default search action
André Schrottenloher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]André Schrottenloher, Marc Stevens:
Quantum Procedures for Nested Search Problems: with Applications in Cryptanalysis. IACR Commun. Cryptol. 1(3): 9 (2024) - [j10]Nicolas David, María Naya-Plasencia, André Schrottenloher:
Quantum impossible differential attacks: applications to AES and SKINNY. Des. Codes Cryptogr. 92(3): 723-751 (2024) - [j9]Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher:
Key Committing Attacks against AES-based AEAD Schemes. IACR Trans. Symmetric Cryptol. 2024(1): 135-157 (2024) - [j8]Xavier Bonnetain, André Schrottenloher:
Single-Query Quantum Hidden Shift Attacks. IACR Trans. Symmetric Cryptol. 2024(3): 266-297 (2024) - [c21]Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. CRYPTO (4) 2024: 105-138 - [i32]Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Factoring. IACR Cryptol. ePrint Arch. 2024: 222 (2024) - [i31]Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher:
New Models for the Cryptanalysis of ASCON. IACR Cryptol. ePrint Arch. 2024: 298 (2024) - [i30]Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. IACR Cryptol. ePrint Arch. 2024: 488 (2024) - [i29]Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Information Set Decoding. IACR Cryptol. ePrint Arch. 2024: 907 (2024) - 2023
- [j7]Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova, André Schrottenloher, Fang Song:
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. IET Inf. Secur. 17(2): 171-209 (2023) - [j6]André Schrottenloher, Marc Stevens:
Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks. IACR Trans. Symmetric Cryptol. 2023(3): 146-183 (2023) - [c20]André Schrottenloher:
Quantum Linear Key-Recovery Attacks Using the QFT. CRYPTO (5) 2023: 258-291 - [c19]Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen:
Finding Many Collisions via Reusable Quantum Walks - Application to Lattice Sieving. EUROCRYPT (5) 2023: 221-251 - [c18]Maxime Remaud, André Schrottenloher, Jean-Pierre Tillich:
Time and Query Complexity Tradeoffs for the Dihedral Coset Problem. PQCrypto 2023: 505-532 - [i28]André Schrottenloher:
Quantum Linear Key-recovery Attacks Using the QFT. IACR Cryptol. ePrint Arch. 2023: 184 (2023) - [i27]André Schrottenloher, Marc Stevens:
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks. IACR Cryptol. ePrint Arch. 2023: 816 (2023) - [i26]Xavier Bonnetain, André Schrottenloher:
Single-query Quantum Hidden Shift Attacks. IACR Cryptol. ePrint Arch. 2023: 1306 (2023) - 2022
- [c17]André Schrottenloher, Marc Stevens:
Simplified MITM Modeling for Permutations: New (Quantum) Attacks. CRYPTO (3) 2022: 717-747 - [c16]Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes. EUROCRYPT (3) 2022: 315-344 - [i25]Paul Frixons, María Naya-Plasencia, André Schrottenloher:
Quantum Boomerang Attacks and Some Applications. IACR Cryptol. ePrint Arch. 2022: 60 (2022) - [i24]André Schrottenloher, Marc Stevens:
Simplified MITM Modeling for Permutations: New (Quantum) Attacks. IACR Cryptol. ePrint Arch. 2022: 189 (2022) - [i23]Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen:
Finding many Collisions via Reusable Quantum Walks. IACR Cryptol. ePrint Arch. 2022: 676 (2022) - [i22]Nicolas David, María Naya-Plasencia, André Schrottenloher:
Quantum impossible differential attacks: Applications to AES and SKINNY. IACR Cryptol. ePrint Arch. 2022: 754 (2022) - [i21]André Schrottenloher, Marc Stevens:
A Quantum Analysis of Nested Search Problems with Applications in Cryptanalysis. IACR Cryptol. ePrint Arch. 2022: 761 (2022) - 2021
- [b1]André Schrottenloher:
Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography. (Algorithmes quantiques pour la cryptanalyse et cryptographie symétrique post-quantique). Sorbonne University, France, 2021 - [j5]Manuel Bodirsky, Jakub Rydval, André Schrottenloher:
Universal Horn Sentences and the Joint Embedding Property. Discret. Math. Theor. Comput. Sci. 23(2) (2021) - [j4]Jean-François Biasse, Xavier Bonnetain, Benjamin Pring, André Schrottenloher, William Youmans:
A trade-off between classical and quantum circuit size for an attack against CSIDH. J. Math. Cryptol. 15(1): 4-17 (2021) - [j3]Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli. J. Cryptol. 34(4): 45 (2021) - [c15]Gaëtan Leurent, Clara Pernot, André Schrottenloher:
Clustering Effect in Simon and Simeck. ASIACRYPT (1) 2021: 272-302 - [c14]Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher:
Quantum Linearization Attacks. ASIACRYPT (1) 2021: 422-452 - [c13]Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin:
