Pierre-Alain Fouque

Orcid: 0000-0003-4997-2276

Affiliations:
  • Rennes University, France


According to our database1, Pierre-Alain Fouque authored at least 199 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Avengers assemble! Supervised learning meets lattice reduction - A single power trace attack against CRYSTALS-Kyber Key Generation.
Dataset, September, 2025

Avengers assemble! Supervised learning meets lattice reduction - A single power trace attack against CRYSTALS-Kyber Key Generation.
Dataset, September, 2025

Avengers assemble! Supervised learning meets lattice reduction - A single power trace attack against CRYSTALS-Kyber Key Generation.
Dataset, July, 2025

Avengers assemble! Supervised learning meets lattice reduction A single power trace attack against CRYSTALS-Kyber Key Generation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

Faster Quantum Algorithms for MQ2 and Applications.
IACR Commun. Cryptol., 2025

GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses.
Proceedings of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

Reducing the Number of Qubits in Quantum Factoring.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Subversion-resilient Key-exchange in the Post-quantum World.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Key Committing Attacks against AES-based AEAD Schemes.
IACR Trans. Symmetric Cryptol., 2024

New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes.
IACR Cryptol. ePrint Arch., 2024

A reduction from Hawk to the principal ideal problem in a quaternion algebra.
IACR Cryptol. ePrint Arch., 2024

"These results must be false": A usability evaluation of constant-time analysis tools.
Proceedings of the 33rd USENIX Security Symposium, 2024

Reducing the Number of Qubits in Quantum Information Set Decoding.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Computing <i>e</i>-th roots in number fields.
Proceedings of the Symposium on Algorithm Engineering and Experiments, 2024

2023
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME.
Proc. Priv. Enhancing Technol., October, 2023

Rectangular Attack on VOX.
IACR Cryptol. ePrint Arch., 2023

A Generic Transform from Multi-round Interactive Proof to NIZK.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
BAT: Small and Fast KEM over NTRU Lattices.
IACR Cryptol. ePrint Arch., 2022

Exploring Widevine for Fun and Profit.
Proceedings of the 43rd IEEE Security and Privacy, 2022

"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

WideLeak: How Over-the-Top Platforms Fail in Android.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021

Fake Near Collisions Attacks.
IACR Cryptol. ePrint Arch., 2021

Increasing Precision of Division Property.
IACR Cryptol. ePrint Arch., 2021

MLS Group Messaging: How Zero-Knowledge Can Secure Updates.
Proceedings of the Computer Security - ESORICS 2021, 2021

How to (Legally) Keep Secrets from Mobile Operators.
Proceedings of the Computer Security - ESORICS 2021, 2021

Towards Faster Polynomial-Time Lattice Reduction.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

SSE and SSD: Page-Efficient Searchable Symmetric Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
J. Cryptogr. Eng., 2020

Getting Rid of Linear Algebra in Number Theory Problems.
IACR Cryptol. ePrint Arch., 2020

The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10.
IACR Cryptol. ePrint Arch., 2020

Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020

Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)).
IACR Cryptol. ePrint Arch., 2020

Netspot: a simple Intrusion Detection System with statistical learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Designing Reverse Firewalls for the Real World.
Proceedings of the Computer Security - ESORICS 2020, 2020

Fast Reduction of Algebraic Lattices over Cyclotomic Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Multi-Device for Signal.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Security-Efficiency Tradeoffs in Searchable Encryption.
Proc. Priv. Enhancing Technol., 2019

Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond.
IACR Cryptol. ePrint Arch., 2019

Uprooting the Falcon Tree?
IACR Cryptol. ePrint Arch., 2019

Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2019

On Recovering Affine Encodings in White-Box Implementations.
IACR Cryptol. ePrint Arch., 2019

Linearly equivalent S-boxes and the Division Property.
IACR Cryptol. ePrint Arch., 2019

Security-Efficiency Tradeoffs in Searchable Encryption - Lower Bounds and Optimal Constructions.
IACR Cryptol. ePrint Arch., 2019

The privacy of the TLS 1.3 protocol.
IACR Cryptol. ePrint Arch., 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019

GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Masking Dilithium - Efficient Implementation and Side-Channel Evaluation.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Revisiting and Improving Algorithms for the 3XOR Problem.
IACR Trans. Symmetric Cryptol., 2018

Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols.
IEEE Trans. Computers, 2018

maskVerif: a formal tool for analyzing software and hardware masked implementations.
IACR Cryptol. ePrint Arch., 2018

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptol. ePrint Arch., 2018

A Formal Treatment of Accountable Proxying Over TLS.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Practical Implementation of Ring-SIS/LWE Based Signature and IBE.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Are your data gathered?
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Masking the GLP Lattice-Based Signature Scheme at Any Order.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Formal Security Proof of CMAC and Its Variants.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Pattern Matching on Encrypted Streams.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data.
IACR Cryptol. ePrint Arch., 2017

Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding.
IACR Cryptol. ePrint Arch., 2017

Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme.
IACR Cryptol. ePrint Arch., 2017

Fast Lattice-Based Encryption: Stretching Spring.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Anomaly Detection in Streams with Extreme Value Theory.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Content delivery over TLS: a cryptographic analysis of keyless SSL.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Revisiting Lattice Attacks on Overstretched NTRU Parameters.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L<sub>|Δ𝕂|</sub>(½) and Application to the Cryptanalysis of a FHE Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
New Second-Preimage Attacks on Hash Functions.
J. Cryptol., 2016

Comparison between Subfield and Straightforward Attacks on NTRU.
IACR Cryptol. ePrint Arch., 2016

Time-Memory Trade-Off for Lattice Enumeration in a Ball.
IACR Cryptol. ePrint Arch., 2016

Achieving Better Privacy for the 3GPP AKA Protocol.
IACR Cryptol. ePrint Arch., 2016

Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures.
IACR Cryptol. ePrint Arch., 2016

Computing generator in cyclotomic integer rings.
IACR Cryptol. ePrint Arch., 2016

Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security.
IACR Cryptol. ePrint Arch., 2016

Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Cryptanalysis of the New CLT Multilinear Map over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Fault Attacks on Efficient Pairing Implementations.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Strong Non-Interference and Type-Directed Higher-Order Masking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Safe-Errors on SPA Protected Implementations with the Atomicity Technique.
Proceedings of the New Codebreakers, 2016

Efficient and Provable White-Box Primitives.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing.
Proceedings of the Applied Cryptography and Network Security, 2016

A Cryptographic Analysis of UMTS/LTE AKA.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Cryptanalysis of the New Multilinear Map over the Integers.
IACR Cryptol. ePrint Arch., 2015

Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptol. ePrint Arch., 2015

Guest Editorial.
Cryptogr. Commun., 2015

Verified Proofs of Higher-Order Masking.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Cryptanalysis of the Co-ACD Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Improved Side-Channel Analysis of Finite-Field Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism.
Proceedings of the 10th ACM Symposium on Information, 2015

Key-Recovery Attacks on ASASA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Solving the "Isomorphism of Polynomials with Two Secrets" Problem for all Pairs of Quadratic Forms.
CoRR, 2014

Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Binary Elligator Squared.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Close to Uniform Prime Number Generation with Fewer Random Bits.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

Statistical Properties of Short RSA Distribution and Their Cryptographic Applications.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

Making RSA-PSS Provably Secure against Non-random Faults.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Synthesis of Fault Attacks on Cryptographic Implementations.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves.
Math. Comput., 2013

Injective Encoding to Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013

Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince.
IACR Cryptol. ePrint Arch., 2013

Recovering Private Keys Generated with Weak PRNGs.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Security Amplification against Meet-in-the-Middle Attacks Using Whitening.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
Proceedings of the Advances in Cryptology, 2013

Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem.
Proceedings of the Advances in Cryptology, 2013

Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Time/Memory/Data Tradeoffs for Variants of the RSA Problem.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

Leakage-Resilient Symmetric Encryption via Re-keying.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Injective Encodings to Elliptic Curves.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Cryptanalysis of reduced versions of the Camellia block cipher.
IET Inf. Secur., 2012

Using faults for buffer overflow effects.
Proceedings of the ACM Symposium on Applied Computing, 2012

Indifferentiable Hashing to Barreto-Naehrig Curves.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher.
Proceedings of the Advances in Information and Computer Security, 2012

