Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Céline Blondeau
@article{DBLP:journals/dcc/CivinoBS19, author = {Roberto Civino and C{\'{e}}line Blondeau and Massimiliano Sala}, title = {Differential attacks: using alternative operations}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {225--247}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0516-z}, doi = {10.1007/S10623-018-0516-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CivinoBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlondeauN17, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {319--349}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0268-6}, doi = {10.1007/S10623-016-0268-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlondeauN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlondeauLN17, author = {C{\'{e}}line Blondeau and Gregor Leander and Kaisa Nyberg}, title = {Differential-Linear Cryptanalysis Revisited}, journal = {J. Cryptol.}, volume = {30}, number = {3}, pages = {859--888}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9237-5}, doi = {10.1007/S00145-016-9237-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlondeauLN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Blondeau17, author = {C{\'{e}}line Blondeau}, title = {Accurate Estimate of the Advantage of Impossible Differential Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {169--191}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.169-191}, doi = {10.13154/TOSC.V2017.I3.169-191}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Blondeau17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauCS17, author = {C{\'{e}}line Blondeau and Roberto Civino and Massimiliano Sala}, title = {Differential Attacks: Using Alternative Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2017}, url = {http://eprint.iacr.org/2017/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BlondeauN16, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {162--191}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.162-191}, doi = {10.13154/TOSC.V2016.I2.162-191}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BlondeauN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/BlondeauN15, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Perfect nonlinear functions and cryptography}, journal = {Finite Fields Their Appl.}, volume = {32}, pages = {120--147}, year = {2015}, url = {https://doi.org/10.1016/j.ffa.2014.10.007}, doi = {10.1016/J.FFA.2014.10.007}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ffa/BlondeauN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Blondeau15, author = {C{\'{e}}line Blondeau}, title = {Impossible differential attack on 13-round Camellia-192}, journal = {Inf. Process. Lett.}, volume = {115}, number = {9}, pages = {660--666}, year = {2015}, url = {https://doi.org/10.1016/j.ipl.2015.03.008}, doi = {10.1016/J.IPL.2015.03.008}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Blondeau15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/SoleimanyBYWNZZ15, author = {Hadi Soleimany and C{\'{e}}line Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang}, title = {Reflection Cryptanalysis of PRINCE-Like Ciphers}, journal = {J. Cryptol.}, volume = {28}, number = {3}, pages = {718--744}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9175-4}, doi = {10.1007/S00145-013-9175-4}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/SoleimanyBYWNZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlondeauPW15, author = {C{\'{e}}line Blondeau and Thomas Peyrin and Lei Wang}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Known-Key Distinguisher on Full {PRESENT}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {455--474}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_22}, doi = {10.1007/978-3-662-47989-6\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BlondeauPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauBV15, author = {C{\'{e}}line Blondeau and Asl{\'{\i}} Bay and Serge Vaudenay}, editor = {Gregor Leander}, title = {Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {73--91}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_4}, doi = {10.1007/978-3-662-48116-5\_4}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauM15, author = {C{\'{e}}line Blondeau and Marine Minier}, editor = {Gregor Leander}, title = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {92--113}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_5}, doi = {10.1007/978-3-662-48116-5\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauM15, author = {C{\'{e}}line Blondeau and Marine Minier}, title = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2015}, url = {http://eprint.iacr.org/2015/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauN15, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {New Links Between Differential and Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2015}, url = {http://eprint.iacr.org/2015/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauN15a, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2015}, url = {http://eprint.iacr.org/2015/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauN15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauBV15, author = {C{\'{e}}line Blondeau and Asl{\'{\i}} Bay and Serge Vaudenay}, title = {Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2015}, url = {http://eprint.iacr.org/2015/380}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauPW15, author = {C{\'{e}}line Blondeau and Thomas Peyrin and Lei Wang}, title = {Known-key Distinguisher on Full {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2015}, url = {http://eprint.iacr.org/2015/575}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauN15b, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2015}, url = {http://eprint.iacr.org/2015/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauN15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlondeauP14, author = {C{\'{e}}line Blondeau and L{\'{e}}o Perrin}, title = {More differentially 6-uniform power functions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {487--505}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9948-2}, doi = {10.1007/S10623-014-9948-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlondeauP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BlondeauBW14, author = {C{\'{e}}line Blondeau and Andrey Bogdanov and Meiqin Wang}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {271--288}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_17}, doi = {10.1007/978-3-319-07536-5\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BlondeauBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlondeauN14, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {165--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_10}, doi = {10.1007/978-3-642-55220-5\_10}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlondeauN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauLN14, author = {C{\'{e}}line Blondeau and Gregor Leander and Kaisa Nyberg}, editor = {Carlos Cid and Christian Rechberger}, title = {Differential-Linear Cryptanalysis Revisited}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {411--430}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_21}, doi = {10.1007/978-3-662-46706-0\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlondeauBL13, author = {C{\'{e}}line Blondeau and Andrey Bogdanov and Gregor Leander}, editor = {Ran Canetti and Juan A. Garay}, title = {Bounds in Shallows and in Miseries}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {204--221}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_12}, doi = {10.1007/978-3-642-40041-4\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlondeauBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlondeauN13, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {New Links between Differential and Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {388--404}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_24}, doi = {10.1007/978-3-642-38348-9\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlondeauN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13, author = {Hadi Soleimany and C{\'{e}}line Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang}, editor = {Shiho Moriai}, title = {Reflection Cryptanalysis of PRINCE-Like Ciphers}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {71--91}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_5}, doi = {10.1007/978-3-662-43933-3\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Blondeau13, author = {C{\'{e}}line Blondeau}, editor = {Goutam Paul and Serge Vaudenay}, title = {Improbable Differential from Impossible Differential: On the Validity of the Model}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8250}, pages = {149--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03515-4\_10}, doi = {10.1007/978-3-319-03515-4\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Blondeau13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauBL13, author = {C{\'{e}}line Blondeau and Andrey Bogdanov and Gregor Leander}, title = {Bounds in Shallows and in Miseries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2013}, url = {http://eprint.iacr.org/2013/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/JarvinenBPT12, author = {Kimmo J{\"{a}}rvinen and C{\'{e}}line Blondeau and Dan Page and Michael Tunstall}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {72--82}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.13}, doi = {10.1109/FDTC.2012.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/JarvinenBPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BlondeauGN12, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard and Kaisa Nyberg}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Multiple Differential Cryptanalysis Using {LLR} and {\(\chi\)} 2 Statistics}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {343--360}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_19}, doi = {10.1007/978-3-642-32928-9\_19}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/BlondeauGN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauGN12, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard and Kaisa Nyberg}, title = {Multiple Differential Cryptanalysis using {\textbackslash}LLR and {\(\chi\)}\({}^{\mbox{2}}\) Statistics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2012}, url = {http://eprint.iacr.org/2012/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauGN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Blondeau11, author = {C{\'{e}}line Blondeau}, title = {La cryptanalyse diff{\'{e}}rentielle et ses g{\'{e}}n{\'{e}}ralisations. (Differential cryptanalysis and its generalizations)}, school = {Pierre and Marie Curie University, Paris, France}, year = {2011}, url = {https://tel.archives-ouvertes.fr/tel-00649842}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Blondeau11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlondeauGT11, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard and Jean{-}Pierre Tillich}, title = {Accurate estimates of the data complexity and success probability for various cryptanalyses}, journal = {Des. Codes Cryptogr.}, volume = {59}, number = {1-3}, pages = {3--34}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9452-2}, doi = {10.1007/S10623-010-9452-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlondeauGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BlondeauCC11, author = {C{\'{e}}line Blondeau and Anne Canteaut and Pascale Charpin}, title = {Differential Properties of {\textdollar}\{x{\textbackslash}mapsto x{\^{}}\{2{\^{}}\{t\}-1\}\}{\textdollar}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {12}, pages = {8127--8137}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2169129}, doi = {10.1109/TIT.2011.2169129}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BlondeauCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdelraheemBNVZ11, author = {Mohamed Ahmed Abdelraheem and C{\'{e}}line Blondeau and Mar{\'{\i}}a Naya{-}Plasencia and Marion Videau and Erik Zenner}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Cryptanalysis of {ARMADILLO2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {308--326}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_17}, doi = {10.1007/978-3-642-25385-0\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdelraheemBNVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauG11, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard}, editor = {Antoine Joux}, title = {Multiple Differential Cryptanalysis: Theory and Practice}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {35--54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_3}, doi = {10.1007/978-3-642-21702-9\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-4753, author = {C{\'{e}}line Blondeau and Anne Canteaut and Pascale Charpin}, title = {Differential properties of functions x -{\textgreater} x{\^{}}\{2{\^{}}t-1\} -- extended version}, journal = {CoRR}, volume = {abs/1108.4753}, year = {2011}, url = {http://arxiv.org/abs/1108.4753}, eprinttype = {arXiv}, eprint = {1108.4753}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-4753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauG11, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard}, title = {Multiple Differential Cryptanalysis: Theory and Practice (Corrected)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2011}, url = {http://eprint.iacr.org/2011/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemBNVZ11, author = {Mohamed Ahmed Abdelraheem and C{\'{e}}line Blondeau and Mar{\'{\i}}a Naya{-}Plasencia and Marion Videau and Erik Zenner}, title = {Cryptanalysis of {ARMADILLO2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2011}, url = {http://eprint.iacr.org/2011/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijicot/BlondeauCC10, author = {C{\'{e}}line Blondeau and Anne Canteaut and Pascale Charpin}, title = {Differential properties of power functions}, journal = {Int. J. Inf. Coding Theory}, volume = {1}, number = {2}, pages = {149--170}, year = {2010}, url = {https://doi.org/10.1504/IJICOT.2010.032132}, doi = {10.1504/IJICOT.2010.032132}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijicot/BlondeauCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BlondeauCC10, author = {C{\'{e}}line Blondeau and Anne Canteaut and Pascale Charpin}, title = {Differential properties of power functions}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings}, pages = {2478--2482}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIT.2010.5513437}, doi = {10.1109/ISIT.2010.5513437}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/BlondeauCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauG10, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard}, title = {Links Between Theoretical and Effective Differential Probabilities: Experiments on {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2010}, url = {http://eprint.iacr.org/2010/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauG09, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard}, title = {On the Data Complexity of Statistical Attacks Against Block Ciphers (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2009}, url = {http://eprint.iacr.org/2009/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.