Anne Canteaut
#122,744
Most Influential Person Now
French cryptographer
Anne Canteaut's AcademicInfluence.com Rankings
Anne Canteautcomputer-science Degrees
Computer Science
#7456
World Rank
#7853
Historical Rank
Database
#8231
World Rank
#8589
Historical Rank
Download Badge
Computer Science
Anne Canteaut's Degrees
- PhD Computer Science Paris-Saclay University
- Masters Computer Science Paris-Saclay University
Similar Degrees You Can Earn
Why Is Anne Canteaut Influential?
(Suggest an Edit or Addition)According to Wikipedia, Anne Canteaut is a French researcher in cryptography, working at the French Institute for Research in Computer Science and Automation in Paris. She studies the design and cryptanalysis of symmetric-key algorithms and S-boxes.
Anne Canteaut's Published Works
Published Works
- PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract (2012) (434)
- A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511 (1997) (359)
- PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) (2012) (318)
- Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 (2000) (254)
- Binary m-sequences with three-valued crosscorrelation: A proof of Welch's conjecture (2000) (161)
- Higher-Order Differential Properties of Keccak and Luffa (2011) (158)
- Symmetric Boolean functions (2005) (152)
- Sosemanuk, a Fast Software-Oriented Stream Cipher (2008) (143)
- Construction of bent functions via Niho power functions (2006) (139)
- A new class of monomial bent functions (2006) (134)
- Cryptanalysis of the Original McEliece Cryptosystem (1998) (131)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (2016) (130)
- Decomposing bent functions (2002) (128)
- Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences (2000) (125)
- Open Problems Related to Algebraic Attacks on Stream Ciphers (2005) (122)
- On cryptographic properties of the cosets of R(1, m) (2001) (116)
- Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings (2005) (104)
- Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions (2000) (98)
- Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis (2002) (97)
- On Almost Perfect Nonlinear Functions Over$mmb F_2^n$ (2006) (95)
- Differential properties of power functions (2010) (92)
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 (2010) (74)
- On the Boomerang Uniformity of Cryptographic Sboxes (2018) (72)
- Finding nonnormal bent functions (2006) (68)
- Sieve-in-the-Middle: Improved MITM Attacks (2013) (62)
- The eSTREAM Portfolio (2008) (55)
- Proving Resistance Against Invariant Attacks: How to Choose the Round Constants (2017) (55)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (2015) (53)
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$ (2013) (50)
- Another View of the Division Property (2016) (50)
- Understanding cache attacks (2006) (50)
- Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems (2020) (46)
- A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to Primitive Narrow-Sense BCH Codes of Length~511 (1995) (46)
- Multiple Differential Cryptanalysis of Round-Reduced PRINCE (2014) (45)
- A zero-sum property for the KECCAK-f permutation with 18 rounds (2010) (45)
- Almost Perfect Nonlinear functions (2005) (40)
- Saturnin: a suite of lightweight symmetric algorithms for post-quantum security (2020) (40)
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks (2015) (37)
- Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators (2000) (34)
- A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem (1994) (33)
- Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography (1999) (32)
- Linear Feedback Shift Register (2005) (32)
- Construction of t-Resilient Functions over a Finite Alphabet (1996) (32)
- Differential Properties of ${x\mapsto x^{2^{t}-1}}$ (2011) (30)
- On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting (2018) (28)
- A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$ (2017) (27)
- DECIM, a new stream cipher for hardware applications (2005) (25)
- Stream Cipher (2005) (25)
- A New Characterization of Almost Bent Functions (1999) (23)
- Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations (1996) (22)
- Fast software encryption : 19th international workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012 : revised selected papers (2012) (22)
- Information Security Management System (2014) (21)
- Fast correlation attacks against stream ciphers and related open problems (2005) (19)
- Ongoing Research Areas in Symmetric Cryptography (2006) (19)
- A General Proof Framework for Recent AES Distinguishers (2019) (18)
