default search action
Christophe De Cannière
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c18]Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. FSE 2012: 287-305 - 2011
- [c17]Christina Boura, Anne Canteaut, Christophe De Cannière:
Higher-Order Differential Properties of Keccak and Luffa. FSE 2011: 252-269 - [c16]Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
The Additive Differential Probability of ARX. FSE 2011: 342-358 - [r26]Christophe De Cannière:
Blowfish. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 157-158 - [r25]Christophe De Cannière:
Camellia. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 180-182 - [r24]Christophe De Cannière:
Cast. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 182-183 - [r23]Alex Biryukov, Christophe De Cannière:
Data Encryption Standard (DES). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 295-301 - [r22]Christophe De Cannière:
FEAL. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 454-455 - [r21]Christophe De Cannière:
GOST. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 517-518 - [r20]Christophe De Cannière:
Interpolation Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 620 - [r19]Christophe De Cannière:
Kasumi/Misty1. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 669-670 - [r18]Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 722-725 - [r17]Christophe De Cannière:
MARS. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 759-760 - [r16]Christophe De Cannière:
SERPENT. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1188-1189 - [r15]Christophe De Cannière:
Triple DES. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1318-1319 - [r14]Christophe De Cannière:
TWOFISH. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1339-1340 - 2010
- [c15]Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel:
The Differential Analysis of S-Functions. Selected Areas in Cryptography 2010: 36-56 - [i4]Christina Boura, Anne Canteaut, Christophe De Cannière:
Higher-order differential properties of Keccak and Luffa. IACR Cryptol. ePrint Arch. 2010: 589 (2010)
2000 – 2009
- 2009
- [c14]Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic:
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. CHES 2009: 272-288 - [c13]Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel:
Finding Collisions for a 45-Step Simplified HAS-V. WISA 2009: 206-225 - [i3]Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, Orr Dunkelman, Emilia Käsper, Svetla Nikova, Bart Preneel, Elmar Tischhauser:
The Lane hash function. Symmetric Cryptography 2009 - 2008
- [c12]Christophe De Cannière, Özgül Küçük, Bart Preneel:
Analysis of Grain's Initialization Algorithm. AFRICACRYPT 2008: 276-289 - [c11]Christophe De Cannière, Christian Rechberger:
Preimages for Reduced SHA-0 and SHA-1. CRYPTO 2008: 179-202 - [p2]Christophe De Cannière:
eSTREAM Software Performance. The eSTREAM Finalists 2008: 119-139 - [p1]Christophe De Cannière, Bart Preneel:
Trivium. The eSTREAM Finalists 2008: 244-266 - 2007
- [c10]Christophe De Cannière, Florian Mendel, Christian Rechberger:
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. Selected Areas in Cryptography 2007: 56-73 - 2006
- [j2]Christophe De Cannière, Alex Biryukov, Bart Preneel:
An introduction to Block Cipher Cryptanalysis. Proc. IEEE 94(2): 346-356 (2006) - [c9]Christophe De Cannière, Christian Rechberger:
Finding SHA-1 Characteristics: General Results and Applications. ASIACRYPT 2006: 1-20 - [c8]Christophe De Cannière:
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. ISC 2006: 171-186 - 2005
- [j1]Christophe De Cannière, Joseph Lano, Bart Preneel:
Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm. EURASIP J. Adv. Signal Process. 2005(12): 1923-1927 (2005) - [r13]Alex Biryukov, Christophe De Cannière:
Data encryption standard (DES). Encyclopedia of Cryptography and Security 2005 - [r12]Alex Biryukov, Christophe De Cannière:
Linear Cryptanalysis for Block Ciphers. Encyclopedia of Cryptography and Security 2005 - [r11]Christophe De Cannière:
Blowfish. Encyclopedia of Cryptography and Security 2005 - [r10]Christophe De Cannière:
Camellia. Encyclopedia of Cryptography and Security 2005 - [r9]Christophe De Cannière:
CAST. Encyclopedia of Cryptography and Security 2005 - [r8]Christophe De Cannière:
FEAL. Encyclopedia of Cryptography and Security 2005 - [r7]Christophe De Cannière:
GOST. Encyclopedia of Cryptography and Security 2005 - [r6]Christophe De Cannière:
Interpolation Attack. Encyclopedia of Cryptography and Security 2005 - [r5]Christophe De Cannière:
Kasumi/Misty1. Encyclopedia of Cryptography and Security 2005 - [r4]Christophe De Cannière:
Mars. Encyclopedia of Cryptography and Security 2005 - [r3]Christophe De Cannière:
Serpent. Encyclopedia of Cryptography and Security 2005 - [r2]Christophe De Cannière:
Triple-DES. Encyclopedia of Cryptography and Security 2005 - [r1]Christophe De Cannière:
Twofish. Encyclopedia of Cryptography and Security 2005 - 2004
- [c7]Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. CRYPTO 2004: 1-22 - [c6]Hirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel:
Non-randomness of the Full 4 and 5-Pass HAVAL. SCN 2004: 324-336 - [i2]Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. IACR Cryptol. ePrint Arch. 2004: 57 (2004) - 2003
- [c5]Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz:
Cryptanalysis of SAFER++. CRYPTO 2003: 195-211 - [c4]Alex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel:
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. EUROCRYPT 2003: 33-50 - [c3]Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle:
Cryptanalysis of SOBER-t32. FSE 2003: 111-128 - [c2]Alex Biryukov, Christophe De Cannière:
Block Ciphers and Systems of Quadratic Equations. FSE 2003: 274-289 - [c1]Dai Watanabe, Alex Biryukov, Christophe De Cannière:
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. Selected Areas in Cryptography 2003: 222-233 - [i1]Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz:
Crytanalysis of SAFER++. IACR Cryptol. ePrint Arch. 2003: 109 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint