default search action
Christina Boura
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Christina Boura, Kazuhiko Minematsu:
Preface to Volume 2024, Issue 1. IACR Trans. Symmetric Cryptol. 2024(1): 1-4 (2024) - [j13]Jinliang Wang, Christina Boura, Patrick Derbez, Kai Hu, Muzhou Li, Meiqin Wang:
Cryptanalysis of Full-Round BipBip. IACR Trans. Symmetric Cryptol. 2024(2): 68-84 (2024) - [c17]Christina Boura, Patrick Derbez, Margot Funk:
Alternative Key Schedules for the AES. ACNS (2) 2024: 485-506 - [c16]Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:
A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool. EUROCRYPT (1) 2024: 217-248 - [i20]Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:
A generic algorithm for efficient key recovery in differential attacks - and its associated tool. IACR Cryptol. ePrint Arch. 2024: 288 (2024) - [i19]Christina Boura, Patrick Derbez, Margot Funk:
Alternative Key Schedules for the AES. IACR Cryptol. ePrint Arch. 2024: 315 (2024) - [i18]Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:
Multiple-Tweak Differential Attack Against SCARF. IACR Cryptol. ePrint Arch. 2024: 1408 (2024) - 2023
- [b2]Christina Boura:
On the security of symmetric primitives and the properties of their inner components. University of Paris-Saclay, France, 2023 - [j12]Christina Boura, Bart Mennink:
Preface to Volume 2023, Issue 1. IACR Trans. Symmetric Cryptol. 2023(1): 1-4 (2023) - [j11]Christina Boura, Patrick Derbez, Margot Funk:
Related-Key Differential Analysis of the AES. IACR Trans. Symmetric Cryptol. 2023(4): 215-243 (2023) - [c15]Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. CRYPTO (3) 2023: 240-272 - [c14]Christina Boura, Nicolas David, Rachelle Heim Boissier, María Naya-Plasencia:
Better Steady than Speedy: Full Break of SPEEDY-7-192. EUROCRYPT (4) 2023: 36-66 - [i17]Christina Boura, Margot Funk, Yann Rotella:
Differential analysis of the ternary hash function Troika. IACR Cryptol. ePrint Arch. 2023: 36 (2023) - 2022
- [c13]Christina Boura, Rachelle Heim Boissier, Yann Rotella:
Breaking Panther. AFRICACRYPT 2022: 176-188 - [c12]Christina Boura, Margot Funk, Yann Rotella:
Differential Analysis of the Ternary Hash Function Troika. SAC 2022: 96-115 - [i16]Christina Boura, Rachelle Heim Boissier, Yann Rotella:
Breaking Panther. IACR Cryptol. ePrint Arch. 2022: 111 (2022) - [i15]Christina Boura, Nicolas David, Rachelle Heim Boissier, María Naya-Plasencia:
Better Steady than Speedy: Full break of SPEEDY-7-192. IACR Cryptol. ePrint Arch. 2022: 1351 (2022) - [i14]Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. IACR Cryptol. ePrint Arch. 2022: 1640 (2022) - 2020
- [j10]Shizhu Tian, Christina Boura, Léo Perrin:
Boomerang uniformity of popular S-box constructions. Des. Codes Cryptogr. 88(9): 1959-1989 (2020) - [j9]Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes. J. Math. Cryptol. 14(1): 316-338 (2020) - [j8]Christina Boura, Eirini Chavli, Maria Chlouveraki, Konstantinos Karvounis:
The BMM symmetrising trace conjecture for groups G4, G5, G6, G7, G8. J. Symb. Comput. 96: 62-84 (2020) - [j7]Christina Boura, Daniel Coggia:
Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers. IACR Trans. Symmetric Cryptol. 2020(3): 327-361 (2020)
2010 – 2019
- 2019
- [j6]Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder:
Two notions of differential equivalence on Sboxes. Des. Codes Cryptogr. 87(2-3): 185-202 (2019) - [j5]Christina Boura, Anne Canteaut, Daniel Coggia:
A General Proof Framework for Recent AES Distinguishers. IACR Trans. Symmetric Cryptol. 2019(1): 170-191 (2019) - [c11]Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:
Simulating Homomorphic Evaluation of Deep Learning Predictions. CSCML 2019: 212-230 - [i13]Christina Boura, Anne Canteaut, Daniel Coggia:
A General Proof Framework for Recent AES Distinguishers. IACR Cryptol. ePrint Arch. 2019: 141 (2019) - [i12]Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:
Simulating Homomorphic Evaluation of Deep Learning Predictions. IACR Cryptol. ePrint Arch. 2019: 591 (2019) - [i11]Shizhu Tian, Christina Boura, Léo Perrin:
Boomerang Uniformity of Popular S-box Constructions. IACR Cryptol. ePrint Arch. 2019: 1002 (2019) - 2018
- [j4]Christina Boura, Virginie Lallemand, María Naya-Plasencia, Valentin Suder:
Making the Impossible Possible. J. Cryptol. 31(1): 101-133 (2018) - [j3]Christina Boura, Anne Canteaut:
On the Boomerang Uniformity of Cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 2018(3): 290-310 (2018) - [c10]Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric:
High-Precision Privacy-Preserving Real-Valued Function Evaluation. Financial Cryptography 2018: 183-202 - [i10]Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder:
Two Notions of Differential Equivalence on Sboxes. IACR Cryptol. ePrint Arch. 2018: 617 (2018) - [i9]Christina Boura, Nicolas Gama, Mariya Georgieva:
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning. IACR Cryptol. ePrint Arch. 2018: 758 (2018) - 2017
- [j2]Christina Boura, Anne Canteaut, Lars R. Knudsen, Gregor Leander:
Reflection ciphers. Des. Codes Cryptogr. 82(1-2): 3-25 (2017) - [i8]Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric:
High-Precision Privacy-Preserving Real-Valued Function Evaluation. IACR Cryptol. ePrint Arch. 2017: 1234 (2017) - 2016
- [c9]Christina Boura, Anne Canteaut:
Another View of the Division Property. CRYPTO (1) 2016: 654-682 - [c8]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack Against 2.5-Round \pi -Cipher. FSE 2016: 535-553 - [i7]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack against 2.5-round pi-Cipher. IACR Cryptol. ePrint Arch. 2016: 502 (2016) - [i6]Christina Boura, Anne Canteaut:
Another view of the division property. IACR Cryptol. ePrint Arch. 2016: 554 (2016) - 2014
- [c7]Christina Boura, María Naya-Plasencia, Valentin Suder:
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon. ASIACRYPT (1) 2014: 179-199 - [i5]Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder:
Improved Impossible Differential Attacks against Round-Reduced LBlock. IACR Cryptol. ePrint Arch. 2014: 279 (2014) - [i4]Christina Boura, María Naya-Plasencia, Valentin Suder:
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version). IACR Cryptol. ePrint Arch. 2014: 699 (2014) - 2013
- [j1]Christina Boura, Anne Canteaut:
On the Influence of the Algebraic Degree of F-1 on the Algebraic Degree of G ∘ F. IEEE Trans. Inf. Theory 59(1): 691-702 (2013) - [c6]Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao:
Key Difference Invariant Bias in Block Ciphers. ASIACRYPT (1) 2013: 357-376 - [c5]Christina Boura, Anne Canteaut:
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox. FSE 2013: 585-604 - [i3]Christina Boura, Anne Canteaut:
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version). IACR Cryptol. ePrint Arch. 2013: 211 (2013) - 2012
- [b1]Christina Boura:
Analyse de fonctions de hachage cryptographiques. (Analysis of cryptographic hash functions). Pierre and Marie Curie University, Paris, France, 2012 - [c4]Christina Boura, Sylvain Lévêque, David Vigilant:
Side-Channel Analysis of Grøstl and Skein. IEEE Symposium on Security and Privacy Workshops 2012: 16-26 - 2011
- [c3]Christina Boura, Anne Canteaut, Christophe De Cannière:
Higher-Order Differential Properties of Keccak and Luffa. FSE 2011: 252-269 - [i2]Christina Boura, Anne Canteaut:
On the influence of the algebraic degree of F-1 on the algebraic degree of G circ F. IACR Cryptol. ePrint Arch. 2011: 503 (2011) - 2010
- [c2]Christina Boura, Anne Canteaut:
A zero-sum property for the KECCAK-f permutation with 18 rounds. ISIT 2010: 2488-2492 - [c1]Christina Boura, Anne Canteaut:
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256. Selected Areas in Cryptography 2010: 1-17 - [i1]Christina Boura, Anne Canteaut, Christophe De Cannière:
Higher-order differential properties of Keccak and Luffa. IACR Cryptol. ePrint Arch. 2010: 589 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint