[go: up one dir, main page]

Follow
Christina Boura
Christina Boura
IRIF, Université Paris Cité
Verified email at irif.fr - Homepage
Title
Cited by
Cited by
Year
Higher-Order Differential Properties of Keccak and Luffa
C Boura, A Canteaut, C De Cannière
International Workshop on Fast Software Encryption, 252-269, 2011
2302011
Chimera: Combining ring-lwe-based fully homomorphic encryption schemes
C Boura, N Gama, M Georgieva, D Jetchev
Journal of Mathematical Cryptology 14 (1), 316-338, 2020
2282020
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
C Boura, M Naya-Plasencia, V Suder
International Conference on the Theory and Application of Cryptology and …, 2014
2062014
On the boomerang uniformity of cryptographic sboxes
C Boura, A Canteaut
IACR Transactions on Symmetric Cryptology, 290-310, 2018
1342018
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
C Boura, A Canteaut
International Workshop on Selected Areas in Cryptography, 1-17, 2010
992010
Another view of the division property
C Boura, A Canteaut
Annual International Cryptology Conference, 654-682, 2016
922016
Making the impossible possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31 (1), 101-133, 2018
892018
Efficient MILP modelings for sboxes and linear layers of SPN ciphers
C Boura, D Coggia
IACR Transactions on Symmetric Cryptology, 327-361, 2020
882020
On the Influence of the Algebraic Degree ofon the Algebraic Degree of
C Boura, A Canteaut
IEEE Transactions on Information Theory 59 (1), 691-702, 2012
872012
Simulating homomorphic evaluation of deep learning predictions
C Boura, N Gama, M Georgieva, D Jetchev
International Symposium on Cyber Security Cryptography and Machine Learning …, 2019
682019
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning.
C Boura, N Gama, M Georgieva
IACR Cryptol. ePrint Arch. 2018, 758, 2018
642018
A zero-sum property for the Keccak-f permutation with 18 rounds
C Boura, A Canteaut
2010 IEEE International Symposium on Information Theory, 2488-2492, 2010
452010
Key difference invariant bias in block ciphers
A Bogdanov, C Boura, V Rijmen, M Wang, L Wen, J Zhao
International Conference on the Theory and Application of Cryptology and …, 2013
432013
Differential meet-in-the-middle cryptanalysis
C Boura, N David, P Derbez, G Leander, M Naya-Plasencia
Annual International Cryptology Conference, 240-272, 2023
392023
A general proof framework for recent AES distinguishers
C Boura, A Canteaut, D Coggia
IACR Transactions on Symmetric Cryptology 2019 (1), 170-191, 2019
352019
Boomerang uniformity of popular S-box constructions
S Tian, C Boura, L Perrin
Designs, Codes and Cryptography 88 (9), 1959-1989, 2020
31*2020
High-precision privacy-preserving real-valued function evaluation
C Boura, I Chillotti, N Gama, D Jetchev, S Peceny, A Petric
International Conference on Financial Cryptography and Data Security, 183-202, 2018
282018
Better Steady than Speedy: Full Break of SPEEDY-7-192
C Boura, N David, R Heim Boissier, M Naya-Plasencia
Annual International Conference on the Theory and Applications of …, 2023
272023
Two notions of differential equivalence on Sboxes
C Boura, A Canteaut, J Jean, V Suder
Designs, Codes and Cryptography 87 (2), 185-202, 2019
272019
Improved impossible differential attacks against round-reduced LBlock
C Boura, M Minier, M Naya-Plasencia, V Suder
IACR Cryptology ePrint Archive, 2014
212014
The system can't perform the operation now. Try again later.
Articles 1–20