|
|
|
|---|---|---|
|
hal-01094298v1
Communication dans un congrès
Pierre-Alain Fouque, Pierre Karpman. Security Amplification against Meet-in-the-Middle Attacks Using Whitening Cryptography and Coding - 14th International Conference, Dec 2013, Oxford, United Kingdom. Springer, LNCS 8308, pp.18, 2013, IMACC 2013. <10.1007/978-3-642-45239-0_15> |
||
|
hal-01094304v1
Communication dans un congrès
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting Advances in Cryptology - 2013, May 2013, Athenes, Greece. Springer, LNCS 7881, pp.17, 2013, EUROCRYPT 2013. <10.1007/978-3-642-38348-9_23> |
||
|
hal-01093987v1
Communication dans un congrès
Sonia Belaid, Pierre-Alain Fouque, Benoit Gérard. Side-Channel Analysis of Multiplications in GF(2 128 ) Application to AES-GCM Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2014, Kaoshiung, Taiwan. Springer, LNCS 8874, pp.20, 2014, ASIACRYPT 2014. <http://des.cse.nsysu.edu.tw/asiacrypt2014/> |
||
|
hal-01094085v1
Communication dans un congrès
Daniel Augot, Pierre-Alain Fouque, Pierre Karpman. Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation Antoine Joux and Amr Youssef. Selected Areas in Cryptology - SAC 2014, Aug 2014, Montreal, Canada. Springer, 8781, pp.243-260, 2014, Lecture Notes in Computer Science. <10.1007/978-3-319-13051-4_15> |
||
|
hal-01093865v1
Communication dans un congrès
Sonia Belaid, Benoît Gérard, Pierre-Alain Fouque. Side-Channel Analysis of Multiplications in GF$(2^{128})$ Asiacrypt 2014, Dec 2014, Kaohsiung, Taiwan. Springer, 8874, 2014, Lecture Notes in Computer Science. <10.1007/978-3-662-45608-8_17> |
||
|
hal-01094301v1
Communication dans un congrès
Pierre-Alain Fouque, Damien Vergnaud, Jean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. LNCS 7936, pp.651-662, 2013, Computing and Combinatorics, 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings. <10.1007/978-3-642-38768-5_57> |
||
|
hal-01110414v1
Communication dans un congrès
Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque. Automatic Search of Attacks on Round-Reduced AES and Applications Phillip Rogaway. CRYPTO 2011 - 31st Annual Cryptology Conference, Aug 2011, Santa Barbara, CA, United States. Springer, 6841, pp.169-187, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-22792-9_10> |
||
|
hal-01110403v1
Communication dans un congrès
Patrick Derbez, Pierre-Alain Fouque, Delphine Leresteux. Meet-in-the-Middle and Impossible Differential Fault Analysis on AES Bart Preneel; Tsuyoshi Takagi. CHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. Springer, 6917, pp.274-291, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-23951-9_19> |
||
|
hal-01110389v1
Communication dans un congrès
Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux. Cache Timing Analysis of RC4 Javier Lopez; Gene Tsudik. ACNS 2011 - 9th International Conference Applied Cryptography and Network Security, Jun 2011, Nerja, Spain. Springer, 6715, pp.110-129, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-21554-4_7> |
||
|
inria-00556688v1
Communication dans un congrès
Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern. Total Break of the l-IC Signature Scheme Ronald Cramer. Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. 4939, pp.1-17, 2008, Lecture Notes in Computer Science. <10.1007/978-3-540-78440-1_1> |
||
|
inria-00556671v1
Communication dans un congrès
Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret. Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial With One Secret Problem Dario Catalano; Nelly Fazio; Rosario Gennaro; Antonio Nicolosi. 14th IACR International Conference on Practice and Theory of Public Key Cryptography - PKC 2011, Mar 2011, Taormina, Italy. Springer, 6571, pp.473-493, 2011, Lecture Notes in Computer Science. <10.1007/978-3-642-19379-8_29> |
||
|
inria-00103433v1
Communication dans un congrès
Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval. The Twist-AUgmented technique for key exchange M. Yung, Y. Dodis, Kiayias, T. Malkin. 9th International Conference on Theory and Practice of Public Key Cryptology - PKC 2006, Apr 2006, New York, USA, Springer-Verlag, 3958, pp.410-426, 2006, Lecture notes in computer science |
||
|
hal-01132195v1
Rapport
Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying [Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015 |
||
|
hal-00870453v1
Communication dans un congrès
Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128 CRYPTO 2013, Aug 2013, Santa Barbara, United States. 2013 |
||
|
hal-00870955v1
Communication dans un congrès
Michel Abdalla, Sonia Belaid, Pierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying Guido Bertoni and Jean-Sébastien Coron. Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. Springer, 8086, pp.471-488, 2013, Lecture Notes in Computer Science. <10.1007/978-3-642-40349-1_27> |
||
|
hal-01094309v1
