Quantum security analysis of AES X Bonnetain, M Naya-Plasencia, A Schrottenloher IACR Transactions on Symmetric Cryptology 2019 (2), 55-93, 2019 | 175 | 2019 |
Quantum security analysis of CSIDH X Bonnetain, A Schrottenloher Annual International Conference on the Theory and Applications of …, 2020 | 151* | 2020 |
Quantum attacks without superposition queries: the offline Simon’s algorithm X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ... Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 132 | 2019 |
On quantum slide attacks X Bonnetain, M Naya-Plasencia, A Schrottenloher Selected Areas in Cryptography–SAC 2019: 26th International Conference …, 2020 | 69 | 2020 |
Hidden shift quantum cryptanalysis and implications X Bonnetain, M Naya-Plasencia Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 69 | 2018 |
Quantum key-recovery on full AEZ X Bonnetain Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 56 | 2018 |
Improved classical and quantum algorithms for subset-sum X Bonnetain, R Bricout, A Schrottenloher, Y Shen Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 45 | 2020 |
Quantum linearization attacks X Bonnetain, G Leurent, M Naya-Plasencia, A Schrottenloher Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 42 | 2021 |
QCB: efficient quantum-secure authenticated encryption R Bhaumik, X Bonnetain, A Chailloux, G Leurent, M Naya-Plasencia, ... International Conference on the Theory and Application of Cryptology and …, 2021 | 30 | 2021 |
Quantum Period Finding against Symmetric Primitives in Practice X Bonnetain, S Jaques IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1), 1-27, 2020 | 28 | 2020 |
Anomalies and vector space search: Tools for S-box analysis X Bonnetain, L Perrin, S Tian Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 25* | 2019 |
Beyond quadratic speedups in quantum attacks on symmetric schemes X Bonnetain, A Schrottenloher, F Sibleyras Advances in Cryptology–EUROCRYPT 2022: 41st Annual International Conference …, 2022 | 24 | 2022 |
Tight bounds for Simon’s algorithm X Bonnetain International Conference on Cryptology and Information Security in Latin …, 2021 | 23* | 2021 |
Collisions on Feistel-MiMC and univariate GMiMC X Bonnetain | 21 | 2019 |
Finding Many Collisions via Reusable Quantum Walks: Application to Lattice Sieving X Bonnetain, A Chailloux, A Schrottenloher, Y Shen Advances in Cryptology–EUROCRYPT 2023: 42nd Annual International Conference …, 2023 | 17* | 2023 |
Le traçage anonyme, dangereux oxymore: Analyse de risques à destination des non-spécialistes X Bonnetain, A Canteaut, V Cortier, P Gaudry, L Hirschi, S Kremer, ... Working paper https://risques-tracage. fr, 2020 | 15* | 2020 |
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography JF Biasse, X Bonnetain, E Kirshanova, A Schrottenloher, F Song IET Information Security 17 (2), 171-209, 2023 | 13 | 2023 |
Improved Low-qubit Hidden Shift Algorithms X Bonnetain arXiv preprint arXiv:1901.11428, 2019 | 9 | 2019 |
A trade-off between classical and quantum circuit size for an attack against CSIDH JF Biasse, X Bonnetain, B Pring, A Schrottenloher, W Youmans Journal of Mathematical Cryptology 15 (1), 4-17, 2020 | 8 | 2020 |
Hidden Structures and Quantum Cryptanalysis X Bonnetain Sorbonne Université, 2019 | 5 | 2019 |