QCB: Efficient Quantum-Secure Authenticated Encryption. ASIACRYPT (1) 2021: 668-698 - [c12]André Schrottenloher:
Improved Quantum Algorithms for the k-XOR Problem. SAC 2021: 311-331 - [c11]Paul Frixons, María Naya-Plasencia, André Schrottenloher:
Quantum Boomerang Attacks and Some Applications. SAC 2021: 332-352 - [i20]Manuel Bodirsky, Jakub Rydval, André Schrottenloher:
Universal Horn Sentences and the Joint Embedding Property. CoRR abs/2104.11123 (2021) - [i19]Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond quadratic speedups in quantum attacks on symmetric schemes. CoRR abs/2110.02836 (2021) - [i18]Paul Frixons, André Schrottenloher:
Quantum Security of the Legendre PRF. IACR Cryptol. ePrint Arch. 2021: 149 (2021) - [i17]André Schrottenloher:
Improved Quantum Algorithms for the k-XOR Problem. IACR Cryptol. ePrint Arch. 2021: 407 (2021) - [i16]Gaëtan Leurent, Clara Pernot, André Schrottenloher:
Clustering Effect in Simon and Simeck. IACR Cryptol. ePrint Arch. 2021: 1198 (2021) - [i15]Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher:
Quantum Linearization Attacks. IACR Cryptol. ePrint Arch. 2021: 1239 (2021) - [i14]Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond quadratic speedups in quantum attacks on symmetric schemes. IACR Cryptol. ePrint Arch. 2021: 1348 (2021) - 2020
- [j2]Anne Canteaut, Sébastien Duval, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, André Schrottenloher:
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security. IACR Trans. Symmetric Cryptol. 2020(S1): 160-207 (2020) - [c10]Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions. ASIACRYPT (1) 2020: 33-63 - [c9]Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. ASIACRYPT (2) 2020: 633-666 - [c8]Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher:
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light. CRYPTO (3) 2020: 359-388 - [c7]María Naya-Plasencia, André Schrottenloher:
Optimal Merging in Quantum k-xor and k-xor-sum Algorithms. EUROCRYPT (2) 2020: 311-340 - [c6]Xavier Bonnetain, André Schrottenloher:
Quantum Security Analysis of CSIDH. EUROCRYPT (2) 2020: 493-522 - [c5]Samuel Jaques, André Schrottenloher:
Low-Gate Quantum Golden Collision Finding. SAC 2020: 329-359 - [i13]Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. CoRR abs/2002.05276 (2020) - [i12]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm. CoRR abs/2002.12439 (2020) - [i11]Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. IACR Cryptol. ePrint Arch. 2020: 168 (2020) - [i10]Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher:
Cryptanalysis Results on Spook. IACR Cryptol. ePrint Arch. 2020: 309 (2020) - [i9]Samuel Jaques, André Schrottenloher:
Low-gate Quantum Golden Collision Finding. IACR Cryptol. ePrint Arch. 2020: 424 (2020) - [i8]Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
New results on Gimli: full-permutation distinguishers and improved collisions. IACR Cryptol. ePrint Arch. 2020: 744 (2020) - [i7]Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin:
QCB: Efficient Quantum-secure Authenticated Encryption. IACR Cryptol. ePrint Arch. 2020: 1304 (2020)
2010 – 2019
- 2019
- [j1]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
Quantum Security Analysis of AES. IACR Trans. Symmetric Cryptol. 2019(2): 55-93 (2019) - [c4]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm. ASIACRYPT (1) 2019: 552-583 - [c3]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
On Quantum Slide Attacks. SAC 2019: 492-519 - [i6]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
Quantum Security Analysis of AES. IACR Cryptol. ePrint Arch. 2019: 272 (2019) - [i5]María Naya-Plasencia, André Schrottenloher:
Optimal Merging in Quantum k-xor and k-sum Algorithms. IACR Cryptol. ePrint Arch. 2019: 501 (2019) - [i4]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm. IACR Cryptol. ePrint Arch. 2019: 614 (2019) - 2018
- [c2]Lorenzo Grassi, María Naya-Plasencia, André Schrottenloher:
Quantum Algorithms for the k -xor Problem. ASIACRYPT (1) 2018: 527-559 - [i3]Xavier Bonnetain, André Schrottenloher:
Quantum Security Analysis of CSIDH and Ordinary Isogeny-based Schemes. IACR Cryptol. ePrint Arch. 2018: 537 (2018) - [i2]Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
On Quantum Slide Attacks. IACR Cryptol. ePrint Arch. 2018: 1067 (2018) - 2017
- [c1]André Chailloux, María Naya-Plasencia, André Schrottenloher:
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography. ASIACRYPT (2) 2017: 211-240 - [i1]André Chailloux, María Naya-Plasencia, André Schrottenloher:
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2017: 847 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint