-43414-7\_27}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/JeanNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautNV13, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia and Bastien Vayssi{\`{e}}re}, title = {Sieve-in-the-Middle: Improved {MITM} Attacks (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2013}, url = {http://eprint.iacr.org/2013/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautNV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GerardGNS13, author = {Beno{\^{\i}}t G{\'{e}}rard and Vincent Grosso and Mar{\'{\i}}a Naya{-}Plasencia and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Block Ciphers that are Easier to Mask: How Far Can we Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2013}, url = {http://eprint.iacr.org/2013/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GerardGNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNP13, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Multiple Limited-Birthday Distinguishers and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2013}, url = {http://eprint.iacr.org/2013/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CanteautN12, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Correlation attacks on combination generators}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {147--171}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0069-3}, doi = {10.1007/S12095-012-0069-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CanteautN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MinierN12, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock}, journal = {Inf. Process. Lett.}, volume = {112}, number = {16}, pages = {624--629}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.04.012}, doi = {10.1016/J.IPL.2012.04.012}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MinierN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CanteautN12, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Parity-Check Relations on Combination Generators}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {6}, pages = {3900--3911}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2184736}, doi = {10.1109/TIT.2012.2184736}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CanteautN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanNP12, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Anne Canteaut}, title = {Improved Rebound Attack on the Finalist Gr{\o}stl}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {110--126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_7}, doi = {10.1007/978-3-642-34047-5\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/JeanNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-PlasenciaP12, author = {Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Anne Canteaut}, title = {Practical Cryptanalysis of {ARMADILLO2}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {146--162}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_9}, doi = {10.1007/978-3-642-34047-5\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-PlasenciaP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautFNPRV12, author = {Anne Canteaut and Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2012}, url = {http://eprint.iacr.org/2012/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Naya-PlasenciaTV11, author = {Mar{\'{\i}}a Naya{-}Plasencia and Deniz Toz and Kerem Varici}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Rebound Attack on {JH42}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {252--269}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_14}, doi = {10.1007/978-3-642-25385-0\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Naya-PlasenciaTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdelraheemBNVZ11, author = {Mohamed Ahmed Abdelraheem and C{\'{e}}line Blondeau and Mar{\'{\i}}a Naya{-}Plasencia and Marion Videau and Erik Zenner}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Cryptanalysis of {ARMADILLO2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {308--326}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_17}, doi = {10.1007/978-3-642-25385-0\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdelraheemBNVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Naya-Plasencia11, author = {Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Phillip Rogaway}, title = {How to Improve Rebound Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {188--205}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_11}, doi = {10.1007/978-3-642-22792-9\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Naya-Plasencia11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinierNP11, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Antoine Joux}, title = {Analysis of Reduced-SHAvite-3-256 v2}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {68--87}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_5}, doi = {10.1007/978-3-642-21702-9\_5}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MinierNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AumassonNS11, author = {Jean{-}Philippe Aumasson and Mar{\'{\i}}a Naya{-}Plasencia and Markku{-}Juhani O. Saarinen}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Practical Attack on 8 Rounds of the Lightweight Block Cipher {KLEIN}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {134--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_11}, doi = {10.1007/978-3-642-25578-6\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AumassonNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Naya-PlasenciaRM11, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Willi Meier}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Practical Analysis of Reduced-Round Keccak}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {236--254}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_18}, doi = {10.1007/978-3-642-25578-6\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Naya-PlasenciaRM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JeanNS11, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Martin Schl{\"{a}}ffer}, editor = {Ali Miri and Serge Vaudenay}, title = {Improved Analysis of {ECHO-256}}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {19--36}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_2}, doi = {10.1007/978-3-642-28496-0\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JeanNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KnellwolfMN11, author = {Simon Knellwolf and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Ali Miri and Serge Vaudenay}, title = {Conditional Differential Cryptanalysis of Trivium and {KATAN}}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {200--212}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_12}, doi = {10.1007/978-3-642-28496-0\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KnellwolfMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemBNVZ11, author = {Mohamed Ahmed Abdelraheem and C{\'{e}}line Blondeau and Mar{\'{\i}}a Naya{-}Plasencia and Marion Videau and Erik Zenner}, title = {Cryptanalysis of {ARMADILLO2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2011}, url = {http://eprint.iacr.org/2011/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinierNP11, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Analysis of reduced-SHAvite-3-256 v2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2011}, url = {http://eprint.iacr.org/2011/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinierNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNS11, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Martin