Research

Journal Papers

  • Christina Boura, Virginie Lallemand, Maria Naya-Plasencia and Valentin Suder. "Making the impossible possible". Journal of Cryptology 2017, to appear. pdf
  • Christina Boura, Anne Canteaut, Lars R. Knudsen and Gregor Leander. "Reflection ciphers". Designs, Codes and Cryptography 82(1-2): 3-25, 2017. pdf
  • Christina Boura and Anne Canteaut. "On the influence of the algebraic degree of $F^{-1}$ on the algebraic degree of $G \circ F$." IEEE Transactions on Information Theory 59(1): 691-702, 2013. pdf

​Papers in International Peer-Reviewed Conference Proceedings

  • Christina Boura and Anne Canteaut. "Another view of the division property". In CRYPTO 2016, , volume 9814 of Lecture Notes in Computer Science (Part I), pages 654-682, 2016. pdf, slidesvideo
  • Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany and Valentin Suder. "Key Recovery Attack against 2.5-round pi-Cipher". In Fast Software Encryption-FSE 2016, volume 8783 of Lecture Notes in Computer Science, pages 535-553, 2016. pdf
  • Christina Boura, Maria Naya-Plasencia and Valentin Suder. "Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon". In ASIACRYPT 2014,  volume 8873 of Lecture Notes in Computer Science, pages 179-199, 2014. pdf
  • Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen and Jingyuan Zhao. "Key Difference Invariant Bias in Block Ciphers". In ASIACRYPT 2013,  volume 8269 of Lecture Notes in Computer Science, pages 357-376, 2013. pdf, slides
  • Christina Boura and Anne Canteaut. "A new criterion for avoiding the propagation of linear relations through an Sbox." In Fast Software Encryption-FSE 2013, volume 8424 of Lecture Notes in Computer Science, pages 585-604, 2013pdf, slides, video
  • Christina Boura, Sylvain Lévêque and David Vigilant. "Side-Channel Analysis of Grøstl and Skein". In the Proceedings of the 2nd International Workshop on Trustworthy Embedded Devices-TrustED 2012, IEEE Symposium on Security and Privacy, pages 6-26, May 2012. pdf
  • Christina Boura, Anne Canteaut and Christophe De Cannière. "Higher-Order Differential Properties of Keccak and Luffa". In Fast Software Encryption-FSE 2011, volume 6733 of Lecture Notes in Computer Science, pages 252-269, 2011. pdf, slides
  • Christina Boura and Anne Canteaut. "Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256". In Selected Areas in Cryptography-SAC 2010, volume 6544 of Lecture Notes in Computer Science, pages 1-17 2010. pdf, slides
  • Christina Boura and Anne Canteaut. "A zero-sum property for the Keccak-f permutation with 18 rounds". In International Symposium on Information Theory-ISIT 2010, pages 2488-2492, IEEE 2010. pdf, slides 

Papers in International Workshops

  • Christina Boura, Anne Canteaut, Lars R. Knudsen and Gregor Leander. "Reflection ciphers". In Proceedings of the Ninth International Workshop on Coding and Cryptography (WCC) 2015, Paris, April 13-17, 2015. pdf, slides
  • Vincent Grosso, Christina Boura, Benoît Gérard and François-Xavier Standaert. "A note on the Empirical Evaluation of Security Margins against Algebraic Attacks (with Application to Low Cost Ciphers LED and Piccolo)". In Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux, pages 52-59, Boekelo, The Netherlands, May 2012. pdf
  • Christina Boura and Anne Canteaut. "On the Algebraic Degree of some SHA-3 Candidates". In Proceedings of the Third SHA-3 Candidate Conference, Washington D.C, March 22-23, 2012. pdf, slides
  • Christina Boura and Anne Canteaut. "On the Algebraic Degree of Iterated Permutations". Finite Fields and Applications-Fq10, Gent, Belgium, July 2011.

     

Technical Reports

  • Christina Boura. "Analyse de fonctions de hachage cryptographiques". PhD thesis (in French) 2012. pdf, slides.
  • Christina Boura. "D2.1: Intermediate results on physical analysis of phase 2 candidates". Technical report for the French National ANR Project SAPHIR2 (Security Analysis of Hash Functions), July 2012. pdf
  • Christina Boura and Jérémy Jean. "D2.2/D3.1: Final results on cryptanalysis of NIST hash candidates". Technical report for the French National ANR Project SAPHIR2 (Security Analysis of Hash Functions), November 2012. pdf
  • Christina Boura, Bart Mennink, Maria Naya Plasencia and Christian Rechberger "D.SYM.11: Final Hash Functions Status Report". Technical Repport for ECRYPT II, January 2013. pdf

Invited Talks and Seminars

  • November 24, 2015. "The division property: A new attack against block ciphers". Seminar of the group Algebra and Geometry, LMV, UVSQ, invited presentation. slides 
  • October 1, 2015. "Understanding the division property". Invited talk at 5th Asian Workshop on Symmetric Key Cryptography - ASK 2015, Singapour. slides 
  • June 12, 2015. "Improving impossible differential cryptanalysis". Séminaire CCA (Codage, Cryptologie, Algorithmes), Paris, France, invited presentation. slides
  • January 9, 2015. "Algebraic properties of SHA-3 and notable cryptanalysis results". Invited talk at International Conference on Mathematics and Computing - ICMC 2015, Haldia, India. slides 
  • November 29, 2012. "The new standard for hash functions". Seminar of the group Combinatoire et Algorithmes, Rennes, invited presentation. slides
  • January 15, 2012. "New bounds on the algebraic degree of iterated permutations." Cryptography Seminar of Rennes, invited presentation. slides
  • November 15, 2011. "Cryptographic Hash Functions". INRIA's Junior Seminar. slides
  • November 10, 2011. "New bounds on the algebraic degree of iterated permutations." Cryptography Seminar of Caen, invited presentation. slides

 

Summer Schools

Program Committees