Pierre-Alain Fouque

According to our database1, Pierre-Alain Fouque authored at least 207 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
IACR Trans. Symmetric Cryptol., 2019

Close to Uniform Prime Number Generation With Fewer Random Bits.
IEEE Trans. Information Theory, 2019

Security-Efficiency Tradeoffs in Searchable Encryption.
PoPETs, 2019

The privacy of the TLS 1.3 protocol.
PoPETs, 2019

Masking Dilithium: Efficient Implementation and Side-Channel Evaluation.
IACR Cryptology ePrint Archive, 2019

Uprooting the Falcon Tree?
IACR Cryptology ePrint Archive, 2019

Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
IACR Cryptology ePrint Archive, 2019

On Recovering Affine Encodings in White-Box Implementations.
IACR Cryptology ePrint Archive, 2019

Linearly equivalent S-boxes and the Division Property.
IACR Cryptology ePrint Archive, 2019

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
IACR Cryptology ePrint Archive, 2019

Security-Efficiency Tradeoffs in Searchable Encryption - Lower Bounds and Optimal Constructions.
IACR Cryptology ePrint Archive, 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
IACR Cryptology ePrint Archive, 2019

GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited.
IACR Cryptology ePrint Archive, 2019

The privacy of the TLS 1.3 protocol.
IACR Cryptology ePrint Archive, 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019

GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Masking Dilithium - Efficient Implementation and Side-Channel Evaluation.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Revisiting and Improving Algorithms for the 3XOR Problem.
IACR Trans. Symmetric Cryptol., 2018

On Recovering Affine Encodings in White-Box Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols.
IEEE Trans. Computers, 2018

Key-Recovery Attacks on ASASA.
J. Cryptology, 2018

Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes.
IACR Cryptology ePrint Archive, 2018

LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
IACR Cryptology ePrint Archive, 2018

maskVerif: a formal tool for analyzing software and hardware masked implementations.
IACR Cryptology ePrint Archive, 2018

Masking the GLP Lattice-Based Signature Scheme at Any Order.
IACR Cryptology ePrint Archive, 2018

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptology ePrint Archive, 2018

A Formal Treatment of Accountable Proxying Over TLS.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Practical Implementation of Ring-SIS/LWE Based Signature and IBE.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Are your data gathered?
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Masking the GLP Lattice-Based Signature Scheme at Any Order.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Formal Security Proof of CMAC and Its Variants.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Pattern Matching on Encrypted Streams.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data.
IACR Cryptology ePrint Archive, 2017

Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers.
IACR Cryptology ePrint Archive, 2017

Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding.
IACR Cryptology ePrint Archive, 2017

Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme.
IACR Cryptology ePrint Archive, 2017

Fast Lattice-Based Encryption: Stretching Spring.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Anomaly Detection in Streams with Extreme Value Theory.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Content delivery over TLS: a cryptographic analysis of keyless SSL.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Revisiting Lattice Attacks on Overstretched NTRU Parameters.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L|Δ𝕂|(½) and Application to the Cryptanalysis of a FHE Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Achieving Better Privacy for the 3GPP AKA Protocol.
PoPETs, 2016

Tightly Secure Signatures From Lossy Identification Schemes.
J. Cryptology, 2016

New Second-Preimage Attacks on Hash Functions.
J. Cryptology, 2016

Comparison between Subfield and Straightforward Attacks on NTRU.
IACR Cryptology ePrint Archive, 2016

Time-Memory Trade-Off for Lattice Enumeration in a Ball.
IACR Cryptology ePrint Archive, 2016

Achieving Better Privacy for the 3GPP AKA Protocol.
IACR Cryptology ePrint Archive, 2016

Efficient and Provable White-Box Primitives.
IACR Cryptology ePrint Archive, 2016

Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures.
IACR Cryptology ePrint Archive, 2016

Computing generator in cyclotomic integer rings.
IACR Cryptology ePrint Archive, 2016

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
IACR Cryptology ePrint Archive, 2016

Cryptanalysis of the New CLT Multilinear Map over the Integers.
IACR Cryptology ePrint Archive, 2016

Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security.
IACR Cryptology ePrint Archive, 2016

Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
IACR Cryptology ePrint Archive, 2016

A Cryptographic Analysis of UMTS/LTE AKA.
IACR Cryptology ePrint Archive, 2016

Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Cryptanalysis of the New CLT Multilinear Map over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Fault Attacks on Efficient Pairing Implementations.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Strong Non-Interference and Type-Directed Higher-Order Masking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Safe-Errors on SPA Protected Implementations with the Atomicity Technique.
Proceedings of the New Codebreakers, 2016

