What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
María Naya-Plasencia
Google Scholar
ORCID:
0000-0002-0059-5417
61
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
Block Cipher Doubling for a Post-Quantum World.
Ritam Bhaumik
André Chailloux
Paul Frixons
Bart Mennink
María Naya-Plasencia
2024
journals/tosc
On Impossible Boomerang Attacks Application to Simon and SKINNYee.
Xavier Bonnetain
Margarita Cordero
Virginie Lallemand
Marine Minier
María Naya-Plasencia
2024
conf/crypto
Cryptanalysis of Algebraic Verifiable Delay Functions.
Alex Biryukov
Ben Fisch
Gottfried Herold
Dmitry Khovratovich
Gaëtan Leurent
María Naya-Plasencia
Benjamin Wesolowski
2024
conf/eurocrypt
Improved Differential Meet-in-the-Middle Cryptanalysis.
Zahra Ahmadian
Akram Khalesi
Dounia M'foukh
Hossein Moghimi
María Naya-Plasencia
2024
conf/eurocrypt
A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool.
Christina Boura
Nicolas David
Patrick Derbez
Rachelle Heim Boissier
María Naya-Plasencia
2023
conf/crypto
Differential Meet-In-The-Middle Cryptanalysis.
Christina Boura
Nicolas David
Patrick Derbez
Gregor Leander
María Naya-Plasencia
2023
conf/eurocrypt
Better Steady than Speedy: Full Break of SPEEDY-7-192.
Christina Boura
Nicolas David
Rachelle Heim Boissier
María Naya-Plasencia
2022
journals/joc
Improved Differential-Linear Attacks with Applications to ARX Ciphers.
Christof Beierle
Marek Broll
Federico Canale
Nicolas David
Antonio Flórez-Gutiérrez
Gregor Leander
María Naya-Plasencia
Yosuke Todo
2022
conf/ctrsa
New Attacks from Old Distinguishers Improved Attacks on Serpent.
Marek Broll
Federico Canale
Nicolas David
Antonio Flórez-Gutiérrez
Gregor Leander
María Naya-Plasencia
Yosuke Todo
2021
journals/joc
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
Antonio Flórez-Gutiérrez
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
André Schrottenloher
Ferdinand Sibleyras
2021
conf/asiacrypt
QCB: Efficient Quantum-Secure Authenticated Encryption.
Ritam Bhaumik
Xavier Bonnetain
André Chailloux
Gaëtan Leurent
María Naya-Plasencia
André Schrottenloher
Yannick Seurin
2021
conf/asiacrypt
Quantum Linearization Attacks.
Xavier Bonnetain
Gaëtan Leurent
María Naya-Plasencia
André Schrottenloher
2021
conf/asiacrypt
Generic Framework for Key-Guessing Improvements.
Marek Broll
Federico Canale
Antonio Flórez-Gutiérrez
Gregor Leander
María Naya-Plasencia
2021
conf/sacrypt
Quantum Boomerang Attacks and Some Applications.
Paul Frixons
María Naya-Plasencia
André Schrottenloher
2020
journals/tosc
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.
Akinori Hosoyamada
María Naya-Plasencia
Yu Sasaki
2020
journals/tosc
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
Anne Canteaut
Sébastien Duval
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Thomas Pornin
André Schrottenloher
2020
conf/crypto
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Patrick Derbez
Paul Huynh
Virginie Lallemand
María Naya-Plasencia
Léo Perrin
André Schrottenloher
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2020
conf/eurocrypt
Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT.
Antonio Flórez-Gutiérrez
María Naya-Plasencia
2020
conf/eurocrypt
Optimal Merging in Quantum k-xor and k-xor-sum Algorithms.
María Naya-Plasencia
André Schrottenloher
2020
conf/asiacrypt
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions.
Antonio Flórez-Gutiérrez
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
André Schrottenloher
Ferdinand Sibleyras
2019
journals/tosc
Quantum Security Analysis of AES.
Xavier Bonnetain
María Naya-Plasencia
André Schrottenloher
2019
conf/asiacrypt
Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm.
Xavier Bonnetain
Akinori Hosoyamada
María Naya-Plasencia
Yu Sasaki
André Schrottenloher
2019
conf/sacrypt
On Quantum Slide Attacks.
