Name
Affiliation
Papers
MARÍA NAYA-PLASENCIA
INRIA project-team SECRET, France
58
Collaborators
Citations 
PageRank 
89
445
34.05
Referers 
Referees 
References 
544
660
641
Search Limit
100660
Title
Citations
PageRank
Year
QCB - Efficient Quantum-Secure Authenticated Encryption.00.342021
Quantum Linearization Attacks.00.342021
Generic Framework for Key-Guessing Improvements.00.342021
Improved Attacks On Sliscp Permutation And Tight Bound Of Limited Birthday Distinguishers00.342020
Saturnin: A Suite Of Lightweight Symmetric Algorithms For Post-Quantum Security00.342020
Cryptanalysis Results on Spook.00.342020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.00.342020
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.00.342020
Optimal Merging in Quantum k-xor and k-sum Algorithms.00.342019
Preface To Volume 2018, Issue 100.342019
Quantum Security Analysis Of Aes00.342019
Hidden Shift Quantum Cryptanalysis and Implications.10.372018
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.80.542018
Making the Impossible Possible10.362018
State-Recovery Attacks On Modified Ketje Jr00.342018
Quantum Algorithms for the k -xor Problem.00.342018
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.70.472017
Breaking Symmetric Cryptosystems using Quantum Period Finding.230.942016
Improved Cryptanalysis of AES-like Permutations40.402015
Quantum Differential And Linear Cryptanalysis110.612015
How to Compress Homomorphic Ciphertexts.00.342015
Related-Key Attack on Full-Round PICARO.20.422015
Cryptanalysis of Full Sprout.170.922015
Multiple Differential Cryptanalysis of Round-Reduced PRINCE.70.512014
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version).30.432014
Cryptanalysis of KLEIN.00.342014
Improved Impossible Differential Attacks against Round-Reduced LBlock.100.522014
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon.381.372014
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version).00.342014
Cryptanalysis of KLEIN (Full version).00.342014
Multiple Limited-Birthday Distinguishers and Applications.100.532013
Sieve-in-the-Middle: Improved MITM Attacks (Full Version).00.342013
Sieve-in-the-Middle: Improved MITM Attacks.220.872013
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions.20.372012
Practical cryptanalysis of ARMADILL0220.402012
Correlation attacks on combination generators10.352012
Improved rebound attack on the finalist grøstl230.782012
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock190.972012
Conditional differential cryptanalysis of trivium and KATAN190.822011
Practical attack on 8 rounds of the lightweight block cipher KLEIN100.652011
How to improve rebound attacks281.452011
Practical analysis of reduced-round keccak261.642011
Rebound attack on JH4250.622011
Improved analysis of ECHO-25680.522011
Analysis of reduced-SHAvite-3-256 v230.402011
Cryptanalysis of ARMADILLO270.782011
QUARK: a lightweight hash10.362010
Cryptanalysis of the 10-round hash and full compression function of SHAvite-3-51260.472010
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems491.962010
Cryptanalysis of Luffa v2 components120.952010
  • 1
  • 2