Valentin SUDER
Valentin SUDER
University of Rouen Normandy
Verified email at - Homepage
Cited by
Cited by
The simeck family of lightweight block ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
C Boura, M Naya-Plasencia, V Suder
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
Making the impossible possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31, 101-133, 2018
Collision attacks against CAESAR candidates: forgery and key-recovery against AEZ and Marble
T Fuhr, G Leurent, V Suder
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
Sparse permutations with low differential uniformity
P Charpin, GM Kyureghyan, V Suder
Finite Fields and Their Applications 28, 214-243, 2014
On inversion in Z2n− 1
GM Kyureghyan, V Suder
Finite Fields and Their Applications 25, 234-254, 2014
Improved impossible differential attacks against round-reduced LBlock
C Boura, M Minier, M Naya-Plasencia, V Suder
IACR Cryptology ePrint Archive, 2014
On inverses of APN exponents
GM Kyureghyan, V Suder
2012 IEEE International Symposium on Information Theory Proceedings, 1207-1211, 2012
Two notions of differential equivalence on Sboxes
C Boura, A Canteaut, J Jean, V Suder
Designs, Codes and Cryptography 87 (2-3), 185-202, 2019
Key Recovery Attack Against 2.5-Round-Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
Antiderivative functions over
V Suder
Designs, Codes and Cryptography 82, 435-447, 2017
Forgery and key-recovery attacks on caesar candidate marble
T Fuhr, G Leurent, V Suder
Cryptography & Security, 2015
On Inversion in Z_ {2^ n-1}
V Suder, G Kyureghyan
The 11th International Conference on Finite Fields and their Applications-Fq11, 2013
F 2 n→ F 2 n Functions with Fast Points
V Suder
Fq14 International COnference on Finite FIelds and their Applications, 2019
Differential Equivalences on SBoxes
V Suder, C Boura, A Canteaut, J Jean
CAEN2018, Cryptography and Algorithmic Number Theory, 2018
On Sboxes sharing the same DDT
C Boura, A Canteaut, J Jean, V Suder
Dagstuhl Seminar 18021 Symmetric Cryptography, 2018
Propriétés Différentielles des Permutations et Application en Cryptographie Symétrique
V Suder
Université Pierre et Marie Curie, 2014
Valentin Suder-Sparse Permutations with Low Differential Uniformity
V Suder, F Bastien
Sparse Permutations with Low Differential Uniformity1
V Suder, P Charpin, G Kyureghyan
On Inverses of APN Exponents
V Suder
The system can't perform the operation now. Try again later.
Articles 1–20