- Cryptographic Functions and Design Criteria for Block Ciphers (2001) (18)
- Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers (2009) (17)
- Linear Cryptanalysis for Stream Ciphers (2005) (17)
- Iso/iec 27001 (2011) (16)
- Advanced Linear Cryptanalysis of Block and Stream Ciphers (Cryptology and Information Security) (2011) (15)
- On the correlations between a combining function and functions of fewer variables (2002) (15)
- Sieve-in-the-Middle: Improved MITM Attacks (Full Version) (2013) (14)
- Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version) (2014) (14)
- DFA on LS-Designs with a Practical Implementation on SCREAM (2017) (14)
- Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC) (2018) (13)
- Berlekamp-Massey Algorithm (2005) (13)
- STRUCTURAL WEAKNESSES OF PERMUTATIONS WITH A LOW DIFFERENTIAL UNIFORMITY AND GENERALIZED CROOKED FUNCTIONS (2009) (13)
- Two notions of differential equivalence on Sboxes (2017) (12)
- Linear Complexity (2005) (12)
- On Cryptographic Properties of the Cosets of (2001) (12)
- CONTEMPORARY DEVELOPMENTS IN FINITE FIELDS AND APPLICATIONS (2016) (12)
- On the weight distributions of optimal cosets of the first-order Reed-Muller codes (2001) (11)
- Recovering or Testing Extended-Affine Equivalence (2021) (11)
- How to Compress Homomorphic Ciphertexts (2015) (11)
- Reflection ciphers (2017) (11)
- The eSTREAM Portfolio (rev. 1) (2008) (10)
- If a generalised butterfly is APN then it operates on 6 bits (2019) (10)
- Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds (2017) (10)
- Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions (2018) (10)
- A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions (2012) (9)
- On the Influence of the Filtering Function on the Performance of Fast Correlation Attacks on Filter Generators (2002) (9)
- On the importance of considering physical attacks when implementing lightweight cryptography (2016) (9)
- A First DFA on PRIDE: From Theory to Practice (2016) (8)
- End-to-end data security for IoT : from a cloud of encryptions to encryption in the cloud (2017) (7)
- Related-Key Attack on Full-Round PICARO (2015) (7)
- D.STVL.7 - Algebraic cryptanalysis of symmetric primitives (2008) (7)
- A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox (2013) (7)
- On the algebraic degree of iterated power functions (2022) (6)
- Differential properties of functions x -> x^{2^t-1} -- extended version (2011) (6)
- A New Algorithm for Finding Minimum-Weight Words in Large Linear Codes (1995) (6)
- Nonlinear Approximations in Cryptanalysis Revisited (2018) (6)
- Combination generator (2005) (6)
- Observations on the DLCT and Absolute Indicators (2019) (6)
- Similarities between Encryption and Decryption: How far can we go? (2013) (6)
- On the security of the Rescue hash function (2020) (5)
- Minimal Polynomial (2005) (5)
- BISON - Instantiating the Whitened Swap-Or-Not Construction (2019) (5)
- Correlation attacks on combination generators (2012) (5)
- Practical Cube Attack against Nonce-Misused Ascon (2022) (5)
- Weakness of Block Ciphers Using Highly Nonlinear Confusion Functions (2002) (4)
- Internal collision attack on Maraca (2009) (4)
- On Almost Perfect Nonlinear mappings (2005) (4)
- Cryptanalysis of block ciphers and weight divisibility of some binary codes (2002) (4)
- Fast Software Encryption (2012) (4)
- On almost perfect nonlinear mappings over F/sup n//sub 2/ (2005) (4)
- Attacks Against Filter Generators Exploiting Monomial Mappings (2016) (3)
- Parity-Check Relations on Combination Generators (2012) (3)
- Report on the Security of STARK-friendly Hash Functions (Version 2.0) (2020) (3)
- Diierential Cryptanalysis of Feistel Ciphers and Diierentially -uniform Mappings (1997) (3)
- Remote Attestation (2011) (3)
- Algebraic Cryptanalysis of Symmetric Primitives (2008) (3)
- Extended differential properties of cryptographic functions (2013) (3)
- Correlation Attack for Stream Ciphers (2005) (3)
- Designs, Codes and Cryptography (Special Issue in Coding and Cryptography) (2013) (3)
- Conceptual Modeling (2012) (3)
- Filter Generator (2005) (3)
- Differential Attacks Against SPN: A Thorough Analysis (2015) (3)
- Cellular Network Security (2011) (3)
- Ciphertext only Reconstruction of LFSR-based Stream Ciphers (2000) (2)
- Computing the biases of parity-check relations (2009) (2)
- On a generalisation of Dillon’s APN permutation (2017) (2)
- Advances in Cryptology – EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III (2020) (2)
