Seguir
Valentin SUDER
Valentin SUDER
University of Rouen Normandy
Email confirmado em suder.xyz - Página inicial
Título
Citado por
Citado por
Ano
The simeck family of lightweight block ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
International workshop on cryptographic hardware and embedded systems, 307-329, 2015
3502015
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
C Boura, M Naya-Plasencia, V Suder
International Conference on the Theory and Application of Cryptology and …, 2014
1872014
Making the impossible possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31, 101-133, 2018
722018
Collision attacks against CAESAR candidates: forgery and key-recovery against AEZ and Marble
T Fuhr, G Leurent, V Suder
International Conference on the Theory and Application of Cryptology and …, 2015
402015
Sparse permutations with low differential uniformity
P Charpin, GM Kyureghyan, V Suder
Finite Fields and Their Applications 28, 214-243, 2014
272014
Two notions of differential equivalence on Sboxes
C Boura, A Canteaut, J Jean, V Suder
Designs, Codes and Cryptography 87 (2), 185-202, 2019
222019
On inversion in Z2n− 1
GM Kyureghyan, V Suder
Finite Fields and Their Applications 25, 234-254, 2014
222014
Improved impossible differential attacks against round-reduced LBlock
C Boura, M Minier, M Naya-Plasencia, V Suder
IACR Cryptology ePrint Archive, 2014
212014
On inverses of APN exponents
GM Kyureghyan, V Suder
2012 IEEE International Symposium on Information Theory Proceedings, 1207-1211, 2012
202012
Key Recovery Attack Against 2.5-Round-Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
International Conference on Fast Software Encryption, 535-553, 2016
112016
Antiderivative functions over
V Suder
Designs, Codes and Cryptography 82, 435-447, 2017
72017
Forgery and key-recovery attacks on caesar candidate marble
T Fuhr, G Leurent, V Suder
Cryptography & Security, 2015
52015
Propriétés Différentielles des Permutations et Application en Cryptographie Symétrique
V Suder
Université Pierre et Marie Curie, 2014
12014
On Inversion in Z_ {2^ n-1}
V Suder, G Kyureghyan
The 11th International Conference on Finite Fields and their Applications-Fq11, 2013
12013
F 2 n→ F 2 n Functions with Fast Points
V Suder
Fq14 International COnference on Finite FIelds and their Applications, 2019
2019
Differential Equivalences on SBoxes
V Suder, C Boura, A Canteaut, J Jean
CAEN2018, Cryptography and Algorithmic Number Theory, 2018
2018
On Sboxes sharing the same DDT
C Boura, A Canteaut, J Jean, V Suder
Dagstuhl Seminar 18021 Symmetric Cryptography, 2018
2018
Valentin Suder-Sparse Permutations with Low Differential Uniformity
V Suder, F Bastien
2014
Sparse Permutations with Low Differential Uniformity1
V Suder, P Charpin, G Kyureghyan
On Inverses of APN Exponents
V Suder
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20