Publications équipe CRYPTO - 2006

  1. Christophe Giraud. An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Transactions on Computers 55(9):1116-1120, septembre 2006. BibTeX

    @article{Gira06,
    	author = "Giraud, Christophe",
    	title = "{An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis}",
    	journal = "IEEE Transactions on Computers",
    	pages = "1116-1120",
    	year = 2006,
    	volume = 55,
    	number = 9,
    	series = "IEEE",
    	month = "sep"
    }
    
  2. David Azemard, Abdellatif Benjelloun-Touimi, Claude Delpha, Pierre Duhamel, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Alain Le Guyader, Patrice Martin and Michel Milhau. Secured Diffusionof Music on mobile : a Convincing and Practical Security Model for Content Protection. In e-Smart. 2006. BibTeX

    @inproceedings{ABD+06a,
    	author = "Azemard, David and Benjelloun-Touimi, Abdellatif and Delpha, Claude and Duhamel, Pierre and Fischer, Jean-Bernard and Fontaine, Caroline and Giraud, Christophe and Le Guyader, Alain and Martin, Patrice and Milhau, Michel",
    	title = "{Secured Diffusionof Music on mobile : a Convincing and Practical Security Model for Content Protection}",
    	booktitle = "e-Smart",
    	year = 2006
    }
    
  3. Emmanuel Prouff, Christophe Giraud and Sébastien Aumônier. Provably Secure S-Box Implementation Based on Fourier Transform. In Cryptographic Hardware and Embedded Systems, CHES 2006 4249. 2006, 216-230. BibTeX

    @inproceedings{PGAu06,
    	author = "Prouff, Emmanuel and Giraud, Christophe and Aumônier, Sébastien",
    	title = "{Provably Secure S-Box Implementation Based on Fourier Transform}",
    	booktitle = "Cryptographic Hardware and Embedded Systems, CHES 2006",
    	pages = "216-230",
    	year = 2006,
    	volume = 4249,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  4. Abdellatif Benjelloun-Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud and Michel Milhau. Enhanced Security Architecture for Music Distribution on Mobile. In 11th European Symposium on Research in Computer Security, ESORICS 2006 4189. 2006, 97-109. BibTeX

    @inproceedings{BFF+06,
    	author = "Benjelloun-Touimi, Abdellatif and Fischer, Jean-Bernard and Fontaine, Caroline and Giraud, Christophe and Milhau, Michel",
    	title = "{Enhanced Security Architecture for Music Distribution on Mobile}",
    	booktitle = "11th European Symposium on Research in Computer Security, ESORICS 2006",
    	pages = "97-109",
    	year = 2006,
    	volume = 4189,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  5. Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier and Pascal Moitrel. Case study of a fault attack on asynchronous DES cryptoprocessors. In David Naccache Luca Breveglieri Israel Koren and Jean-Pierre Seifert (eds.). Fault Diagnosis and Tolerance in Cryptography FDTC 06 4236. 2006, 88-97. BibTeX

    @inproceedings{MRL+06,
    	author = "Monnet, Yannick and Renaudin, Marc and Leveugle, Régis and Clavier, Christophe and Moitrel, Pascal",
    	title = "{Case study of a fault attack on asynchronous DES cryptoprocessors}",
    	booktitle = "Fault Diagnosis and Tolerance in Cryptography FDTC 06",
    	pages = "88-97",
    	year = 2006,
    	editor = "Luca Breveglieri, Israel Koren, David Naccache and Jean-Pierre Seifert",
    	volume = 4236,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  6. Eric Brier, Benoit Chevallier-Mames, Mathieu Ciet and Christophe Clavier. Why one should also secure RSA public key elements. In Mitsuru Matsui Louis Goubin (ed.). Cryptographic Hardware and Embedded Systems 4249. 2006, 324-338. BibTeX

    @inproceedings{BCCC06,
    	author = "Brier, Eric and Chevallier-Mames, Benoit and Ciet, Mathieu and Clavier, Christophe",
    	title = "{Why one should also secure RSA public key elements}",
    	booktitle = "Cryptographic Hardware and Embedded Systems",
    	pages = "324-338",
    	year = 2006,
    	editor = "Louis Goubin, Mitsuru Matsui",
    	volume = 4249,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  7. Frédéric Amiel, Christophe Clavier and Michael Tunstall. Fault analysis of DPA-resistant algorithms. In David Naccache Luca Breveglieri Israel Koren and Jean-Pierre Seifert (eds.). Fault Diagnosis and Tolerance in Cryptography FDTC 06 4236. 2006, 223-236. BibTeX