Schl{\"{a}}ffer}, title = {Improved Analysis of {ECHO-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2011}, url = {http://eprint.iacr.org/2011/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GauravaramLMNPRS10, author = {Praveen Gauravaram and Ga{\"{e}}tan Leurent and Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin and Christian Rechberger and Martin Schl{\"{a}}ffer}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {419--436}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_25}, doi = {10.1007/978-3-642-12678-9\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/GauravaramLMNPRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnellwolfMN10, author = {Simon Knellwolf and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Masayuki Abe}, title = {Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {130--145}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_8}, doi = {10.1007/978-3-642-17373-8\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnellwolfMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AumassonHMN10, author = {Jean{-}Philippe Aumasson and Luca Henzen and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Quark: {A} Lightweight Hash}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {1--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_1}, doi = {10.1007/978-3-642-15031-9\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AumassonHMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Jean{-}Philippe Aumasson and Yann Laigle{-}Chapuy and Ga{\"{e}}tan Leurent and Willi Meier and Thomas Peyrin}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Cryptanalysis of {ESSENCE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {134--152}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_8}, doi = {10.1007/978-3-642-13858-4\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KhovratovichNRS10, author = {Dmitry Khovratovich and Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Martin Schl{\"{a}}ffer}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Cryptanalysis of \emph{Luffa} v2 Components}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {388--409}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_26}, doi = {10.1007/978-3-642-19574-7\_26}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/KhovratovichNRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naya-Plasencia10, author = {Mar{\'{\i}}a Naya{-}Plasencia}, title = {How to Improve Rebound Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2010}, url = {http://eprint.iacr.org/2010/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naya-Plasencia10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AumassonBMNP09, author = {Jean{-}Philippe Aumasson and Eric Brier and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Inside the Hypercube}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {202--213}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_14}, doi = {10.1007/978-3-642-02620-1\_14}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AumassonBMNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MatusiewiczNNSS09, author = {Krystian Matusiewicz and Mar{\'{\i}}a Naya{-}Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schl{\"{a}}ffer}, editor = {Mitsuru Matsui}, title = {Rebound Attack on the Full Lane Compression Function}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {106--125}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_7}, doi = {10.1007/978-3-642-10366-7\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MatusiewiczNNSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CanteautN09, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Computing the biases of parity-check relations}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings}, pages = {290--294}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISIT.2009.5205423}, doi = {10.1109/ISIT.2009.5205423}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/CanteautN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CanteautN09, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Internal collision attack on Maraca}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1953/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CanteautN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0904-4412, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Computing the biases of parity-check relations}, journal = {CoRR}, volume = {abs/0904.4412}, year = {2009}, url = {http://arxiv.org/abs/0904.4412}, eprinttype = {arXiv}, eprint = {0904.4412}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0904-4412.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09, author = {Emmanuel Bresson and Anne Canteaut and Beno{\^{\i}}t Chevallier{-}Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean{-}Fran{\c{c}}ois Misarsky and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Thomas Pornin and Jean{-}Ren{\'{e}} Reinhard and C{\'{e}}line Thuillet and Marion Videau}, title = {Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2009}, url = {http://eprint.iacr.org/2009/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naya-PlasenciaRALLMP09, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Jean{-}Philippe Aumasson and Yann Laigle{-}Chapuy and Ga{\"{e}}tan Leurent and Willi Meier and Thomas Peyrin}, title = {Cryptanalysis of {ESSENCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2009}, url = {http://eprint.iacr.org/2009/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naya-PlasenciaRALLMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatusiewiczNNSS09, author = {Krystian Matusiewicz and Mar{\'{\i}}a Naya{-}Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schl{\"{a}}ffer}, title = {Rebound Attack on the Full {LANE} Compression Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2009}, url = {http://eprint.iacr.org/2009/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatusiewiczNNSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonBMNP08, author = {Jean{-}Philippe Aumasson and Eric Brier and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Inside the Hypercube}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2008}, url = {http://eprint.iacr.org/2008/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonBMNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-Plasencia07, author = {Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Alex Biryukov}, title = {Cryptanalysis of Achterbahn-128/80}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {73--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_5}, doi = {10.1007/978-3-540-74619-5\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-Plasencia07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/Naya-Plasencia07, author = {Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {142--152}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_12}, doi = {10.1007/978-3-540-88353-1\_12}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/weworc/Naya-Plasencia07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0611033, author = {Mar{\'{\i}}a Naya{-}Plasencia}, title = {Cryptanalyse de Achterbahn-128/80}, journal = {CoRR}, volume = {abs/cs/0611033}, year = {2006}, url = {http://arxiv.org/abs/cs/0611033}, eprinttype = {arXiv}, eprint = {cs/0611033}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0611033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.