Les travaux exposés dans cette thèse se situent à l’interface des mathématiques discrètes, des corps finis et de la cryptographie symétrique.Les 'boîtes-S’ sont des fonctions non-linéaires de petites tailles qui constituent souvent la partie de confusion, indispensable, des chiffrements par blocs ou des fonctions de hachages.Dans la première partie de cette thèse, nous nous intéressons à la construction de boîtes-S bijectives résistantes aux attaques différentielle. Nous étudions l’inverse pour la composition des monômes de permutations optimaux vis-à-vis du critère différentiel. Nous explorons ensuite des classes spécifiques de polynômes creux. Enfin, nous construisons des boîtes-S à partir de leurs dérivées discrètes.Dans la deuxième part...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the securit...
La première partie de cette thèse décrit certaines propriétés des permutations cryptographiques. Ce ...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
La sécurité en cryptographie symétrique semble être une notion très floue pour des non-spécialistes ...
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the securit...
La première partie de cette thèse décrit certaines propriétés des permutations cryptographiques. Ce ...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
The work I have carried out during this thesis lies between discrete mathematics, finite fields theo...
La sécurité en cryptographie symétrique semble être une notion très floue pour des non-spécialistes ...
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the securit...
La première partie de cette thèse décrit certaines propriétés des permutations cryptographiques. Ce ...