Xavier Bonnetain
María Naya-Plasencia
André Schrottenloher
2018
journals/tosc
Preface to Volume 2018, Issue 1.
Florian Mendel
María Naya-Plasencia
2018
journals/tosc
State-Recovery Attacks on Modified Ketje Jr.
Thomas Fuhr
María Naya-Plasencia
Yann Rotella
2018
journals/joc
Making the Impossible Possible.
Christina Boura
Virginie Lallemand
María Naya-Plasencia
Valentin Suder
2018
journals/joc
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
Anne Canteaut
Sergiu Carpov
Caroline Fontaine
Tancrède Lepoint
María Naya-Plasencia
Pascal Paillier
Renaud Sirdey
2018
conf/asiacrypt
Quantum Algorithms for the k -xor Problem.
Lorenzo Grassi
María Naya-Plasencia
André Schrottenloher
2018
conf/asiacrypt
Hidden Shift Quantum Cryptanalysis and Implications.
Xavier Bonnetain
María Naya-Plasencia
2017
journals/tosc
Preface.
María Naya-Plasencia
Bart Preneel
2017
conf/asiacrypt
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.
André Chailloux
María Naya-Plasencia
André Schrottenloher
2016
journals/tosc
Quantum Differential and Linear Cryptanalysis.
Marc Kaplan
Gaëtan Leurent
Anthony Leverrier
María Naya-Plasencia
2016
conf/fse
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
Anne Canteaut
Sergiu Carpov
Caroline Fontaine
Tancrède Lepoint
María Naya-Plasencia
Pascal Paillier
Renaud Sirdey
2016
conf/crypto
Breaking Symmetric Cryptosystems Using Quantum Period Finding.
Marc Kaplan
Gaëtan Leurent
Anthony Leverrier
María Naya-Plasencia
2015
conf/crypto
Cryptanalysis of Full Sprout.
Virginie Lallemand
María Naya-Plasencia
2015
conf/sacrypt
Related-Key Attack on Full-Round PICARO.
Anne Canteaut
Virginie Lallemand
María Naya-Plasencia
2014
journals/joc
Improved Cryptanalysis of AES-like Permutations.
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2014
conf/fse
Cryptanalysis of KLEIN.
Virginie Lallemand
María Naya-Plasencia
2014
conf/fse
Multiple Differential Cryptanalysis of Round-Reduced PRINCE.
Anne Canteaut
Thomas Fuhr
Henri Gilbert
María Naya-Plasencia
Jean-René Reinhard
2014
conf/asiacrypt
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
Christina Boura
María Naya-Plasencia
Valentin Suder
2013
journals/joc
Quark: A Lightweight Hash.
Jean-Philippe Aumasson
Luca Henzen
Willi Meier
María Naya-Plasencia
2013
conf/crypto
Sieve-in-the-Middle: Improved MITM Attacks.
Anne Canteaut
María Naya-Plasencia
Bastien Vayssière
2013
conf/ches
Block Ciphers That Are Easier to Mask: How Far Can We Go?
Benoît Gérard
Vincent Grosso
María Naya-Plasencia
François-Xavier Standaert
2013
conf/sacrypt
Multiple Limited-Birthday Distinguishers and Applications.
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2012
conf/fse
Improved Rebound Attack on the Finalist Grøstl.
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2012
conf/fse
Practical Cryptanalysis of ARMADILLO2.
María Naya-Plasencia
Thomas Peyrin
2011
conf/fse
Analysis of Reduced-SHAvite-3-256 v2.
Marine Minier
María Naya-Plasencia
Thomas Peyrin
2011
conf/crypto
How to Improve Rebound Attacks.
María Naya-Plasencia
2011
conf/asiacrypt
Cryptanalysis of ARMADILLO2.
Mohamed Ahmed Abdelraheem
Céline Blondeau
María Naya-Plasencia
Marion Videau
Erik Zenner
2011
conf/asiacrypt
Rebound Attack on JH42.
María Naya-Plasencia
Deniz Toz
Kerem Varici
2011
conf/sacrypt
Improved Analysis of ECHO-256.
Jérémy Jean
María Naya-Plasencia
Martin Schläffer
2011
conf/sacrypt
Conditional Differential Cryptanalysis of Trivium and KATAN.
Simon Knellwolf
Willi Meier
María Naya-Plasencia
2010
conf/fse
Cryptanalysis of ESSENCE.
María Naya-Plasencia
Andrea Röck
Jean-Philippe Aumasson
Yann Laigle-Chapuy
Gaëtan Leurent
Willi Meier
Thomas Peyrin
2010
conf/ches
Quark: A Lightweight Hash.
Jean-Philippe Aumasson
Luca Henzen
Willi Meier
María Naya-Plasencia
2010
conf/asiacrypt
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.
Simon Knellwolf
Willi Meier
María Naya-Plasencia
2010
conf/africacrypt
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Praveen Gauravaram
Gaëtan Leurent
Florian Mendel
María Naya-Plasencia
Thomas Peyrin
Christian Rechberger
Martin Schläffer
2010
conf/sacrypt
v2 Components.
Dmitry Khovratovich
María Naya-Plasencia
Andrea Röck
Martin Schläffer
2009
conf/acisp
Inside the Hypercube.
Jean-Philippe Aumasson
Eric Brier
Willi Meier
María Naya-Plasencia
Thomas Peyrin
2009
conf/asiacrypt
Rebound Attack on the Full Lane Compression Function.
Krystian Matusiewicz
María Naya-Plasencia
Ivica Nikolic
Yu Sasaki
Martin Schläffer
2007
conf/fse
Cryptanalysis of Achterbahn-128/80.
María Naya-Plasencia
Coauthors
Akinori Hosoyamada
(2)
Akram Khalesi
(1)
Alex Biryukov
(1)
André Chailloux
(3)
André Schrottenloher
(13)
Andrea Röck
(2)
Anne Canteaut
(7)
Anthony Leverrier
(2)
Antonio Flórez-Gutiérrez
(6)
Bart Mennink
(1)
Bart Preneel
(1)
Bastien Vayssière
(1)
Ben Fisch
(1)
Benjamin Wesolowski
(1)
Benoît Gérard
(1)
Caroline Fontaine
(2)
Céline Blondeau
(1)
Christian Rechberger
(1)
Christina Boura
(5)
Christof Beierle
(1)
Deniz Toz
(1)
Dmitry Khovratovich
(2)
Dounia M'foukh
(1)
Eric Brier
(1)
Erik Zenner
(1)
Federico Canale
(3)
Ferdinand Sibleyras
(2)
Florian Mendel
(2)
François-Xavier Standaert
(1)
Friedrich Wiemer
(1)
Gaëtan Leurent
(11)
Gottfried Herold
(1)
Gregor Leander
(5)
Henri Gilbert
(1)
Hossein Moghimi
(1)
Itai Dinur
(1)
Ivica Nikolic
(1)
Jean-Philippe Aumasson
(4)
Jean-René Reinhard
(1)
Jérémy Jean
(4)
Kerem Varici
(1)
Krystian Matusiewicz
(1)
Léo Perrin
(5)
Lorenzo Grassi
(1)
Luca Henzen
(2)
Marc Kaplan
(2)
Marek Broll
(3)
Margarita Cordero
(1)
Maria Eichlseder
(1)
María Naya-Plasencia
(61)
Marine Minier
(2)
Marion Videau
(1)
Martin Schläffer
(4)
Mohamed Ahmed Abdelraheem
(1)
Nicolas David
(5)
Pascal Paillier
(2)
Patrick Derbez
(3)
Paul Frixons
(2)
Paul Huynh
(1)
Praveen Gauravaram
(1)
Rachelle Heim Boissier
(2)
Renaud Sirdey
(2)
Ritam Bhaumik
(2)
Sébastien Duval
(1)
Sergiu Carpov
(2)
Simon Knellwolf
(2)
Tancrède Lepoint
(2)
Thomas Fuhr
(2)
Thomas Peyrin
(8)
Thomas Pornin
(1)
Tim Beyne
(1)
Valentin Suder
(2)
Vincent Grosso
(1)
Virginie Lallemand
(6)
Willi Meier
(6)
Xavier Bonnetain
(7)
Yann Laigle-Chapuy
(1)
Yann Rotella
(1)
Yannick Seurin
(1)
Yosuke Todo
(3)
Yu Sasaki
(4)
Zahra Ahmadian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to