Anne Canteaut


Ontology type: schema:Person     


Person Info

NAME

Anne

SURNAME

Canteaut

Publications in SciGraph latest 50 shown

  • 2022-10-27 On the algebraic degree of iterated power functions in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2021-09-30 Autocorrelations of Vectorial Boolean Functions in PROGRESS IN CRYPTOLOGY – LATINCRYPT 2021
  • 2020-08-29 Editorial: Coding and Cryptography 2019 in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2020-08-10 Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems in ADVANCES IN CRYPTOLOGY – CRYPTO 2020
  • 2019-04-24 bison Instantiating the Whitened Swap-Or-Not Construction in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2019
  • 2019-04-06 If a generalised butterfly is APN then it operates on 6 bits in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2018-06-01 Two notions of differential equivalence on Sboxes in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2018-01-31 Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression in JOURNAL OF CRYPTOLOGY
  • 2017-07-29 Proving Resistance Against Invariant Attacks: How to Choose the Round Constants in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2017-07-29 DFA on LS-Designs with a Practical Implementation on SCREAM in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2017-03-02 A First DFA on PRIDE: From Theory to Practice in RISKS AND SECURITY OF INTERNET AND SYSTEMS
  • 2016-07-21 Another View of the Division Property in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016-07-20 Attacks Against Filter Generators Exploiting Monomial Mappings in FAST SOFTWARE ENCRYPTION
  • 2016-07-20 Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression in FAST SOFTWARE ENCRYPTION
  • 2016 Construction of Lightweight S-Boxes Using Feistel and MISTY Structures in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2016 Related-Key Attack on Full-Round PICARO in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2015-11-09 Reflection ciphers in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-04-19 Multiple Differential Cryptanalysis of Round-Reduced PRINCE in FAST SOFTWARE ENCRYPTION
  • 2015-04-14 On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2015 Differential Attacks Against SPN: A Thorough Analysis in CODES, CRYPTOLOGY, AND INFORMATION SECURITY
  • 2014-07-08 A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox in FAST SOFTWARE ENCRYPTION
  • 2013 Sieve-in-the-Middle: Improved MITM Attacks in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2012-08-21 Correlation attacks on combination generators in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2012-07-28 Editorial in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012 PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2011 Minimal Polynomial in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 A5/1 in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011 Fast Correlation Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Inversion Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Linear Complexity in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Filter Generator in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Combination Generator in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Linear Cryptanalysis for Stream Ciphers in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Linear Feedback Shift Register in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Running-Key in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Correlation Attack for Stream Ciphers in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Stream Cipher in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Linear Consistency Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Berlekamp–Massey Algorithm in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Linear Syndrome Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Higher-Order Differential Properties of Keccak and Luffa in FAST SOFTWARE ENCRYPTION
  • 2008-01-01 Decimv2 in NEW STREAM CIPHER DESIGNS
  • 2008 Sosemanuk, a Fast Software-Oriented Stream Cipher in NEW STREAM CIPHER DESIGNS
  • 2006 Open Problems Related to Algebraic Attacks on Stream Ciphers in CODING AND CRYPTOGRAPHY
  • 2005 LINEAR CRYPTANALYSIS FOR STREAM CIPHERS in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2005 Linear Complexity in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2005 Inversion attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2005 Berlekamp-Massey algorithm in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2005 Linear Syndrome Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.5328.c", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5170.3", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.434223.0", 
            "type": "Organization"
          }
        ], 
        "familyName": "Canteaut", 
        "givenName": "Anne", 
        "id": "sg:person.012730266023.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-11-24T21:36", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/person/person_750.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.012730266023.08'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.012730266023.08'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.012730266023.08'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.012730266023.08'


     




    Preview window. Press ESC to close (or click here)


    ...