#### Filter Results:

- Full text PDF available (72)

#### Publication Year

1995

2017

- This year (7)
- Last 5 years (28)
- Last 10 years (54)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Julia Borghoff, Anne Canteaut, +10 authors Tolga YalÃ§Ä±n
- 2012

This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications with real-time securityâ€¦ (More)

- Anne Canteaut, Florent Chabaud
- IEEE Trans. Information Theory
- 1998

367 followed by addition which is completed in one clock unit time. The DFT is computed using a systolic cell described in [15]. For IBA-1 and IBA-2 the computation of the common connectionâ€¦ (More)

- Julia Borghoff, Anne Canteaut, +10 authors Tolga YalÃ§in
- ASIACRYPT
- 2012

This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications with real-time securityâ€¦ (More)

- Anne Canteaut, Pascale Charpin, Gohar M. M. Kyureghyan
- 2006 IEEE International Symposium on Informationâ€¦
- 2006

We study the Boolean functions on F<sub>2En</sub>, n = 6r, of the form x rarr Tr (lambdax<sup>d</sup>) with d = 2<sup>2r</sup> + 2<sup>r</sup> + 1. Our main result is the characterization of thoseâ€¦ (More)

- CÃ´me Berbain, Olivier Billet, +9 authors HervÃ© Sibert
- The eSTREAM Finalists
- 2008

Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. Itâ€¦ (More)

- Anne Canteaut, Marion Videau
- IEEE Transactions on Information Theory
- 2005

We present an extensive study of symmetric Boolean functions, especially of their cryptographic properties. Our main result establishes the link between the periodicity of the simplified value vectorâ€¦ (More)

- Hans Dobbertin, Gregor Leander, Anne Canteaut, Claude Carlet, Patrick Felke, Philippe Gaborit
- J. Comb. Theory, Ser. A
- 2006

A Boolean function with an even number n = 2k of variables is called bent if it is maximally nonlinear. We present here a new construction of bent functions. Boolean functions of the form f(x) =â€¦ (More)

- Anne Canteaut, Pascale Charpin
- IEEE Trans. Information Theory
- 2003

In a recent paper [1], it is shown that the restrictions of bent functions to subspaces of codimension 1 and 2 are highly nonlinear. Here, we present an extensive study of the restrictions of bentâ€¦ (More)

In this paper, we identify higher-order differential and zero-sum properties in the full Keccak-f permutation, in the Luffa v1 hash function, and in components of the Luffa v2 algorithm. Theseâ€¦ (More)

- âˆ— C. Berbain, Olivier Billet, +10 authors HervÃ© Sibert
- 2005

Decim is a new stream cipher designed for hardware applications with restricted resources. The design of the cipher is based on both a nonlinear filter LFSR and an irregular decimation mechanismâ€¦ (More)