BibTeX records: Céline Blondeau

download as .bib file

@article{DBLP:journals/dcc/CivinoBS19,
  author       = {Roberto Civino and
                  C{\'{e}}line Blondeau and
                  Massimiliano Sala},
  title        = {Differential attacks: using alternative operations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {225--247},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0516-z},
  doi          = {10.1007/S10623-018-0516-Z},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CivinoBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlondeauN17,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Joint data and key distribution of simple, multiple, and multidimensional
                  linear cryptanalysis test statistic and its impact to data complexity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {319--349},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0268-6},
  doi          = {10.1007/S10623-016-0268-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlondeauN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlondeauLN17,
  author       = {C{\'{e}}line Blondeau and
                  Gregor Leander and
                  Kaisa Nyberg},
  title        = {Differential-Linear Cryptanalysis Revisited},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {3},
  pages        = {859--888},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9237-5},
  doi          = {10.1007/S00145-016-9237-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlondeauLN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Blondeau17,
  author       = {C{\'{e}}line Blondeau},
  title        = {Accurate Estimate of the Advantage of Impossible Differential Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {169--191},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.169-191},
  doi          = {10.13154/TOSC.V2017.I3.169-191},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Blondeau17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauCS17,
  author       = {C{\'{e}}line Blondeau and
                  Roberto Civino and
                  Massimiliano Sala},
  title        = {Differential Attacks: Using Alternative Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BlondeauN16,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Improved Parameter Estimates for Correlation and Capacity Deviates
                  in Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {162--191},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.162-191},
  doi          = {10.13154/TOSC.V2016.I2.162-191},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BlondeauN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/BlondeauN15,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Perfect nonlinear functions and cryptography},
  journal      = {Finite Fields Their Appl.},
  volume       = {32},
  pages        = {120--147},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ffa.2014.10.007},
  doi          = {10.1016/J.FFA.2014.10.007},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ffa/BlondeauN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Blondeau15,
  author       = {C{\'{e}}line Blondeau},
  title        = {Impossible differential attack on 13-round Camellia-192},
  journal      = {Inf. Process. Lett.},
  volume       = {115},
  number       = {9},
  pages        = {660--666},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ipl.2015.03.008},
  doi          = {10.1016/J.IPL.2015.03.008},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Blondeau15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/SoleimanyBYWNZZ15,
  author       = {Hadi Soleimany and
                  C{\'{e}}line Blondeau and
                  Xiaoli Yu and
                  Wenling Wu and
                  Kaisa Nyberg and
                  Huiling Zhang and
                  Lei Zhang and
                  Yanfeng Wang},
  title        = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {718--744},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9175-4},
  doi          = {10.1007/S00145-013-9175-4},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/SoleimanyBYWNZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlondeauPW15,
  author       = {C{\'{e}}line Blondeau and
                  Thomas Peyrin and
                  Lei Wang},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Known-Key Distinguisher on Full {PRESENT}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {455--474},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_22},
  doi          = {10.1007/978-3-662-47989-6\_22},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BlondeauPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauBV15,
  author       = {C{\'{e}}line Blondeau and
                  Asl{\'{\i}} Bay and
                  Serge Vaudenay},
  editor       = {Gregor Leander},
  title        = {Protecting Against Multidimensional Linear and Truncated Differential
                  Cryptanalysis by Decorrelation},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {73--91},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_4},
  doi          = {10.1007/978-3-662-48116-5\_4},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauM15,
  author       = {C{\'{e}}line Blondeau and
                  Marine Minier},
  editor       = {Gregor Leander},
  title        = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II
                  Generalized Feistel Networks Using the Matrix Method},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_5},
  doi          = {10.1007/978-3-662-48116-5\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauM15,
  author       = {C{\'{e}}line Blondeau and
                  Marine Minier},
  title        = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II
                  Generalized Feistel Networks using the Matrix Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauN15,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {New Links Between Differential and Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauN15a,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Links Between Truncated Differential and Multidimensional Linear Properties
                  of Block Ciphers and Underlying Attack Complexities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauN15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauBV15,
  author       = {C{\'{e}}line Blondeau and
                  Asl{\'{\i}} Bay and
                  Serge Vaudenay},
  title        = {Protecting against Multidimensional Linear and Truncated Differential
                  Cryptanalysis by Decorrelation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/380},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauPW15,
  author       = {C{\'{e}}line Blondeau and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {Known-key Distinguisher on Full {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/575},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauN15b,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic
                  and Its Impact to Data Complexity Estimates of Multiple/Multidimensional
                  Linear and Truncated Differential Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauN15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlondeauP14,
  author       = {C{\'{e}}line Blondeau and
                  L{\'{e}}o Perrin},
  title        = {More differentially 6-uniform power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {487--505},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9948-2},
  doi          = {10.1007/S10623-014-9948-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlondeauP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BlondeauBW14,
  author       = {C{\'{e}}line Blondeau and
                  Andrey Bogdanov and
                  Meiqin Wang},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {On the (In)Equivalence of Impossible Differential and Zero-Correlation
                  Distinguishers for Feistel- and Skipjack-Type Ciphers},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {271--288},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_17},
  doi          = {10.1007/978-3-319-07536-5\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BlondeauBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlondeauN14,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Links between Truncated Differential and Multidimensional Linear Properties
                  of Block Ciphers and Underlying Attack Complexities},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {165--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_10},
  doi          = {10.1007/978-3-642-55220-5\_10},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlondeauN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauLN14,
  author       = {C{\'{e}}line Blondeau and
                  Gregor Leander and
