What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Anne Canteaut
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Observations on TETRA Encryption Algorithm TEA-3.
Jens Alich
Amund Askeland
Subhadeep Banik
Tim Beyne
Anne Canteaut
Patrick Felke
Gregor Leander
Willi Meier
Lukas Stennes
2025
conf/crypto
Transistor: a TFHE-Friendly Stream Cipher.
Jules Baudrin
Sonia Belaïd
Nicolas Bon
Christina Boura
Anne Canteaut
Gaëtan Leurent
Pascal Paillier
Léo Perrin
Matthieu Rivain
Yann Rotella
Samuel Tap
2023
journals/tosc
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES.
Aurélien Boeuf
Anne Canteaut
Léo Perrin
2022
journals/tosc
Practical Cube Attack against Nonce-Misused Ascon.
Jules Baudrin
Anne Canteaut
Léo Perrin
2021
conf/latincrypt
Autocorrelations of Vectorial Boolean Functions.
Anne Canteaut
Lukas Kölsch
Chao Li
Chunlei Li
Kangquan Li
Longjiang Qu
Friedrich Wiemer
2020
journals/tosc
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
Anne Canteaut
Sébastien Duval
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Thomas Pornin
André Schrottenloher
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2019
journals/tosc
A General Proof Framework for Recent AES Distinguishers.
Christina Boura
Anne Canteaut
Daniel Coggia
2019
conf/eurocrypt
bison Instantiating the Whitened Swap-Or-Not Construction.
Anne Canteaut
Virginie Lallemand
Gregor Leander
Patrick Neumann
Friedrich Wiemer
2018
journals/tosc
Nonlinear Approximations in Cryptanalysis Revisited.
Christof Beierle
Anne Canteaut
Gregor Leander
2018
journals/tosc
On the Boomerang Uniformity of Cryptographic Sboxes.
Christina Boura
Anne Canteaut
2018
journals/joc
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
Anne Canteaut
Sergiu Carpov
Caroline Fontaine
Tancrède Lepoint
María Naya-Plasencia
Pascal Paillier
Renaud Sirdey
2017
journals/tosc
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
Anne Canteaut
Eran Lambooij
Samuel Neves
Shahram Rasoolzadeh
Yu Sasaki
Marc Stevens
2017
conf/crypto
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants.
Christof Beierle
Anne Canteaut
Gregor Leander
Yann Rotella
2016
conf/fse
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
Anne Canteaut
Sergiu Carpov
Caroline Fontaine
Tancrède Lepoint
María Naya-Plasencia
Pascal Paillier
Renaud Sirdey
2016
conf/fse
Attacks Against Filter Generators Exploiting Monomial Mappings.
Anne Canteaut
Yann Rotella
2016
conf/crypto
Another View of the Division Property.
Christina Boura
Anne Canteaut
2015
conf/eurocrypt
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks.
Anne Canteaut
Joëlle Roué
2015
conf/sacrypt
Related-Key Attack on Full-Round PICARO.
Anne Canteaut
Virginie Lallemand
María Naya-Plasencia
2015
conf/sacrypt
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures.
Anne Canteaut
Sébastien Duval
Gaëtan Leurent
2014
conf/fse
Multiple Differential Cryptanalysis of Round-Reduced PRINCE.
Anne Canteaut
Thomas Fuhr
Henri Gilbert
María Naya-Plasencia
Jean-René Reinhard
2013
conf/fse
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.
Christina Boura
Anne Canteaut
2013
conf/crypto
Sieve-in-the-Middle: Improved MITM Attacks.
Anne Canteaut
María Naya-Plasencia
Bastien Vayssière
2012
conf/asiacrypt
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Julia Borghoff
Anne Canteaut
Tim Güneysu
Elif Bilge Kavun
Miroslav Knezevic
Lars R. Knudsen
Gregor Leander
Ventzislav Nikov
Christof Paar
Christian Rechberger
Peter Rombouts
Søren S. Thomsen
Tolga Yalçin
2011
conf/fse
.
Christina Boura
Anne Canteaut
Christophe De Cannière
2010
conf/sacrypt
and Hamsi-256.
Christina Boura
Anne Canteaut
2002
conf/eurocrypt
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis.
Anne Canteaut
Marion Videau
2000
conf/fse
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators.
Anne Canteaut
Eric Filiol
2000
conf/eurocrypt
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5.
Anne Canteaut
Michaël Trabbia
2000
conf/eurocrypt
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Anne Canteaut
Claude Carlet
Pascale Charpin
Caroline Fontaine
1999
conf/fse
A New Characterization of Almost Bent Functions.
Anne Canteaut
Pascale Charpin
Hans Dobbertin
1998
conf/asiacrypt
Cryptanalysis of the Original McEliece Cryptosystem.
Anne Canteaut
Nicolas Sendrier
1996
conf/crypto
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations.
Paul Camion
Anne Canteaut
1996
conf/eurocrypt
Construction of t-Resilient Functions over a Finite Alphabet.
Paul Camion
Anne Canteaut
Coauthors
Amund Askeland
(1)
André Schrottenloher
(1)
Anne Canteaut
(34)
Aurélien Boeuf
(1)
Bastien Vayssière
(1)
Caroline Fontaine
(3)
Chao Li
(1)
Christian Rechberger
(1)
Christina Boura
(7)
Christof Beierle
(2)
Christof Paar
(1)
Christophe De Cannière
(1)
Chunlei Li
(1)
Claude Carlet
(1)
Daniel Coggia
(1)
Elif Bilge Kavun
(1)
Eran Lambooij
(1)
Eric Filiol
(1)
Friedrich Wiemer
(3)
Gaëtan Leurent
(4)
Gregor Leander
(6)
Hans Dobbertin
(1)
Henri Gilbert
(1)
Itai Dinur
(1)
Jean-René Reinhard
(1)
Jens Alich
(1)
Joëlle Roué
(1)
Jules Baudrin
(2)
Julia Borghoff
(1)
Kangquan Li
(1)
Lars R. Knudsen
(1)
Léo Perrin
(5)
Longjiang Qu
(1)
Lukas Kölsch
(1)
Lukas Stennes
(1)
Marc Stevens
(1)
Maria Eichlseder
(1)
María Naya-Plasencia
(7)
Marion Videau
(1)
Matthieu Rivain
(1)
Michaël Trabbia
(1)
Miroslav Knezevic
(1)
Nicolas Bon
(1)
Nicolas Sendrier
(1)
Pascal Paillier
(3)
Pascale Charpin
(2)
Patrick Felke
(1)
Patrick Neumann
(1)
Paul Camion
(2)
Peter Rombouts
(1)
Renaud Sirdey
(2)
Samuel Neves
(1)
Samuel Tap
(1)
Sébastien Duval
(2)
Sergiu Carpov
(2)
Shahram Rasoolzadeh
(1)
Sonia Belaïd
(1)
Subhadeep Banik
(1)
Søren S. Thomsen
(1)
Tancrède Lepoint
(2)
Thomas Fuhr
(1)
Thomas Pornin
(1)
Tim Beyne
(2)
Tim Güneysu
(1)
Tolga Yalçin
(1)
Ventzislav Nikov
(1)
Virginie Lallemand
(2)
Willi Meier
(1)
Yann Rotella
(3)
Yosuke Todo
(1)
Yu Sasaki
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to