Follow
María Naya-Plasencia
María Naya-Plasencia
INRIA Paris
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Quark: A lightweight hash.
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
CHES 6225, 1-15, 2010
4052010
Breaking Symmetric Cryptosystems Using Quantum Period Finding
M Kaplan, L Anthony, G Leurent, M Naya-Plasencia
Advances in Cryptology–CRYPTO 2016, 207, 0
242*
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia, FX Standaert
International Workshop on Cryptographic Hardware and Embedded Systems, 383-399, 2013
1752013
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
International Conference on Fast Software Encryption, 313-333, 2016
1732016
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
C Boura, M Naya-Plasencia, V Suder
ASIACRYPT (1) 8873, 179-199, 2014
1502014
Conditional differential cryptanalysis of NLFSR-based cryptosystems
S Knellwolf, W Meier, M Naya-Plasencia
Advances in Cryptology-ASIACRYPT 2010, 130-145, 2010
1372010
Quantum differential and linear cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
972015
Quantum Differential and Linear Cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
972015
Quantum Security Analysis of AES
X Bonnetain, M Naya-Plasencia, A Schrottenloher
87*
Conditional differential cryptanalysis of trivium and KATAN
S Knellwolf, W Meier, M Naya-Plasencia
Selected Areas in Cryptography, 200-212, 2011
842011
An efficient quantum collision search algorithm and implications on symmetric cryptography
A Chailloux, M Naya-Plasencia, A Schrottenloher
International Conference on the Theory and Application of Cryptology and …, 2017
822017
Sieve-in-the-Middle: Improved MITM Attacks
A Canteaut, M Naya-Plasencia, B Vayssière
Advances in Cryptology–CRYPTO 2013, 222-240, 2013
782013
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
74*2008
Practical Analysis of Reduced-Round Keccak.
M Naya-Plasencia, A Röck, W Meier
INDOCRYPT 7107, 236-254, 2011
732011
Rebound Attack on the Full Lane Compression Function.
K Matusiewicz, M Naya-Plasencia, I Nikolic, Y Sasaki, M Schläffer
Asiacrypt 5912, 106-125, 2009
682009
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm
X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ...
62*
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
582008
How to improve rebound attacks
M Naya-Plasencia
Advances in Cryptology–CRYPTO 2011, 188-205, 2011
542011
Cryptanalysis of full sprout
V Lallemand, M Naya-Plasencia
Annual Cryptology Conference, 663-682, 2015
502015
Multiple differential cryptanalysis of round-reduced PRINCE
A Canteaut, T Fuhr, H Gilbert, M Naya-Plasencia, JR Reinhard
International Workshop on Fast Software Encryption, 591-610, 2014
502014
The system can't perform the operation now. Try again later.
Articles 1–20