                  Kaisa Nyberg},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Differential-Linear Cryptanalysis Revisited},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {411--430},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_21},
  doi          = {10.1007/978-3-662-46706-0\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlondeauBL13,
  author       = {C{\'{e}}line Blondeau and
                  Andrey Bogdanov and
                  Gregor Leander},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Bounds in Shallows and in Miseries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_12},
  doi          = {10.1007/978-3-642-40041-4\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlondeauBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlondeauN13,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {New Links between Differential and Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {388--404},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_24},
  doi          = {10.1007/978-3-642-38348-9\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlondeauN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13,
  author       = {Hadi Soleimany and
                  C{\'{e}}line Blondeau and
                  Xiaoli Yu and
                  Wenling Wu and
                  Kaisa Nyberg and
                  Huiling Zhang and
                  Lei Zhang and
                  Yanfeng Wang},
  editor       = {Shiho Moriai},
  title        = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {71--91},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_5},
  doi          = {10.1007/978-3-662-43933-3\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Blondeau13,
  author       = {C{\'{e}}line Blondeau},
  editor       = {Goutam Paul and
                  Serge Vaudenay},
  title        = {Improbable Differential from Impossible Differential: On the Validity
                  of the Model},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
                  on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8250},
  pages        = {149--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03515-4\_10},
  doi          = {10.1007/978-3-319-03515-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Blondeau13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauBL13,
  author       = {C{\'{e}}line Blondeau and
                  Andrey Bogdanov and
                  Gregor Leander},
  title        = {Bounds in Shallows and in Miseries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/JarvinenBPT12,
  author       = {Kimmo J{\"{a}}rvinen and
                  C{\'{e}}line Blondeau and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {72--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.13},
  doi          = {10.1109/FDTC.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/JarvinenBPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BlondeauGN12,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Kaisa Nyberg},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Multiple Differential Cryptanalysis Using {LLR} and {\(\chi\)} 2 Statistics},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {343--360},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_19},
  doi          = {10.1007/978-3-642-32928-9\_19},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BlondeauGN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauGN12,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Kaisa Nyberg},
  title        = {Multiple Differential Cryptanalysis using {\textbackslash}LLR and
                  {\(\chi\)}\({}^{\mbox{2}}\) Statistics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauGN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Blondeau11,
  author       = {C{\'{e}}line Blondeau},
  title        = {La cryptanalyse diff{\'{e}}rentielle et ses g{\'{e}}n{\'{e}}ralisations.
                  (Differential cryptanalysis and its generalizations)},
  school       = {Pierre and Marie Curie University, Paris, France},
  year         = {2011},
  url          = {https://tel.archives-ouvertes.fr/tel-00649842},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Blondeau11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlondeauGT11,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Jean{-}Pierre Tillich},
  title        = {Accurate estimates of the data complexity and success probability
                  for various cryptanalyses},
  journal      = {Des. Codes Cryptogr.},
  volume       = {59},
  number       = {1-3},
  pages        = {3--34},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9452-2},
  doi          = {10.1007/S10623-010-9452-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlondeauGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BlondeauCC11,
  author       = {C{\'{e}}line Blondeau and
                  Anne Canteaut and
                  Pascale Charpin},
  title        = {Differential Properties of {\textdollar}\{x{\textbackslash}mapsto
                  x{\^{}}\{2{\^{}}\{t\}-1\}\}{\textdollar}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {12},
  pages        = {8127--8137},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2169129},
  doi          = {10.1109/TIT.2011.2169129},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BlondeauCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdelraheemBNVZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  C{\'{e}}line Blondeau and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Marion Videau and
                  Erik Zenner},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of {ARMADILLO2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_17},
  doi          = {10.1007/978-3-642-25385-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdelraheemBNVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauG11,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard},
  editor       = {Antoine Joux},
  title        = {Multiple Differential Cryptanalysis: Theory and Practice},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {35--54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_3},
  doi          = {10.1007/978-3-642-21702-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1108-4753,
  author       = {C{\'{e}}line Blondeau and
                  Anne Canteaut and
                  Pascale Charpin},
  title        = {Differential properties of functions x -{\textgreater} x{\^{}}\{2{\^{}}t-1\}
                  -- extended version},
  journal      = {CoRR},
  volume       = {abs/1108.4753},
  year         = {2011},
  url          = {http://arxiv.org/abs/1108.4753},
  eprinttype    = {arXiv},
  eprint       = {1108.4753},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1108-4753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauG11,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard},
  title        = {Multiple Differential Cryptanalysis: Theory and Practice (Corrected)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemBNVZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  C{\'{e}}line Blondeau and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Marion Videau and
                  Erik Zenner},
  title        = {Cryptanalysis of {ARMADILLO2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijicot/BlondeauCC10,
  author       = {C{\'{e}}line Blondeau and
                  Anne Canteaut and
                  Pascale Charpin},
  title        = {Differential properties of power functions},
  journal      = {Int. J. Inf. Coding Theory},
  volume       = {1},
  number       = {2},
  pages        = {149--170},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICOT.2010.032132},
  doi          = {10.1504/IJICOT.2010.032132},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijicot/BlondeauCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BlondeauCC10,
  author       = {C{\'{e}}line Blondeau and
                  Anne Canteaut and
                  Pascale Charpin},
  title        = {Differential properties of power functions},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2010,
                  June 13-18, 2010, Austin, Texas, USA, Proceedings},
  pages        = {2478--2482},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIT.2010.5513437},
  doi          = {10.1109/ISIT.2010.5513437},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BlondeauCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauG10,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard},
  title        = {Links Between Theoretical and Effective Differential Probabilities:
                  Experiments on {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauG09,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard},
  title        = {On the Data Complexity of Statistical Attacks Against Block Ciphers
                  (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics