María Naya-Plasencia


Ontology type: schema:Person     


Person Info

NAME

María

SURNAME

Naya-Plasencia

Publications in SciGraph latest 50 shown

  • 2022-03-27 Quantum Boomerang Attacks and Some Applications in SELECTED AREAS IN CRYPTOGRAPHY
  • 2022-01-29 New Attacks from Old Distinguishers Improved Attacks on Serpent in TOPICS IN CRYPTOLOGY – CT-RSA 2022
  • 2021-12-01 QCB: Efficient Quantum-Secure Authenticated Encryption in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2021
  • 2021-12-01 Quantum Linearization Attacks in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2021
  • 2021-12-01 Generic Framework for Key-Guessing Improvements in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2021
  • 2021-10-08 Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli in JOURNAL OF CRYPTOLOGY
  • 2020-12-06 New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2020
  • 2020-08-10 Cryptanalysis Results on Spook in ADVANCES IN CRYPTOLOGY – CRYPTO 2020
  • 2020-08-10 Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems in ADVANCES IN CRYPTOLOGY – CRYPTO 2020
  • 2020-05-01 Correction to: Optimal Merging in Quantum k-xor and k-sum Algorithms in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2020-05-01 Optimal Merging in Quantum k-xor and k-sum Algorithms in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2020-05-01 Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2020-01-10 On Quantum Slide Attacks in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2019
  • 2019-11-25 Quantum Attacks Without Superposition Queries: The Offline Simon’s Algorithm in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2019
  • 2018-10-27 Hidden Shift Quantum Cryptanalysis and Implications in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2018
  • 2018-10-27 Quantum Algorithms for the -xor Problem in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2018
  • 2018-01-31 Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression in JOURNAL OF CRYPTOLOGY
  • 2017-11-18 An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2017
  • 2017-02-01 Making the Impossible Possible in JOURNAL OF CRYPTOLOGY
  • 2016-07-21 Breaking Symmetric Cryptosystems Using Quantum Period Finding in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016-07-20 Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression in FAST SOFTWARE ENCRYPTION
  • 2016 Related-Key Attack on Full-Round PICARO in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2015-08-01 Cryptanalysis of Full Sprout in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015-04-19 Cryptanalysis of KLEIN in FAST SOFTWARE ENCRYPTION
  • 2015-04-19 Multiple Differential Cryptanalysis of Round-Reduced PRINCE in FAST SOFTWARE ENCRYPTION
  • 2014-05-21 Multiple Limited-Birthday Distinguishers and Applications in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2014 Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2013-07-17 Improved Cryptanalysis of AES-like Permutations in JOURNAL OF CRYPTOLOGY
  • 2013 Block Ciphers That Are Easier to Mask: How Far Can We Go? in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013
  • 2013 Sieve-in-the-Middle: Improved MITM Attacks in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2012-08-21 Correlation attacks on combination generators in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2012-05-10 Quark: A Lightweight Hash in JOURNAL OF CRYPTOLOGY
  • 2012 Practical Cryptanalysis of ARMADILLO2 in FAST SOFTWARE ENCRYPTION
  • 2012 Conditional Differential Cryptanalysis of Trivium and KATAN in SELECTED AREAS IN CRYPTOGRAPHY
  • 2012 Improved Rebound Attack on the Finalist Grøstl in FAST SOFTWARE ENCRYPTION
  • 2012 Improved Analysis of ECHO-256 in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011 Practical Analysis of Reduced-Round Keccak in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2011
  • 2011 Cryptanalysis of Luffa v2 Components in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011 Analysis of Reduced-SHAvite-3-256 v2 in FAST SOFTWARE ENCRYPTION
  • 2011 Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2011
  • 2011 How to Improve Rebound Attacks in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2011 Rebound Attack on JH42 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011 Cryptanalysis of ARMADILLO2 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2010 Quark: A Lightweight Hash in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2010 Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2010
  • 2010 Cryptanalysis of ESSENCE in FAST SOFTWARE ENCRYPTION
  • 2010 Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2009 Rebound Attack on the Full Lane Compression Function in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2009 Inside the Hypercube in INFORMATION SECURITY AND PRIVACY
  • 2008-01-01 Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation in RESEARCH IN CRYPTOLOGY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.5328.c", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.12832.3a", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.410380.e", 
            "type": "Organization"
          }
        ], 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-08-04T17:38", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/person/person_676.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.013206304341.94'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.013206304341.94'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.013206304341.94'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.013206304341.94'


     




    Preview window. Press ESC to close (or click here)


    ...