International audienceThe security of symmetric cryptography is completely based on cryptanalysis: we only gain confidence in the security of a symmetric primitive through extensive and continuous scrutiny. It is therefore not possible to determine whether a symmetric primitive might be secure or not in a post-quantum world without first understanding how a quantum adversary could attack it. In this talk I will provide an overview of the subject and present some recent results on symmetric quantum cryptanalysis: a new efficient quantum collision search algorithm (joint work with A. Chailloux and A. Schrottenloher) and an extensive analysis of the use of modular additions on symmetric primitives (joint work with X. Bonnetain). We will discus...
International audienceThe general context Cryptography is a computer discipline that aims to protect...
Quantum computers, that may become available one day, would impact many scientific fields, most nota...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
Keynote speaker at Crossfyre 2018International audienceThe security of symmetric cryptography is com...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
Keynote speaker at Crossfyre 2018International audienceThe security of symmetric cryptography is com...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
International audienceQuantum computers, that may become available one day, would impact many scient...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
Cryptography is a critical technology in the modern computing industry, but the security of many cry...
We present new connections between quantum information and the field of classical cryptography. In p...
International audienceThe general context Cryptography is a computer discipline that aims to protect...
Quantum computers, that may become available one day, would impact many scientific fields, most nota...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
Keynote speaker at Crossfyre 2018International audienceThe security of symmetric cryptography is com...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
Keynote speaker at Crossfyre 2018International audienceThe security of symmetric cryptography is com...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
International audienceQuantum computers, that may become available one day, would impact many scient...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
Cryptography is a critical technology in the modern computing industry, but the security of many cry...
We present new connections between quantum information and the field of classical cryptography. In p...
International audienceThe general context Cryptography is a computer discipline that aims to protect...
Quantum computers, that may become available one day, would impact many scientific fields, most nota...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...