Higher-Order Differential Properties of Keccak and Luffa C Boura, A Canteaut, C De Cannière
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
210 2011 Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon C Boura, M Naya-Plasencia, V Suder
International Conference on the Theory and Application of Cryptology and …, 2014
181 2014 Chimera: Combining ring-lwe-based fully homomorphic encryption schemes C Boura, N Gama, M Georgieva, D Jetchev
Journal of Mathematical Cryptology 14 (1), 316-338, 2020
121 2020 On the boomerang uniformity of cryptographic sboxes C Boura, A Canteaut
IACR Transactions on Symmetric Cryptology, 290-310, 2018
99 2018 Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak -f and Hamsi-256 C Boura, A Canteaut
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
87 2011 On the Influence of the Algebraic Degree of on the Algebraic Degree of C Boura, A Canteaut
IEEE Transactions on Information Theory 59 (1), 691-702, 2012
77 2012 Another view of the division property C Boura, A Canteaut
Annual International Cryptology Conference, 654-682, 2016
72 2016 Making the impossible possible C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31, 101-133, 2018
70 2018 Efficient MILP modelings for sboxes and linear layers of SPN ciphers C Boura, D Coggia
IACR Transactions on Symmetric Cryptology 2020 (3), 327--361, 2020
59 2020 Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning. C Boura, N Gama, M Georgieva
IACR Cryptol. ePrint Arch. 2018, 758, 2018
55 2018 A zero-sum property for the Keccak-f permutation with 18 rounds C Boura, A Canteaut
2010 IEEE International Symposium on Information Theory, 2488-2492, 2010
45 2010 Simulating homomorphic evaluation of deep learning predictions C Boura, N Gama, M Georgieva, D Jetchev
International Symposium on Cyber Security Cryptography and Machine Learning …, 2019
43 2019 Key difference invariant bias in block ciphers A Bogdanov, C Boura, V Rijmen, M Wang, L Wen, J Zhao
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
43 2013 A general proof framework for recent AES distinguishers C Boura, A Canteaut, D Coggia
IACR Transactions on Symmetric Cryptology 2019 (1), 170-191, 2019
25 2019 High-precision privacy-preserving real-valued function evaluation C Boura, I Chillotti, N Gama, D Jetchev, S Peceny, A Petric
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
25 2018 Improved impossible differential attacks against round-reduced LBlock C Boura, M Minier, M Naya-Plasencia, V Suder
IACR Cryptology ePrint Archive, 2014
20 2014 Two notions of differential equivalence on Sboxes C Boura, A Canteaut, J Jean, V Suder
Designs, Codes and Cryptography 87 (2), 185-202, 2019
18 2019 The BMM symmetrising trace conjecture for groups G4, G5, G6, G7, G8 C Boura, E Chavli, M Chlouveraki, K Karvounis
Journal of Symbolic Computation 96, 62-84, 2020
15 2020 Reflection ciphers C Boura, A Canteaut, LR Knudsen, G Leander
Designs, Codes and Cryptography 82, 3-25, 2017
15 2017 Side-channel analysis of Grøstl and Skein C Boura, S Lévêque, D Vigilant
2012 IEEE Symposium on Security and Privacy Workshops, 16-26, 2012
13 2012