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to BCH codes of length 511 (1997) (2)
- D.STVL.9 - Ongoing Research Areas in Symmetric Cryptography (2008) (2)
- Software-Based Attestation (2011) (1)
- Linear Consistency Attack (2005) (1)
- Fast Correlation Attack (2005) (1)
- Autocorrelations of vectorial Boolean functions (2021) (1)
- On the algebraic degree of some SHA-3 candidates (2012) (1)
- Distinguishing and Key-recovery Attacks against Wheesht (2014) (1)
- On the hypothesis of stochastic equivalence for Feistel ciphers (1998) (1)
- Linear Syndrome Attack (2005) (1)
- Information Integrity (2011) (1)
- DECIM−128 ∗ (2006) (1)
- Compared performance of fast correlation attacks an stream ciphers (2000) (1)
- Cryptanalysis of Wheesht (2014) (0)
- Reflection Ciphers (Extended abstract) (2015) (0)
- Subgroup Cryptosystems (2011) (0)
- Biometric Cryptosystem (2009) (0)
- New Results - Symmetriccryptology (2015) (0)
- BIOS Basic Input Output System (2011) (0)
- Advances in Cryptology – EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II (2020) (0)
- Cryptanalysis – a Never-Ending Story (2019) (0)
- Editorial: Coding and Cryptography 2019 (2020) (0)
- Aes Security Report Executive Summary Resistance to Statistical Attacks 1.1 Linear and Differential Attacks on Aes 1.2 More General Statistical Models for Block Ciphers (2006) (0)
- Credential Verification (2011) (0)
- New Results - Symmetriccryptosystems (2014) (0)
- Differential Properties of Functions X → X – Extended Version * – (2011) (0)
- New Results - Security analysis of symmetric cryptosystems (2007) (0)
- Differential properties of functions $x \mapsto x^{2^t-1}$ -- extended version (2011) (0)
- C R ] 2 5 A ug 2 01 1 Differential properties of functions x 7 → x 2 t − 1 – extended version ∗ – (2011) (0)
- New Results - Primitives du chiffrement symétrique (2002) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- Proceedings of the 19th international conference on Fast Software Encryption (2012) (0)
- Two notions of differential equivalence on Sboxes (2018) (0)
- IEEE TRANSACTIONS ON INFORMATION THEORY H. VINCENT POOR, Editor-in-Chief ELZA ERKIP, Publications Editor ADRIAAN J. VAN WIJNGAARDEN, Publications Editor (2006) (0)
- Differential properties of functions $\boldsymbol{x\mapsto x^{2^t-1}}$ -- extended version (2011) (0)
- On the Differential Probability of Substitution-Permutation Networks (2015) (0)
- On the Origin of Trust: Struggle for Secure Cryptography (2016) (0)
- If a generalised butterfly is APN then it operates on 6 bits (2019) (0)
- Searching for APN permutations with the butterfly construction (2019) (0)
- Author Manuscript, Published in "new Stream Cipher Designs -the Estream Finalists (2008) (0)
- Proceedings of the 5th international conference on Cryptology in India (2004) (0)
- An Update on Saturnin (2020) (0)
- Proving resistance of a block cipher against invariant attacks (2017) (0)
- On the behaviors of ane equivalent Sboxes (2015) (0)
- Speaker Biometrics (2009) (0)
- Extended differential properties of cryptographic functi (2013) (0)
- Report on The Eurocrypt 2021 Review Process (2021) (0)
- Algebraic attacks on symmetric primitives for advanced protocols (2019) (0)
- of Round-Reduced PRINCE (2015) (0)
- Identity Proof (2011) (0)
- Cryptographic S-Boxes (2014) (0)
- Inversion Attack (2005) (0)
- Reflection ciphers (2015) (0)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (2018) (0)
- Stream cipher cryptanalysis (2013) (0)
- Final Report on New Developments in Symmetric Key Cryptanalysis (2012) (0)
- Access Lists (2020) (0)
- Advances in Cryptology – EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I (2020) (0)
- Proving Resistance against Invariant Attacks: Properties of the Linear Layer (2017) (0)
- On Sboxes sharing the same DDT (2018) (0)
- Algebraic Distinguishers against Symmetric Primitives (2016) (0)
- Foundations of cryptanalysis: On Boolean functions (2013) (0)
- File System Permissions (2011) (0)
- Runtime Analysis (2011) (0)
- Firewall Policy Analysis (2011) (0)
- The bank card (2013) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- New Results - Fonctions booléennes (2005) (0)
- On some algebraic properties of Keccak (2013) (0)
- GERHARD KRAMER, Publications Editor ADRIAAN J. VAN WIJNGAARDEN, Publications Editor (2005) (0)
- Correlation attacks on combination generators (2012) (0)
This paper list is powered by the following services:
Other Resources About Anne Canteaut
What Schools Are Affiliated With Anne Canteaut?
Anne Canteaut is affiliated with the following schools: