María Naya-Plasencia
María Naya-Plasencia
INRIA Paris
Verified email at inria.fr - Homepage
TitleCited byYear
Quark: A lightweight hash.
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
CHES 6225, 1-15, 2010
2892010
Conditional differential cryptanalysis of NLFSR-based cryptosystems
S Knellwolf, W Meier, M Naya-Plasencia
Advances in Cryptology-ASIACRYPT 2010, 130-145, 2010
1122010
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia, FX Standaert
International Workshop on Cryptographic Hardware and Embedded Systems, 383-399, 2013
1072013
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
C Boura, M Naya-Plasencia, V Suder
ASIACRYPT (1) 8873, 179-199, 2014
1042014
Breaking Symmetric Cryptosystems Using Quantum Period Finding
M Kaplan, L Anthony, G Leurent, M Naya-Plasencia
Advances in Cryptology–CRYPTO 2016, 207, 0
89*
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
International Conference on Fast Software Encryption, 313-333, 2016
74*2016
Conditional differential cryptanalysis of trivium and KATAN
S Knellwolf, W Meier, M Naya-Plasencia
Selected Areas in Cryptography, 200-212, 2011
722011
Rebound Attack on the Full Lane Compression Function.
K Matusiewicz, M Naya-Plasencia, I Nikolic, Y Sasaki, M Schläffer
Asiacrypt 5912, 106-125, 2009
722009
Practical Analysis of Reduced-Round Keccak.
M Naya-Plasencia, A Röck, W Meier
INDOCRYPT 7107, 236-254, 2011
672011
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
63*2008
Sieve-in-the-Middle: Improved MITM Attacks
A Canteaut, M Naya-Plasencia, B Vayssière
Advances in Cryptology–CRYPTO 2013, 222-240, 2013
542013
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
542008
How to improve rebound attacks
M Naya-Plasencia
Advances in Cryptology–CRYPTO 2011, 188-205, 2011
502011
Multiple differential cryptanalysis of round-reduced PRINCE
A Canteaut, T Fuhr, H Gilbert, M Naya-Plasencia, JR Reinhard
International Workshop on Fast Software Encryption, 591-610, 2014
402014
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
M Minier, MA Naya-Plasencia
Information Processing Letters 112 (16), 624-629, 2012
402012
Improved Rebound Attack on the Finalist Grøstl
J Jean, M Naya-Plasencia, T Peyrin
40*
Cryptanalysis of full sprout
V Lallemand, M Naya-Plasencia
Annual Cryptology Conference, 663-682, 2015
342015
Inside the Hypercube.
JP Aumasson, E Brier, W Meier, M Naya-Plasencia, T Peyrin
ACISP 5594, 202-213, 2009
342009
Cryptanalysis of Luffa v2 components
D Khovratovich, M Naya-Plasencia, A Röck, M Schläffer
Selected Areas in Cryptography, 388-409, 2010
282010
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN.
JP Aumasson, M Naya-Plasencia, MJO Saarinen
INDOCRYPT 7107, 134-145, 2011
272011
The system can't perform the operation now. Try again later.
Articles 1–20