Follow
Valentin SUDER
Valentin SUDER
University of Rouen Normandy
Verified email at suder.xyz - Homepage
Title
Cited by
Cited by
Year
The Simeck Family of Lightweight Block Ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
International Workshop on Cryptographic Hardware and Embedded Systems, 307-329, 2015
2592015
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
C Boura, M Naya-Plasencia, V Suder
International Conference on the Theory and Application of Cryptology and …, 2014
1512014
Making the impossible possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31 (1), 101-133, 2018
432018
Collision attacks against CAESAR candidates
T Fuhr, G Leurent, V Suder
International Conference on the Theory and Application of Cryptology and …, 2015
382015
Sparse permutations with low differential uniformity
P Charpin, GM Kyureghyan, V Suder
Finite Fields and Their Applications 28, 214-243, 2014
242014
Improved impossible differential attacks against round-reduced LBlock
C Boura, M Minier, M Naya-Plasencia, V Suder
IACR Cryptology ePrint Archive, 2014
212014
On inversion in Z2n− 1
GM Kyureghyan, V Suder
Finite Fields and Their Applications 25, 234-254, 2014
182014
Two notions of differential equivalence on Sboxes
C Boura, A Canteaut, J Jean, V Suder
Designs, Codes and Cryptography 87 (2), 185-202, 2019
162019
On inverses of APN exponents
GM Kyureghyan, V Suder
2012 IEEE International Symposium on Information Theory Proceedings, 1207-1211, 2012
162012
Key Recovery Attack Against 2.5-Round -Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
International Conference on Fast Software Encryption, 535-553, 2016
102016
Antiderivative functions over F 2 n
V Suder
Designs, Codes and Cryptography 82 (1), 435-447, 2017
52017
Forgery and key-recovery attacks on caesar candidate marble
T Fuhr, G Leurent, V Suder
Cryptography & Security, 2015
52015
On Inversion in Z_ {2^ n-1}
V Suder, G Kyureghyan
The 11th International Conference on Finite Fields and their Applications-Fq11, 2013
12013
F 2 n→ F 2 n Functions with Fast Points
V Suder
Fq14 International COnference on Finite FIelds and their Applications, 2019
2019
Differential Equivalences on SBoxes
V Suder, C Boura, A Canteaut, J Jean
CAEN2018, Cryptography and Algorithmic Number Theory, 2018
2018
On Sboxes sharing the same DDT
C Boura, A Canteaut, J Jean, V Suder
Dagstuhl Seminar 18021 Symmetric Cryptography, 2018
2018
Propriétés Différentielles des Permutations et Application en Cryptographie Symétrique
V Suder
Université Pierre et Marie Curie, 2014
2014
Valentin Suder-Sparse Permutations with Low Differential Uniformity
V Suder, F Bastien
2014
Sparse Permutations with Low Differential Uniformity1
V Suder, P Charpin, G Kyureghyan
On Inverses of APN Exponents
V Suder
The system can't perform the operation now. Try again later.
Articles 1–20