default search action
Xavier Bonnetain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Xavier Bonnetain, Virginie Lallemand:
A Note on Related-Tweakey Impossible Differential Attacks. IACR Commun. Cryptol. 1(3): 27 (2024) - [j7]Xavier Bonnetain, Margarita Cordero, Virginie Lallemand, Marine Minier, María Naya-Plasencia:
On Impossible Boomerang Attacks Application to Simon and SKINNYee. IACR Trans. Symmetric Cryptol. 2024(2): 222-253 (2024) - [j6]Xavier Bonnetain, André Schrottenloher:
Single-Query Quantum Hidden Shift Attacks. IACR Trans. Symmetric Cryptol. 2024(3): 266-297 (2024) - [c14]Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia:
Quantum Lattice Enumeration in Limited Depth. CRYPTO (6) 2024: 72-106 - [c13]Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. CRYPTO (4) 2024: 105-138 - [i25]Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. IACR Cryptol. ePrint Arch. 2024: 488 (2024) - [i24]Xavier Bonnetain, Virginie Lallemand:
A Note on Related-Tweakey Impossible Differential Attacks. IACR Cryptol. ePrint Arch. 2024: 563 (2024) - [i23]Xavier Bonnetain, Virginie Lallemand:
A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities. IACR Cryptol. ePrint Arch. 2024: 1218 (2024) - 2023
- [j5]Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova, André Schrottenloher, Fang Song:
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. IET Inf. Secur. 17(2): 171-209 (2023) - [j4]Xavier Bonnetain, Virginie Lallemand:
On Boomerang Attacks on Quadratic Feistel Ciphers New results on KATAN and Simon. IACR Trans. Symmetric Cryptol. 2023(3): 101-145 (2023) - [c12]Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen:
Finding Many Collisions via Reusable Quantum Walks - Application to Lattice Sieving. EUROCRYPT (5) 2023: 221-251 - [i22]Xavier Bonnetain, André Schrottenloher:
Single-query Quantum Hidden Shift Attacks. IACR Cryptol. ePrint Arch. 2023: 1306 (2023) - [i21]Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia:
Quantum Lattice Enumeration in Limited Depth. IACR Cryptol. ePrint Arch. 2023: 1423 (2023) - 2022
- [j3]Xavier Bonnetain, Samuel Jaques:
Quantum Period Finding against Symmetric Primitives in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 1-27 (2022) - [c11]Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes. EUROCRYPT (3) 2022: 315-344 - [i20]Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen:
Finding many Collisions via Reusable Quantum Walks. IACR Cryptol. ePrint Arch. 2022: 676 (2022) - 2021
- [j2]Jean-François Biasse, Xavier Bonnetain, Benjamin Pring, André Schrottenloher, William Youmans:
A trade-off between classical and quantum circuit size for an attack against CSIDH. J. Math. Cryptol. 15(1): 4-17 (2021) - [c10]Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher:
Quantum Linearization Attacks. ASIACRYPT (1) 2021: 422-452 - [c9]Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin:
QCB: Efficient Quantum-Secure Authenticated Encryption. ASIACRYPT (1) 2021: 668-698 - [c8]Xavier Bonnetain:
Tight Bounds for Simon's Algorithm. LATINCRYPT 2021: 3-23 - [i19]Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond quadratic speedups in quantum attacks on symmetric schemes. CoRR abs/2110.02836 (2021) - [i18]Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher:
Quantum Linearization Attacks. IACR Cryptol. ePrint Arch. 2021: 1239 (2021) - [i17]Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond quadratic speedups in quantum attacks on symmetric schemes. IACR Cryptol. ePrint Arch. 2021: 1348 (2021) - 2020
- [c7]Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. ASIACRYPT (2) 2020: 633-666 - [c6]Xavier Bonnetain, André Schrottenloher:
Quantum Security Analysis of CSIDH. EUROCRYPT (2) 2020: 493-522 - [i16]Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. CoRR abs/2002.05276 (2020) - [i15]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm. CoRR abs/2002.12439 (2020) - [i14]Xavier Bonnetain, Samuel Jaques:
Quantum Period Finding against Symmetric Primitives in Practice. CoRR abs/2011.07022 (2020) - [i13]Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. IACR Cryptol. ePrint Arch. 2020: 168 (2020) - [i12]Xavier Bonnetain:
Tight Bounds for Simon's Algorithm. IACR Cryptol. ePrint Arch. 2020: 919 (2020) - [i11]Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin:
QCB: Efficient Quantum-secure Authenticated Encryption. IACR Cryptol. ePrint Arch. 2020: 1304 (2020) - [i10]Xavier Bonnetain, Samuel Jaques:
Quantum Period Finding against Symmetric Primitives in Practice. IACR Cryptol. ePrint Arch. 2020: 1418 (2020)
2010 – 2019
- 2019
- [b1]Xavier Bonnetain:
Hidden Structures and Quantum Cryptanalysis. (Structures cachées et cryptanalyse quantique). Sorbonne University, France, 2019 - [j1]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
Quantum Security Analysis of AES. IACR Trans. Symmetric Cryptol. 2019(2): 55-93 (2019) - [c5]Xavier Bonnetain, Léo Perrin, Shizhu Tian:
Anomalies and Vector Space Search: Tools for S-Box Analysis. ASIACRYPT (1) 2019: 196-223 - [c4]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm. ASIACRYPT (1) 2019: 552-583 - [c3]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
On Quantum Slide Attacks. SAC 2019: 492-519 - [i9]Xavier Bonnetain:
Improved Low-qubit Hidden Shift Algorithms. CoRR abs/1901.11428 (2019) - [i8]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
Quantum Security Analysis of AES. IACR Cryptol. ePrint Arch. 2019: 272 (2019) - [i7]Xavier Bonnetain, Léo Perrin, Shizhu Tian:
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering. IACR Cryptol. ePrint Arch. 2019: 528 (2019) - [i6]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm. IACR Cryptol. ePrint Arch. 2019: 614 (2019) - [i5]Xavier Bonnetain:
Collisions on Feistel-MiMC and univariate GMiMC. IACR Cryptol. ePrint Arch. 2019: 951 (2019) - 2018
- [c2]Xavier Bonnetain, María Naya-Plasencia:
Hidden Shift Quantum Cryptanalysis and Implications. ASIACRYPT (1) 2018: 560-592 - [i4]Xavier Bonnetain, María Naya-Plasencia:
Hidden Shift Quantum Cryptanalysis and Implications. IACR Cryptol. ePrint Arch. 2018: 432 (2018) - [i3]Xavier Bonnetain, André Schrottenloher:
Quantum Security Analysis of CSIDH and Ordinary Isogeny-based Schemes. IACR Cryptol. ePrint Arch. 2018: 537 (2018) - [i2]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
On Quantum Slide Attacks. IACR Cryptol. ePrint Arch. 2018: 1067 (2018) - 2017
- [c1]Xavier Bonnetain:
Quantum Key-Recovery on Full AEZ. SAC 2017: 394-406 - [i1]Xavier Bonnetain:
Quantum Key-Recovery on full AEZ. IACR Cryptol. ePrint Arch. 2017: 767 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint