Folgen
Rotella Yann
Rotella Yann
Université Paris-Saclay, Laboratoire de Mathématiques de Versailles, UVSQ
Bestätigte E-Mail-Adresse bei uvsq.fr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Proving resistance against invariant attacks: How to choose the round constants
C Beierle, A Canteaut, G Leander, Y Rotella
Annual International Cryptology Conference, 647-678, 2017
692017
Cryptanalysis of the FLIP family of stream ciphers
S Duval, V Lallemand, Y Rotella
Annual International Cryptology Conference, 457-475, 2016
672016
The subterranean 2.0 cipher suite
J Daemen, PMC Massolino, A Mehrdad, Y Rotella
IACR Transactions on Symmetric Cryptology, 262-294, 2020
572020
Boolean functions with restricted input and their robustness; application to the FLIP cipher
C Carlet, P Méaux, Y Rotella
IACR Transactions on Symmetric Cryptology 2017 (3), 192--227, 2017
532017
On the concrete security of Goldreich’s pseudorandom generator
G Couteau, A Dupin, P Méaux, M Rossi, Y Rotella
International Conference on the Theory and Application of Cryptology and …, 2018
312018
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
C Beierle, P Derbez, G Leander, G Leurent, H Raddum, Y Rotella, ...
Annual International Conference on the Theory and Applications of …, 2021
222021
Cryptanalysis of MORUS
T Ashur, M Eichlseder, MM Lauridsen, G Leurent, B Minaud, Y Rotella, ...
International Conference on the Theory and Application of Cryptology and …, 2018
182018
Algebraic and higher-order differential cryptanalysis of pyjamask-96
C Dobraunig, Y Rotella, J Schoone
IACR Transactions on Symmetric Cryptology, 289-312, 2020
112020
Attacks against filter generators exploiting monomial mappings
A Canteaut, Y Rotella
International Conference on Fast Software Encryption, 78-98, 2016
102016
State-recovery attacks on modified Ketje Jr
T Fuhr, M Naya-Plasencia, Y Rotella
IACR Transactions on Symmetric Cryptology 2018 (1), 29-56, 2018
92018
Algebraic collision attacks on keccak
RH Boissier, C Noûs, Y Rotella
IACR Transactions on Symmetric Cryptology, 239-268, 2021
62021
Generic attack on duplex-based aead modes using random function statistics
H Gilbert, R Heim Boissier, L Khati, Y Rotella
Annual International Conference on the Theory and Applications of …, 2023
42023
Learning with physical rounding for linear and quadratic leakage functions
C Hoffmann, P Méaux, C Momin, Y Rotella, FX Standaert, B Udvarhelyi
Annual International Cryptology Conference, 410-439, 2023
22023
Differential analysis of the ternary hash function Troika
C Boura, M Funk, Y Rotella
Cryptology ePrint Archive, 2023
22023
On the security of keyed hashing based on an unkeyed block function
J Fuchs, Y Rotella, J Daemen
IACR Cryptol. ePrint Arch, 1172, 2022
22022
On the Security of Keyed Hashing Based on Public Permutations
J Fuchs, Y Rotella, J Daemen
Annual International Cryptology Conference, 607-627, 2023
2023
Breaking Panther
C Boura, RH Boissier, Y Rotella
International Conference on Cryptology in Africa, 176-188, 2022
2022
Code to count monomials of several rounds of Pyjamask
JJP Schoone, CE Dobraunig, Y Rotella
DANS EASY, 2021
2021
Updates on the Subterranean 2.0 cipher suite
J Daemen, PMC Massolino, A Mehrdad, Y Rotella
2020
Implementing the NIST lightweight cryptography candidates Xoodyak & Subterranean 2.0
T van der Burgt, J Daemen, PMC Massolino, Y Rotella
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20