María Naya-Plasencia
María Naya-Plasencia
INRIA Paris
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Quark: A lightweight hash.
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
CHES 6225, 1-15, 2010
3322010
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia, FX Standaert
International Workshop on Cryptographic Hardware and Embedded Systems, 383-399, 2013
1342013
Breaking Symmetric Cryptosystems Using Quantum Period Finding
M Kaplan, L Anthony, G Leurent, M Naya-Plasencia
Advances in Cryptology–CRYPTO 2016, 207, 0
130*
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
C Boura, M Naya-Plasencia, V Suder
ASIACRYPT (1) 8873, 179-199, 2014
121*2014
Conditional differential cryptanalysis of NLFSR-based cryptosystems
S Knellwolf, W Meier, M Naya-Plasencia
Advances in Cryptology-ASIACRYPT 2010, 130-145, 2010
1202010
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
International Conference on Fast Software Encryption, 313-333, 2016
105*2016
Conditional differential cryptanalysis of trivium and KATAN
S Knellwolf, W Meier, M Naya-Plasencia
Selected Areas in Cryptography, 200-212, 2011
772011
Rebound Attack on the Full Lane Compression Function.
K Matusiewicz, M Naya-Plasencia, I Nikolic, Y Sasaki, M Schläffer
Asiacrypt 5912, 106-125, 2009
702009
Practical Analysis of Reduced-Round Keccak.
M Naya-Plasencia, A Röck, W Meier
INDOCRYPT 7107, 236-254, 2011
682011
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
63*2008
Sieve-in-the-Middle: Improved MITM Attacks
A Canteaut, M Naya-Plasencia, B Vayssière
Advances in Cryptology–CRYPTO 2013, 222-240, 2013
622013
How to improve rebound attacks
M Naya-Plasencia
Advances in Cryptology–CRYPTO 2011, 188-205, 2011
522011
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
522008
Improved Rebound Attack on the Finalist Grøstl
J Jean, M Naya-Plasencia, T Peyrin
47*
Quantum differential and linear cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
462015
Quantum Differential and Linear Cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
462015
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
M Minier, MA Naya-Plasencia
Information Processing Letters 112 (16), 624-629, 2012
422012
Cryptanalysis of full sprout
V Lallemand, M Naya-Plasencia
Annual Cryptology Conference, 663-682, 2015
412015
An efficient quantum collision search algorithm and implications on symmetric cryptography
A Chailloux, M Naya-Plasencia, A Schrottenloher
International Conference on the Theory and Application of Cryptology and …, 2017
382017
Multiple differential cryptanalysis of round-reduced PRINCE
A Canteaut, T Fuhr, H Gilbert, M Naya-Plasencia, JR Reinhard
International Workshop on Fast Software Encryption, 591-610, 2014
352014
The system can't perform the operation now. Try again later.
Articles 1–20