Follow
María Naya-Plasencia
María Naya-Plasencia
INRIA Paris
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Quark: A lightweight hash.
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
CHES 6225, 1-15, 2010
4322010
Breaking Symmetric Cryptosystems Using Quantum Period Finding
M Kaplan, L Anthony, G Leurent, M Naya-Plasencia
Advances in Cryptology–CRYPTO 2016, 207, 0
270*
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
International Conference on Fast Software Encryption, 313-333, 2016
1852016
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia, FX Standaert
International Workshop on Cryptographic Hardware and Embedded Systems, 383-399, 2013
1812013
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.
C Boura, M Naya-Plasencia, V Suder
ASIACRYPT (1) 8873, 179-199, 2014
1582014
Conditional differential cryptanalysis of NLFSR-based cryptosystems
S Knellwolf, W Meier, M Naya-Plasencia
Advances in Cryptology-ASIACRYPT 2010, 130-145, 2010
1482010
Quantum differential and linear cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
1122015
Quantum Differential and Linear Cryptanalysis
M Kaplan, G Leurent, A Leverrier, M Naya-Plasencia
arXiv preprint arXiv:1510.05836, 2015
1122015
Quantum Security Analysis of AES
X Bonnetain, M Naya-Plasencia, A Schrottenloher
96*
An efficient quantum collision search algorithm and implications on symmetric cryptography
A Chailloux, M Naya-Plasencia, A Schrottenloher
International Conference on the Theory and Application of Cryptology and …, 2017
942017
Sieve-in-the-Middle: Improved MITM Attacks
A Canteaut, M Naya-Plasencia, B Vayssière
Advances in Cryptology–CRYPTO 2013, 222-240, 2013
872013
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm
X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ...
87*
Conditional differential cryptanalysis of trivium and KATAN
S Knellwolf, W Meier, M Naya-Plasencia
Selected Areas in Cryptography, 200-212, 2011
862011
Practical Analysis of Reduced-Round Keccak.
M Naya-Plasencia, A Röck, W Meier
INDOCRYPT 7107, 236-254, 2011
782011
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
74*2008
Rebound Attack on the Full Lane Compression Function.
K Matusiewicz, M Naya-Plasencia, I Nikolic, Y Sasaki, M Schläffer
Asiacrypt 5912, 106-125, 2009
692009
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
592008
Making the Impossible Possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31 (1), 101-133, 2018
572018
How to improve rebound attacks
M Naya-Plasencia
Advances in Cryptology–CRYPTO 2011, 188-205, 2011
562011
Multiple differential cryptanalysis of round-reduced PRINCE
A Canteaut, T Fuhr, H Gilbert, M Naya-Plasencia, JR Reinhard
International Workshop on Fast Software Encryption, 591-610, 2014
542014
The system can't perform the operation now. Try again later.
Articles 1–20