In this thesis, I present the research I did with my co-authors on several aspects of symmetric cryptography from May 2013 to December 2016, that is, when I was a PhD student at the university of Luxembourg under the supervision of Alex Biryukov. My research has spanned three different areas of symmetric cryptography. In Part I of this thesis, I present my work on lightweight cryptography. This field of study investigates the cryptographic algorithms that are suitable for very constrained devices with little computing power such as RFID tags and small embedded processors such as those used in sensor networks. Many such algorithms have been proposed recently, as evidenced by the survey I co-authored on this topic. I present this survey a...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
Contains fulltext : 250090.pdf (Publisher’s version ) (Open Access)Radboud Univers...
Les travaux réalisés au cours de cette thèse se situent au carrefour de la cryptographie symétrique ...
In this thesis, I present the research I did with my co-authors on several aspects of symmetric cryp...
Cryptography studies secure communications. In symmetric-key cryptography, the communicating parties...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
This thesis covers results from several areas related to symmetric cryptography, secure and efficient ...
This is a summary of the open discussion on future research topics for symmetric cryptography chaire...
Cryptographic primitives are the basic building blocks of various cryptographic systems and protocol...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
National audienceIt is crucial for a cipher to be trusted that its design be wellexplained. However,...
This thesis proposes improvements which can be applied to several techniques for the cryptanalysis o...
From .. to .., the Dagstuhl Seminar 07021 ``Symmetric Cryptography\u27\u27 automatically was held in...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
Contains fulltext : 250090.pdf (Publisher’s version ) (Open Access)Radboud Univers...
Les travaux réalisés au cours de cette thèse se situent au carrefour de la cryptographie symétrique ...
In this thesis, I present the research I did with my co-authors on several aspects of symmetric cryp...
Cryptography studies secure communications. In symmetric-key cryptography, the communicating parties...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
This thesis covers results from several areas related to symmetric cryptography, secure and efficient ...
This is a summary of the open discussion on future research topics for symmetric cryptography chaire...
Cryptographic primitives are the basic building blocks of various cryptographic systems and protocol...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
National audienceIt is crucial for a cipher to be trusted that its design be wellexplained. However,...
This thesis proposes improvements which can be applied to several techniques for the cryptanalysis o...
From .. to .., the Dagstuhl Seminar 07021 ``Symmetric Cryptography\u27\u27 automatically was held in...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
In the modern digital world, cryptography finds its place in countless applications. However, as we ...
Contains fulltext : 250090.pdf (Publisher’s version ) (Open Access)Radboud Univers...
Les travaux réalisés au cours de cette thèse se situent au carrefour de la cryptographie symétrique ...