58 résultats  enregistrer la recherche


  • 1
  • 2
...
hal-01094298v1  Communication dans un congrès
Pierre-Alain FouquePierre KarpmanSecurity Amplification against Meet-in-the-Middle Attacks Using Whitening
Cryptography and Coding - 14th International Conference, Dec 2013, Oxford, United Kingdom. Springer, LNCS 8308, pp.18, 2013, IMACC 2013. <10.1007/978-3-642-45239-0_15>
...
hal-01094304v1  Communication dans un congrès
Patrick DerbezPierre-Alain FouqueJérémy JeanImproved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Advances in Cryptology - 2013, May 2013, Athenes, Greece. Springer, LNCS 7881, pp.17, 2013, EUROCRYPT 2013. <10.1007/978-3-642-38348-9_23>
...
hal-01093987v1  Communication dans un congrès
Sonia BelaidPierre-Alain FouqueBenoit GérardSide-Channel Analysis of Multiplications in GF(2 128 ) Application to AES-GCM
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2014, Kaoshiung, Taiwan. Springer, LNCS 8874, pp.20, 2014, ASIACRYPT 2014. <http://des.cse.nsysu.edu.tw/asiacrypt2014/>
...
hal-01094085v1  Communication dans un congrès
Daniel AugotPierre-Alain FouquePierre KarpmanDiffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Antoine Joux and Amr Youssef. Selected Areas in Cryptology - SAC 2014, Aug 2014, Montreal, Canada. Springer, 8781, pp.243-260, 2014, Lecture Notes in Computer Science. <10.1007/978-3-319-13051-4_15>
hal-01093865v1  Communication dans un congrès
Sonia BelaidBenoît GérardPierre-Alain FouqueSide-Channel Analysis of Multiplications in GF$(2^{128})$
Asiacrypt 2014, Dec 2014, Kaohsiung, Taiwan. Springer, 8874, 2014, Lecture Notes in Computer Science. <10.1007/978-3-662-45608-8_17>
...
hal-01094301v1  Communication dans un congrès
Pierre-Alain FouqueDamien VergnaudJean-Christophe ZapalowiczTime/Memory/Data Tradeoffs for Variants of the RSA Problem
Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. LNCS 7936, pp.651-662, 2013, Computing and Combinatorics, 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings. <10.1007/978-3-642-38768-5_57>
hal-01110414v1  Communication dans un congrès
Charles BouillaguetPatrick DerbezPierre-Alain FouqueAutomatic Search of Attacks on Round-Reduced AES and Applications
Phillip Rogaway. CRYPTO 2011 - 31st Annual Cryptology Conference, Aug 2011, Santa Barbara, CA, United States. Springer, 6841, pp.169-187, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-22792-9_10>
hal-01110403v1  Communication dans un congrès
Patrick DerbezPierre-Alain FouqueDelphine LeresteuxMeet-in-the-Middle and Impossible Differential Fault Analysis on AES
Bart Preneel; Tsuyoshi Takagi. CHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. Springer, 6917, pp.274-291, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-23951-9_19>
hal-01110389v1  Communication dans un congrès
Thomas ChardinPierre-Alain FouqueDelphine LeresteuxCache Timing Analysis of RC4
Javier Lopez; Gene Tsudik. ACNS 2011 - 9th International Conference Applied Cryptography and Network Security, Jun 2011, Nerja, Spain. Springer, 6715, pp.110-129, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-21554-4_7>
...
inria-00556688v1  Communication dans un congrès
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques SternTotal Break of the l-IC Signature Scheme
Ronald Cramer. Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. 4939, pp.1-17, 2008, Lecture Notes in Computer Science. <10.1007/978-3-540-78440-1_1>
...
inria-00556671v1  Communication dans un congrès
Charles BouillaguetJean-Charles FaugèrePierre-Alain FouqueLudovic PerretPractical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial With One Secret Problem
Dario Catalano; Nelly Fazio; Rosario Gennaro; Antonio Nicolosi. 14th IACR International Conference on Practice and Theory of Public Key Cryptography - PKC 2011, Mar 2011, Taormina, Italy. Springer, 6571, pp.473-493, 2011, Lecture Notes in Computer Science. <10.1007/978-3-642-19379-8_29>
...
inria-00103433v1  Communication dans un congrès
Olivier ChevassutPierre-Alain FouquePierrick GaudryDavid PointchevalThe Twist-AUgmented technique for key exchange
M. Yung, Y. Dodis, Kiayias, T. Malkin. 9th International Conference on Theory and Practice of Public Key Cryptology - PKC 2006, Apr 2006, New York, USA, Springer-Verlag, 3958, pp.410-426, 2006, Lecture notes in computer science
hal-01132195v1  Rapport
Michel AbdallaSonia BelaïdPierre-Alain FouqueLeakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
...
hal-00870453v1  Communication dans un congrès
Pierre-Alain FouqueJérémy JeanThomas PeyrinStructural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
CRYPTO 2013, Aug 2013, Santa Barbara, United States. 2013
hal-00870955v1  Communication dans un congrès
Michel AbdallaSonia BelaidPierre-Alain FouqueLeakage-Resilient Symmetric Encryption via Re-keying
Guido Bertoni and Jean-Sébastien Coron. Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. Springer, 8086, pp.471-488, 2013, Lecture Notes in Computer Science. <10.1007/978-3-642-40349-1_27>
...