    @inproceedings{ACTu06,
    	author = "Amiel, Frédéric and Clavier, Christophe and Tunstall, Michael",
    	title = "{Fault analysis of DPA-resistant algorithms}",
    	booktitle = "Fault Diagnosis and Tolerance in Cryptography FDTC 06",
    	pages = "223-236",
    	year = 2006,
    	editor = "Luca Breveglieri, Israel Koren, David Naccache and Jean-Pierre Seifert",
    	volume = 4236,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  8. Nicolas Courtois, Blandine Debraize and Eric Garrido. On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. In Proceedings of Australasian Conference on Information Security and Privacy 4058. 2006, 76-86. BibTeX

    @inproceedings{CDGa06,
    	author = "Courtois, Nicolas and Debraize, Blandine and Garrido, Eric",
    	title = "{On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions}",
    	booktitle = "Proceedings of Australasian Conference on Information Security and Privacy",
    	pages = "76-86",
    	year = 2006,
    	volume = 4058,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  9. Olivier Billet and Henri Gilbert. Cryptanalysis of Rainbow. In Proceedings of Security and Cryptography for Networks 4116. 2006. 5th International Conference. BibTeX

    @inproceedings{BiGi06,
    	author = "Billet, Olivier and Gilbert, Henri",
    	title = "{Cryptanalysis of Rainbow}",
    	booktitle = "Proceedings of Security and Cryptography for Networks",
    	year = 2006,
    	volume = 4116,
    	series = "LNCS",
    	address = "Maiori, Italy",
    	month = "",
    	publisher = "Springer",
    	note = "5th International Conference"
    }
    
  10. Frédéric Muller and Thomas Peyrin. Cryptanalysis of T-Function-Based Hash Functions. In Proceedings of ICISC 4296. 2006. 9th International Conference. BibTeX

    @inproceedings{MuPe06,
    	author = "Muller, Frédéric and Peyrin, Thomas",
    	title = "{Cryptanalysis of T-Function-Based Hash Functions}",
    	booktitle = "Proceedings of ICISC",
    	year = 2006,
    	volume = 4296,
    	series = "LNCS",
    	address = "Busan, Korea",
    	month = "",
    	publisher = "Springer",
    	note = "9th International Conference"
    }
    
  11. Thomas Peyrin, Henri Gilbert, Frédéric Muller and Matthew Robshaw. Combining Compression Functions and Block Cipher-Based Hash Functions. In Proceedings of Advances in Cryptology - ASIACRYPT 4284. 2006. 12th International Conference on the Theory and Application of Cryptology and Information Security. BibTeX

    @inproceedings{PGMR06,
    	author = "Peyrin, Thomas and Gilbert, Henri and Muller, Frédéric and Robshaw, Matthew",
    	title = "{Combining Compression Functions and Block Cipher-Based Hash Functions}",
    	booktitle = "Proceedings of Advances in Cryptology - ASIACRYPT",
    	year = 2006,
    	volume = 4284,
    	series = "LNCS",
    	address = "Shanghai, China",
    	month = "",
    	publisher = "Springer",
    	note = "12th International Conference on the Theory and Application of Cryptology and Information Security"
    }
    
  12. Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DecimV2. In Proceedings of SASC. 2006. BibTeX

    @inproceedings{BBC+06,
    	author = "Berbain, Côme and Billet, Olivier and Canteaut, Anne and Courtois, Nicolas and Debraize, Blandine and Gilbert, Henri and Goubin, Louis and Gouget, Aline and Granboulan, Louis and Lauradoux, Cédric and Minier, Marine and Pornin, Thomas and Sibert, Hervé",
    	title = "{DecimV2}",
    	booktitle = "Proceedings of SASC",
    	year = 2006,
    	address = "Leuven, Belgium",
    	month = ""
    }
    
  13. Nicolas Courtois and Louis Goubin. Cryptology and Smart Cards: the Way to Go. In Proceedings of E-Smart. 2006. BibTeX

    @inproceedings{CoGo06,
    	author = "Courtois, Nicolas and Goubin, Louis",
    	title = "{Cryptology and Smart Cards: the Way to Go}",
    	booktitle = "Proceedings of E-Smart",
    	year = 2006,
    	address = "Sophia-Antipolis"
    }
    
  14. Antoine Joux and Frédéric Muller. Chosen-Ciphertext Attacks Against MOSQUITO. In Proceedings of FSE 4047. 2006, 390-404. BibTeX

