Higher-Order Differential Properties of Keccak and Luffa C Boura, A Canteaut, CD Cannière International Workshop on Fast Software Encryption, 252-269, 2011 | 182 | 2011 |
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon C Boura, M Naya-Plasencia, V Suder International Conference on the Theory and Application of Cryptology and …, 2014 | 151 | 2014 |
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 C Boura, A Canteaut International Workshop on Selected Areas in Cryptography, 1-17, 2010 | 75 | 2010 |
On the Influence of the Algebraic Degree ofon the Algebraic Degree of C Boura, A Canteaut IEEE Transactions on Information Theory 59 (1), 691-702, 2012 | 65 | 2012 |
On the boomerang uniformity of cryptographic sboxes C Boura, A Canteaut IACR Transactions on Symmetric Cryptology, 290-310, 2018 | 64 | 2018 |
Another view of the division property C Boura, A Canteaut Annual International Cryptology Conference, 654-682, 2016 | 58 | 2016 |
Chimera: Combining ring-lwe-based fully homomorphic encryption schemes C Boura, N Gama, M Georgieva, D Jetchev Journal of Mathematical Cryptology 14 (1), 316-338, 2020 | 50 | 2020 |
Making the impossible possible C Boura, V Lallemand, M Naya-Plasencia, V Suder Journal of Cryptology 31 (1), 101-133, 2018 | 45 | 2018 |
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning. C Boura, N Gama, M Georgieva IACR Cryptol. ePrint Arch. 2018, 758, 2018 | 39 | 2018 |
Key difference invariant bias in block ciphers A Bogdanov, C Boura, V Rijmen, M Wang, L Wen, J Zhao International Conference on the Theory and Application of Cryptology and …, 2013 | 38 | 2013 |
A zero-sum property for the Keccak-f permutation with 18 rounds C Boura, A Canteaut 2010 IEEE International Symposium on Information Theory, 2488-2492, 2010 | 38 | 2010 |
Simulating homomorphic evaluation of deep learning predictions C Boura, N Gama, M Georgieva, D Jetchev International Symposium on Cyber Security Cryptography and Machine Learning …, 2019 | 22 | 2019 |
Improved impossible differential attacks against round-reduced LBlock C Boura, M Minier, M Naya-Plasencia, V Suder IACR Cryptology ePrint Archive, 2014 | 21 | 2014 |
High-precision privacy-preserving real-valued function evaluation C Boura, I Chillotti, N Gama, D Jetchev, S Peceny, A Petric International Conference on Financial Cryptography and Data Security, 183-202, 2018 | 18 | 2018 |
Efficient MILP modelings for sboxes and linear layers of SPN ciphers C Boura, D Coggia IACR Transactions on Symmetric Cryptology, 327-361, 2020 | 17 | 2020 |
Two notions of differential equivalence on Sboxes C Boura, A Canteaut, J Jean, V Suder Designs, Codes and Cryptography 87 (2), 185-202, 2019 | 16 | 2019 |
A general proof framework for recent AES distinguishers C Boura, A Canteaut, D Coggia IACR Transactions on Symmetric Cryptology, 170-191, 2019 | 14 | 2019 |
Reflection ciphers C Boura, A Canteaut, LR Knudsen, G Leander Designs, Codes and Cryptography 82 (1), 3-25, 2017 | 13 | 2017 |
The BMM symmetrising trace conjecture for groups G4, G5, G6, G7, G8 C Boura, E Chavli, M Chlouveraki, K Karvounis Journal of Symbolic Computation 96, 62-84, 2020 | 12 | 2020 |
Side-channel analysis of Grøstl and Skein C Boura, S Lévêque, D Vigilant 2012 IEEE Symposium on Security and Privacy Workshops, 16-26, 2012 | 12 | 2012 |