Efficient and Provable White-Box Primitives.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing.
Proceedings of the Applied Cryptography and Network Security, 2016

A Cryptographic Analysis of UMTS/LTE AKA.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Cryptanalysis of the New Multilinear Map over the Integers.
IACR Cryptology ePrint Archive, 2015

Key-Recovery Attacks on ASASA.
IACR Cryptology ePrint Archive, 2015

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.
IACR Cryptology ePrint Archive, 2015

Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks.
IACR Cryptology ePrint Archive, 2015

Safe-Errors on SPA Protected implementations with the Atomicity Technique.
IACR Cryptology ePrint Archive, 2015

Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE.
IACR Cryptology ePrint Archive, 2015

Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES.
IACR Cryptology ePrint Archive, 2015

Improved Side-Channel Analysis of Finite-Field Multiplication.
IACR Cryptology ePrint Archive, 2015

Verified Proofs of Higher-Order Masking.
IACR Cryptology ePrint Archive, 2015

Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptology ePrint Archive, 2015

Leakage-Resilient Symmetric Encryption via Re-keying.
IACR Cryptology ePrint Archive, 2015

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.
CoRR, 2015

Guest Editorial.
Cryptography and Communications, 2015

Verified Proofs of Higher-Order Masking.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Cryptanalysis of the Co-ACD Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Improved Side-Channel Analysis of Finite-Field Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism.
Proceedings of the 10th ACM Symposium on Information, 2015

Key-Recovery Attacks on ASASA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Synthesis of Fault Attacks on Cryptographic Implementations.
IACR Cryptology ePrint Archive, 2014

Making RSA-PSS Provably Secure Against Non-Random Faults.
IACR Cryptology ePrint Archive, 2014

Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
IACR Cryptology ePrint Archive, 2014

Binary Elligator Squared.
IACR Cryptology ePrint Archive, 2014

Solving the "Isomorphism of Polynomials with Two Secrets" Problem for all Pairs of Quadratic Forms.
CoRR, 2014

Close to Uniform Prime Number Generation With Fewer Random Bits.
CoRR, 2014

Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Binary Elligator Squared.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Close to Uniform Prime Number Generation with Fewer Random Bits.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

Statistical Properties of Short RSA Distribution and Their Cryptographic Applications.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

Making RSA-PSS Provably Secure against Non-random Faults.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Synthesis of Fault Attacks on Cryptographic Implementations.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves.
Math. Comput., 2013

Attacking RSA-CRT signatures with faults on montgomery multiplication.
J. Cryptographic Engineering, 2013

Security Amplification against Meet-in-the-Middle Attacks Using Whitening.
IACR Cryptology ePrint Archive, 2013

Injective Encoding to Elliptic Curves.
IACR Cryptology ePrint Archive, 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128.
IACR Cryptology ePrint Archive, 2013

Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince.
IACR Cryptology ePrint Archive, 2013

Tightly-Secure Signatures From Lossy Identification Schemes.
IACR Cryptology ePrint Archive, 2013

Recovering Private Keys Generated with Weak PRNGs.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Security Amplification against Meet-in-the-Middle Attacks Using Whitening.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
Proceedings of the Advances in Cryptology, 2013

Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem.
Proceedings of the Advances in Cryptology, 2013

Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Time/Memory/Data Tradeoffs for Variants of the RSA Problem.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

Leakage-Resilient Symmetric Encryption via Re-keying.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Injective Encodings to Elliptic Curves.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Low-Data Complexity Attacks on AES.
IEEE Trans. Information Theory, 2012

A family of weak keys in HFE and the corresponding practical key-recovery.
J. Mathematical Cryptology, 2012

Cryptanalysis of reduced versions of the Camellia block cipher.
IET Information Security, 2012

Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.
IACR Cryptology ePrint Archive, 2012

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
IACR Cryptology ePrint Archive, 2012

Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem.
IACR Cryptology ePrint Archive, 2012

Automatic Search of Attacks on round-reduced AES and Applications.
IACR Cryptology ePrint Archive, 2012

Using faults for buffer overflow effects.
Proceedings of the ACM Symposium on Applied Computing, 2012

Indifferentiable Hashing to Barreto-Naehrig Curves.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher.
Proceedings of the Advances in Information and Computer Security, 2012

Faster Chosen-Key Distinguishers on Reduced-Round AES.
Proceedings of the Progress in Cryptology, 2012

Tightly-Secure Signatures from Lossy Identification Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Generic Indifferentiability Proofs of Hash Designs.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Close to Uniform Prime Number Generation With Fewer Random Bits.
IACR Cryptology ePrint Archive, 2011

Practical Key-recovery For All Possible Parameters of SFLASH.
IACR Cryptology ePrint Archive, 2011