Communication dans un congrès
Patrick Derbez, Pierre-Alain Fouque. Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES Fast Software Encryption - 20th International Workshop, 2013, Mar 2013, singapore, Singapore. Springer, LNCS 8424, pp.20, 2014, FSE 2013. <10.1007/978-3-662-43933-3_28> |
||
|
inria-00417797v1
Communication dans un congrès
Charles Bouillaguet, Pierre-Alain Fouque. Analysis of the Collision Resistance of RadioGatun using Algebraic Techniques Roberto Maria Avanzi and Liam Keliher and Francesco Sica. Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Aug 2008, Sackville, Canada. Springer, 5381, pp.245-261, 2008, Lecture Notes in Computer Science. <10.1007/978-3-642-04159-4_16> |
||
|
inria-00417796v1
Communication dans un congrès
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey et al. Second Preimage Attacks on Dithered Hash Functions Springer. Eurocrypt, Apr 2008, Istanbul, Turkey. 4965, pp.270-288, 2008, Lecture Notes in Computer Science; Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques. <http://www.springerlink.com/content/p3558g52822mmj23/>. <10.1007/978-3-540-78967-3_16> |
||
|
hal-01216699v1
Communication dans un congrès
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire et al. Verified Proofs of Higher-Order Masking Eurocrypt 2015, Apr 2015, Sofia, Bulgaria. Advances in Cryptology -- EUROCRYPT 2015, series Lecture Notes in Computer Science (9056), 2015, Advances in Cryptology -- EUROCRYPT 2015. <10.1007/978-3-662-46800-5_18> |
||
|
inria-00539538v1
Direction d'ouvrage, Proceedings
Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09) Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. <10.1007/978-3-642-01957-9> |
||
|
inria-00539539v1
Chapitre d'ouvrage
Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien Stern, Jacques Traoré. On Some Incompatible Properties of Voting Schemes D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh. Towards Trustworthy Elections, 6000, springer, pp.191--199, 2010, lncs |
||
|
hal-01410216v1
Communication dans un congrès
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire et al. Strong Non-Interference and Type-Directed Higher-Order Masking 23rd ACM Conference on Computer and Communications Security , Oct 2016, Vienne, Austria. pp.116 - 129, 2016, <10.1145/2976749.2978427> |
||
|
inria-00556673v1
Communication dans un congrès
Jérémy Jean, Pierre-Alain Fouque. Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function Antoine Joux. Fast Software Encryption, 18th International Workshop : FSE 2011, Feb 2011, Lyngby, Denmark. Springer, 6733, pp.107-127, 2011, Lecture Notes in Computer Science. <10.1007/978-3-642-21702-9_7> |
||
|
inria-00556678v1
Communication dans un congrès
Pierre-Alain Fouque, Mehdi Tibouchi. Deterministic Encoding and Hashing to Odd Hyperelliptic Curves Marc Joye and Atsuko Miyaji and Akira Otsuka. Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, 2010, Yamanaka Hot Spring, Japan. Springer, 6487, pp.265-277, 2010, Lecture Notes in Computer Science. <10.1007/978-3-642-17455-1_17> |
||
|
inria-00556674v1
Communication dans un congrès
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque. Another Look at Complementation Properties Seokhie Hong and Tetsu Iwata. Fast Software Encryption, 17th International Workshop : FSE 2010, 2010, Seoul, South Korea. Springer, 6147, pp.347-364, 2010, Lecture Notes in Computer Science. <10.1007/978-3-642-13858-4_20> |
||
|
inria-00556676v1
Communication dans un congrès
Pierre-Alain Fouque, Mehdi Tibouchi. Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves Michel Abdalla and Paulo S. L. M. Barreto. Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, 2010, Puebla, Mexico. Springer, 6212, pp.81-91, 2010, Lecture Notes in Computer Science. <10.1007/978-3-642-14712-8> |
||
|
inria-00556682v1
Communication dans un congrès
Pierre-Alain Fouque, Jacques Stern, Sebastien Zimmer. Cryptanalysis of Tweaked Versions of SMASH and Reparation Roberto Maria Avanzi and Liam Keliher and Francesco Sica. Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2009, Sackville, New Brunswick, Canada. Springer, 5381, pp.136-150, 2009, Lecture Notes in Computer Science. <10.1007/978-3-642-04159-4_9> |
||
|
inria-00556679v1
Communication dans un congrès
Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent. Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512 Alex Biryukov. Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada. Springer, 2010, Lecture Notes in Computer Science |
||
|
inria-00556681v1
Communication dans un congrès
Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette. Practical Electromagnetic Template Attack on HMAC Christophe Clavier and Kris Gaj. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, 2009, Lausanne, Switzerland. Springer, 5747, pp.66-80, 2009, Lecture Notes in Computer Science. <10.1007/978-3-642-04138-9_6> |
||
|
|
|