Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities. Cryptographers are already anticipating this threat by proposing and studying a number of potentially quantum-safe alternatives for those primitives. On the other hand, symmetric primitives seem less vulnerable against quantum computing: the main known applicable result is Grover’s algorithm that gives a quadratic speed-up for exhaustive search. In this work, we examine more closely the security of symmetric ciphers against quantum attacks. Since our trust in symmetric ciphers relies mostly on their ability to resist cryptanalysis te...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
International audienceQuantum computers, that may become available one day, would impact many scient...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
International audienceThe general context Cryptography is a computer discipline that aims to protect...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
A common desire in today\u27s world is that of security. Whether it is keeping your e-mail private o...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
International audienceQuantum computers, that may become available one day, would impact many scient...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
International audienceThe general context Cryptography is a computer discipline that aims to protect...
International audienceIn this paper, we report the first quantum key-recovery attack on a symmetric ...
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
In this thesis, we study the security of cryptographic systems against an adversary who has access t...
National audienceThe security of symmetric cryptography is completely based on cryptanalysis: we onl...
A common desire in today\u27s world is that of security. Whether it is keeping your e-mail private o...
International audienceThe security of symmetric cryptography is completely based on cryptanalysis: w...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...