In this thesis, we study the security of symmetric cryptographic primitives. These systems are based on transformations relying on mathematical objects that can be represented in multiple ways. We then exploit different induced structures to highlight new vulnerabilities. By exploiting various representations, we cryptanalyzed some schemes submitted to the CAESAR competition, and also some dedicated and generic stream ciphers. We exhibited design criteria for lightweight block ciphers in view of the NIST standardization process and in the case of stream ciphers we defined new cryptographic criteria more relevant than the usual ones. More precisely, we study the security of lightweight block ciphers with respect to the recent invariant attac...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
In this thesis, we study the security of symmetric cryptographic primitives. These systems are based...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
In this thesis, we study the security of symmetric cryptographic primitives. These systems are based...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...