Valentin SUDER
Valentin SUDER
University of Rouen Normandy
Verified email at suder.xyz - Homepage
Title
Cited by
Cited by
Year
The Simeck Family of Lightweight Block Ciphers
G Yang, B Zhu, V Suder, MD Aagaard, G Gong
International workshop on cryptographic hardware and embedded systems, 307-329, 2015
1872015
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
C Boura, M Naya-Plasencia, V Suder
International Conference on the Theory and Application of Cryptology and …, 2014
1212014
Collision attacks against CAESAR candidates
T Fuhr, G Leurent, V Suder
International Conference on the Theory and Application of Cryptology and …, 2015
332015
Sparse permutations with low differential uniformity
P Charpin, GM Kyureghyan, V Suder
Finite Fields and Their Applications 28, 214-243, 2014
212014
Improved impossible differential attacks against round-reduced LBlock
C Boura, M Minier, M Naya-Plasencia, V Suder
IACR Cryptology ePrint Archive, 2014
202014
Making the impossible possible
C Boura, V Lallemand, M Naya-Plasencia, V Suder
Journal of Cryptology 31 (1), 101-133, 2018
182018
On inversion in Z2n− 1
GM Kyureghyan, V Suder
Finite Fields and Their Applications 25, 234-254, 2014
142014
On inverses of APN exponents
GM Kyureghyan, V Suder
2012 IEEE International Symposium on Information Theory Proceedings, 1207-1211, 2012
132012
Two notions of differential equivalence on Sboxes
C Boura, A Canteaut, J Jean, V Suder
Designs, Codes and Cryptography 87 (2), 185-202, 2019
102019
Key Recovery Attack Against 2.5-Round -Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
International Conference on Fast Software Encryption, 535-553, 2016
82016
Antiderivative functions over
V Suder
Designs, Codes and Cryptography 82 (1-2), 435-447, 2017
62017
Forgery and key-recovery attacks on caesar candidate marble
T Fuhr, G Leurent, V Suder
Cryptography & Security, 2015
62015
On Inversion in Z_ {2^ n-1}
V Suder, G Kyureghyan
The 11th International Conference on Finite Fields and their Applications-Fq11, 2013
12013
F 2 n→ F 2 n Functions with Fast Points
V Suder
Fq14 International COnference on Finite FIelds and their Applications, 2019
2019
Differential Equivalences on SBoxes
V Suder, C Boura, A Canteaut, J Jean
CAEN2018, Cryptography and Algorithmic Number Theory, 2018
2018
On Sboxes sharing the same DDT
C Boura, A Canteaut, J Jean, V Suder
Dagstuhl Seminar 18021 Symmetric Cryptography, 2018
2018
Propriétés Différentielles des Permutations et Application en Cryptographie Symétrique
V Suder
Université Pierre et Marie Curie, 2014
2014
Valentin Suder-Sparse Permutations with Low Differential Uniformity
V Suder, F Bastien
2014
Sparse Permutations with Low Differential Uniformity1
V Suder, P Charpin, G Kyureghyan
On Inverses of APN Exponents
V Suder
The system can't perform the operation now. Try again later.
Articles 1–20