New Insights on Impossible Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Automatic Search of Attacks on Round-Reduced AES and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Meet-in-the-Middle and Impossible Differential Fault Analysis on AES.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Practical Key-Recovery for All Possible Parameters of SFLASH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Cache Timing Analysis of RC4.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
IACR Cryptology ePrint Archive, 2010

Deterministic Encoding and Hashing to Odd Hyperelliptic Curves.
IACR Cryptology ePrint Archive, 2010

Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
IACR Cryptology ePrint Archive, 2010

Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves.
IACR Cryptology ePrint Archive, 2010

Security Analysis of SIMD.
IACR Cryptology ePrint Archive, 2010

Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem.
IACR Cryptology ePrint Archive, 2010

Low Data Complexity Attacks on AES.
IACR Cryptology ePrint Archive, 2010

On Some Incompatible Properties of Voting Schemes.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Security Analysis of SIMD.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Deterministic Encoding and Hashing to Odd Hyperelliptic Curves.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
Proceedings of the Progress in Cryptology, 2010

Another Look at Complementation Properties.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery).
IACR Cryptology ePrint Archive, 2009

Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem.
IACR Cryptology ePrint Archive, 2009

Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3512.
IACR Cryptology ePrint Archive, 2009

On the Security of Iterated Hashing based on Forgery-resistant Compression Functions.
IACR Cryptology ePrint Archive, 2009

Fault Attack on Schnorr Based Identification and Signature Schemes.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Optimal Randomness Extraction from a Diffie-Hellman Element.
Proceedings of the Advances in Cryptology, 2009

Practical Electromagnetic Template Attack on HMAC.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Cryptanalysis of Tweaked Versions of SMASH and Reparation.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Total Break of the l-IC Signature Scheme.
Proceedings of the Public Key Cryptography, 2008

Fault Attack onElliptic Curve Montgomery Ladder Implementation.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

Key Recovery on Hidden Monomial Multivariate Schemes.
Proceedings of the Advances in Cryptology, 2008

Second Preimage Attacks on Dithered Hash Functions.
Proceedings of the Advances in Cryptology, 2008

Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
Proceedings of the Topics in Cryptology, 2008

The Carry Leakage on the Randomized Exponent Countermeasure.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

HMAC is a randomness extractor and applications to TLS.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

On the Security of the CCM Encryption Mode and of a Slight Variant.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Automatic Search of Differential Path in MD4.
IACR Cryptology ePrint Archive, 2007

Practical Cryptanalysis of SFLASH.
IACR Cryptology ePrint Archive, 2007

Second Preimage Attacks on Dithered Hash Functions.
IACR Cryptology ePrint Archive, 2007

Cryptanalysis of SFLASH with Slightly Modified Parameters.
Proceedings of the Advances in Cryptology, 2007

Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Proceedings of the Advances in Cryptology, 2007

Practical Cryptanalysis of SFLASH.
Proceedings of the Advances in Cryptology, 2007

Cryptanalysis of the SFLASH Signature Scheme.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
An Improved LPN Algorithm.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

The Twist-AUgmented Technique for Key Exchange.
Proceedings of the Public Key Cryptography, 2006

Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Power Attack on Small RSA Public Exponent.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2005
Key Derivation and Randomness Extraction.
IACR Cryptology ePrint Archive, 2005

Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Public Key Cryptography, 2005

Differential Cryptanalysis for Multivariate Schemes.
Proceedings of the Advances in Cryptology, 2005

A Simple Threshold Authenticated Key Exchange from Short Secrets.
Proceedings of the Advances in Cryptology, 2005

2004
Password-Based Authenticated Key Exchange in the Three-Party Setting.
IACR Cryptology ePrint Archive, 2004

Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Defeating Countermeasures Based on Randomized BSD Representations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
Authenticated On-Line Encryption.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Practical Symmetric On-Line Encryption.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

On the Security of RDSA.
Proceedings of the Advances in Cryptology, 2003

The Doubling Attack - Why Upwards Is Better than Downwards.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

Attacking Unbalanced RSA-CRT Using SPA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

The Insecurity of Esign in Practical Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
CryptoComputing with Rationals.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Fully Distributed Threshold RSA under Standard Assumptions.
IACR Cryptology ePrint Archive, 2001

Practical multi-candidate election system.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

One Round Threshold Discrete-Log Key Generation without Private Channels.
Proceedings of the Public Key Cryptography, 2001

Fully Distributed Threshold RSA under Standard Assumptions.
Proceedings of the Advances in Cryptology, 2001

Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.
Proceedings of the Advances in Cryptology, 2001

2000
Sharing Decryption in the Context of Voting or Lotteries.
Proceedings of the Financial Cryptography, 2000


  Loading...