In this thesis, we are interested in the cryptanalysis of some symmetric primitives using the structural concepts of the current encryption standard AES. We begin by an analysis of the AES itself in three different security models: the standard model, the related-key model and the open-key model. In the standard model, where the adversary tries to recover the secret key, we describe the best differential attacks, improving on the results previously published on this block cipher. Then, we conduct a structural analysis of the AES in the related-key model. We show impossibility results claiming that one cannot prove the security of the structure of the AES against differential cryptanalysis in that model. Finally, in the open-key model, we pr...
Cryptanalysis, formerly known as the art of deciphering secret codes, is now understood in a broader...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
In this thesis, we are interested in the cryptanalysis of some symmetric primitives using the struct...
Nous nous intéressons à la cryptanalyse de certaines primitives de cryptographie symétrique qu utili...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
Abstract. AES-based functions have attracted of a lot of analysis in the recent years, mainly due to...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Abstract. AES-based functions have attracted of a lot of analysis in the recent years, mainly due to...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Cryptanalysis, formerly known as the art of deciphering secret codes, is now understood in a broader...
Cryptanalysis, formerly known as the art of deciphering secret codes, is now understood in a broader...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
In this thesis, we are interested in the cryptanalysis of some symmetric primitives using the struct...
Nous nous intéressons à la cryptanalyse de certaines primitives de cryptographie symétrique qu utili...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
Abstract. AES-based functions have attracted of a lot of analysis in the recent years, mainly due to...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Abstract. AES-based functions have attracted of a lot of analysis in the recent years, mainly due to...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
The first part of this thesis is concerned with the study of some properties of cryptographic permut...
Cryptanalysis, formerly known as the art of deciphering secret codes, is now understood in a broader...
Cryptanalysis, formerly known as the art of deciphering secret codes, is now understood in a broader...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...