Faster Chosen-Key Distinguishers on Reduced-Round AES.
Proceedings of the Progress in Cryptology, 2012

Tightly-Secure Signatures from Lossy Identification Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Generic Indifferentiability Proofs of Hash Designs.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
New Insights on Impossible Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Automatic Search of Attacks on Round-Reduced AES and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Meet-in-the-Middle and Impossible Differential Fault Analysis on AES.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Practical Key-Recovery for All Possible Parameters of SFLASH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Cache Timing Analysis of RC4.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Low Data Complexity Attacks on AES.
IACR Cryptol. ePrint Arch., 2010

On Some Incompatible Properties of Voting Schemes.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Security Analysis of SIMD.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round <i>Lesamnta</i> and <i>SHAvite-3</i><sub>512</sub>.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Deterministic Encoding and Hashing to Odd Hyperelliptic Curves.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
Proceedings of the Progress in Cryptology, 2010

Another Look at Complementation Properties.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery).
IACR Cryptol. ePrint Arch., 2009

Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem.
IACR Cryptol. ePrint Arch., 2009

Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3<sub>512</sub>.
IACR Cryptol. ePrint Arch., 2009

On the Security of Iterated Hashing based on Forgery-resistant Compression Functions.
IACR Cryptol. ePrint Arch., 2009

Fault Attack on Schnorr Based Identification and Signature Schemes.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Optimal Randomness Extraction from a Diffie-Hellman Element.
Proceedings of the Advances in Cryptology, 2009

Practical Electromagnetic Template Attack on HMAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Cryptanalysis of Tweaked Versions of SMASH and Reparation.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Total Break of the <i>l</i>-IC Signature Scheme.
Proceedings of the Public Key Cryptography, 2008

Fault Attack onElliptic Curve Montgomery Ladder Implementation.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

Key Recovery on Hidden Monomial Multivariate Schemes.
Proceedings of the Advances in Cryptology, 2008

Second Preimage Attacks on Dithered Hash Functions.
Proceedings of the Advances in Cryptology, 2008

Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
Proceedings of the Topics in Cryptology, 2008

The Carry Leakage on the Randomized Exponent Countermeasure.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

HMAC is a randomness extractor and applications to TLS.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

On the Security of the CCM Encryption Mode and of a Slight Variant.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Automatic Search of Differential Path in MD4.
IACR Cryptol. ePrint Arch., 2007

Second Preimage Attacks on Dithered Hash Functions.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of SFLASH with Slightly Modified Parameters.
Proceedings of the Advances in Cryptology, 2007

Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Proceedings of the Advances in Cryptology, 2007

Practical Cryptanalysis of SFLASH.
Proceedings of the Advances in Cryptology, 2007

Cryptanalysis of the SFLASH Signature Scheme.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
An Improved LPN Algorithm.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

The Twist-AUgmented Technique for Key Exchange.
Proceedings of the Public Key Cryptography, 2006

Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Power Attack on Small RSA Public Exponent.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2005
Key Derivation and Randomness Extraction.
IACR Cryptol. ePrint Arch., 2005

Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Public Key Cryptography, 2005

Differential Cryptanalysis for Multivariate Schemes.
Proceedings of the Advances in Cryptology, 2005

A Simple Threshold Authenticated Key Exchange from Short Secrets.
Proceedings of the Advances in Cryptology, 2005

2004
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Defeating Countermeasures Based on Randomized BSD Representations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
Authenticated On-Line Encryption.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Practical Symmetric On-Line Encryption.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

On the Security of RDSA.
Proceedings of the Advances in Cryptology, 2003

The Doubling Attack - <i>Why Upwards Is Better than Downwards</i>.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

Attacking Unbalanced RSA-CRT Using SPA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

The Insecurity of Esign in Practical Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
CryptoComputing with Rationals.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Practical multi-candidate election system.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

One Round Threshold Discrete-Log Key Generation without Private Channels.
Proceedings of the Public Key Cryptography, 2001

Fully Distributed Threshold RSA under Standard Assumptions.
Proceedings of the Advances in Cryptology, 2001

Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.
Proceedings of the Advances in Cryptology, 2001

2000
Sharing Decryption in the Context of Voting or Lotteries.
Proceedings of the Financial Cryptography, 2000


  Loading...