hal-01094309v1  Communication dans un congrès
Patrick DerbezPierre-Alain FouqueExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
Fast Software Encryption - 20th International Workshop, 2013, Mar 2013, singapore, Singapore. Springer, LNCS 8424, pp.20, 2014, FSE 2013. <10.1007/978-3-662-43933-3_28>
...
inria-00417797v1  Communication dans un congrès
Charles BouillaguetPierre-Alain FouqueAnalysis of the Collision Resistance of RadioGatun using Algebraic Techniques
Roberto Maria Avanzi and Liam Keliher and Francesco Sica. Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Aug 2008, Sackville, Canada. Springer, 5381, pp.245-261, 2008, Lecture Notes in Computer Science. <10.1007/978-3-642-04159-4_16>
...
inria-00417796v1  Communication dans un congrès
Elena AndreevaCharles BouillaguetPierre-Alain FouqueJonathan HochJohn Kelsey et al.  Second Preimage Attacks on Dithered Hash Functions
Springer. Eurocrypt, Apr 2008, Istanbul, Turkey. 4965, pp.270-288, 2008, Lecture Notes in Computer Science; Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques. <http://www.springerlink.com/content/p3558g52822mmj23/>. <10.1007/978-3-540-78967-3_16>
hal-01216699v1  Communication dans un congrès
Gilles BartheSonia BelaïdFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire et al.  Verified Proofs of Higher-Order Masking
Eurocrypt 2015, Apr 2015, Sofia, Bulgaria. Advances in Cryptology -- EUROCRYPT 2015, series Lecture Notes in Computer Science (9056), 2015, Advances in Cryptology -- EUROCRYPT 2015. <10.1007/978-3-662-46800-5_18>
inria-00539538v1  Direction d'ouvrage, Proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien VergnaudProceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. <10.1007/978-3-642-01957-9>
...
inria-00539539v1  Chapitre d'ouvrage
Benoît Chevallier-MamesPierre-Alain FouqueDavid PointchevalJulien SternJacques TraoréOn Some Incompatible Properties of Voting Schemes
D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh. Towards Trustworthy Elections, 6000, springer, pp.191--199, 2010, lncs
...
hal-01410216v1  Communication dans un congrès
Gilles BartheSonia BelaïdFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire et al.  Strong Non-Interference and Type-Directed Higher-Order Masking
23rd ACM Conference on Computer and Communications Security , Oct 2016, Vienne, Austria. pp.116 - 129, 2016, <10.1145/2976749.2978427>
...
inria-00556673v1  Communication dans un congrès
Jérémy JeanPierre-Alain FouquePractical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Antoine Joux. Fast Software Encryption, 18th International Workshop : FSE 2011, Feb 2011, Lyngby, Denmark. Springer, 6733, pp.107-127, 2011, Lecture Notes in Computer Science. <10.1007/978-3-642-21702-9_7>
...
inria-00556678v1  Communication dans un congrès
Pierre-Alain FouqueMehdi TibouchiDeterministic Encoding and Hashing to Odd Hyperelliptic Curves
Marc Joye and Atsuko Miyaji and Akira Otsuka. Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, 2010, Yamanaka Hot Spring, Japan. Springer, 6487, pp.265-277, 2010, Lecture Notes in Computer Science. <10.1007/978-3-642-17455-1_17>
...
inria-00556674v1  Communication dans un congrès
Charles BouillaguetOrr DunkelmanGaëtan LeurentPierre-Alain FouqueAnother Look at Complementation Properties
Seokhie Hong and Tetsu Iwata. Fast Software Encryption, 17th International Workshop : FSE 2010, 2010, Seoul, South Korea. Springer, 6147, pp.347-364, 2010, Lecture Notes in Computer Science. <10.1007/978-3-642-13858-4_20>
...
inria-00556676v1  Communication dans un congrès
Pierre-Alain FouqueMehdi TibouchiEstimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Michel Abdalla and Paulo S. L. M. Barreto. Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, 2010, Puebla, Mexico. Springer, 6212, pp.81-91, 2010, Lecture Notes in Computer Science. <10.1007/978-3-642-14712-8>
...
inria-00556682v1  Communication dans un congrès
Pierre-Alain FouqueJacques SternSebastien ZimmerCryptanalysis of Tweaked Versions of SMASH and Reparation
Roberto Maria Avanzi and Liam Keliher and Francesco Sica. Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2009, Sackville, New Brunswick, Canada. Springer, 5381, pp.136-150, 2009, Lecture Notes in Computer Science. <10.1007/978-3-642-04159-4_9>
...
inria-00556679v1  Communication dans un congrès
Charles BouillaguetOrr DunkelmanPierre-Alain FouqueGaëtan LeurentAttacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
Alex Biryukov. Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada. Springer, 2010, Lecture Notes in Computer Science
...
inria-00556681v1  Communication dans un congrès
Pierre-Alain FouqueGaëtan LeurentDenis RéalFrédéric ValettePractical Electromagnetic Template Attack on HMAC
Christophe Clavier and Kris Gaj. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, 2009, Lausanne, Switzerland. Springer, 5747, pp.66-80, 2009, Lecture Notes in Computer Science. <10.1007/978-3-642-04138-9_6>
  • 1
  • 2