    @inproceedings{JoMu06,
    	author = "Joux, Antoine and Muller, Frédéric",
    	title = "{Chosen-Ciphertext Attacks Against MOSQUITO}",
    	booktitle = "Proceedings of FSE",
    	pages = "390-404",
    	year = 2006,
    	volume = 4047,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  15. Louis Granboulan, Antoine Joux and Jacques Stern. Inverting HFE is Quasipolynomial. In Proceedings of CRYPTO 4117. 2006, 345-356. BibTeX

    @inproceedings{GJSt06,
    	author = "Granboulan, Louis and Joux, Antoine and Stern, Jacques",
    	title = "{Inverting HFE is Quasipolynomial}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "345-356",
    	year = 2006,
    	volume = 4117,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  16. Antoine Joux, Reynald Lercier, Nigel Smart and Frederik Vercauteren. The Number Field Sieve in the Medium Prime Case. In Proceedings of CRYPTO 4117. 2006, 326-344. BibTeX

    @inproceedings{JLSV06,
    	author = "Joux, Antoine and Lercier, Reynald and Smart, Nigel and Vercauteren, Frederik",
    	title = "{The Number Field Sieve in the Medium Prime Case}",
    	booktitle = "Proceedings of CRYPTO",
    	pages = "326-344",
    	year = 2006,
    	volume = 4117,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  17. Antoine Joux and Pascal Delaunay. Galois LFSR, Embedded Devices and Side Channel Weaknesses. In Proceedings of INDOCRYPT 4329. 2006, 436-451. BibTeX

    @inproceedings{JoDe06,
    	author = "Joux, Antoine and Delaunay, Pascal",
    	title = "{Galois LFSR, Embedded Devices and Side Channel Weaknesses}",
    	booktitle = "Proceedings of INDOCRYPT",
    	pages = "436-451",
    	year = 2006,
    	volume = 4329,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  18. Côme Berbain, Henri Gilbert and Jacques Patarin. Quad: a Practical Stream Cipher with Provable Security. In Proceedings of EUROCRYPT 4004. 2006, 109-128. BibTeX

    @inproceedings{BGPa06,
    	author = "Berbain, Côme and Gilbert, Henri and Patarin, Jacques",
    	title = "{Quad: a Practical Stream Cipher with Provable Security}",
    	booktitle = "Proceedings of EUROCRYPT",
    	pages = "109-128",
    	year = 2006,
    	volume = 4004,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  19. Antoine Joux and Reynald Lercier. The Function Field Sieve in the Medium Prime Case. In Proceedings of EUROCRYPT 4004. 2006, 254-270. BibTeX

    @inproceedings{JoLe06,
    	author = "Joux, Antoine and Lercier, Reynald",
    	title = "{The Function Field Sieve in the Medium Prime Case}",
    	booktitle = "Proceedings of EUROCRYPT",
    	pages = "254-270",
    	year = 2006,
    	volume = 4004,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  20. Jacques Patarin and Berbain Côme Nachef Valérie and. Generic attacks on unbalanced Feistel Schemes with contracting functions. In Proceedings of ASIACRYPT 4284. 2006, 396-411. BibTeX

    @inproceedings{PNBe06,
    	author = "Patarin, Jacques and Nachef, Valérie and, Berbain, Côme",
    	title = "{Generic attacks on unbalanced Feistel Schemes with contracting functions}",
    	booktitle = "Proceedings of ASIACRYPT",
    	pages = "396-411",
    	year = 2006,
    	volume = 4284,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  21. Louis Goubin. La Sécurité Multimédia. Chapter Cartes à puces, Hermes Science, 2006. BibTeX

    @inbook{Goub06,
    	author = "Goubin, Louis",
    	title = "La Sécurité Multimédia",
    	chapter = "Cartes à puces",
    	publisher = "Hermes Science",
    	year = 2006
    }
    
  22. Louis Goubin and Mitsuru Matsui (eds.). Proceedings of the CHES'2006 conference (Cryptographic Hardware and Embedded Systems) 4249. Springer-Verlag, 2006. BibTeX

    @proceedings{GoMa06,
    	editor = "Goubin, Louis and Matsui, Mitsuru",
    	title = "Proceedings of the CHES'2006 conference (Cryptographic Hardware and Embedded Systems)",
    	booktitle = "CHESS'06",
    	publisher = "Springer-Verlag",
    	series = "Lecture Notes in Computer Science",
    	volume = 4249,
    	year = 2006
    }
    
  23. Audrey Montreuil. Mariage et Papillons (calcul multi-parties et schéma de Benes revisité). UVSQ, 2006. BibTeX

    @phdthesis{Mont06,
    	author = "Montreuil, Audrey",
    	title = "Mariage et Papillons (calcul multi-parties et schéma de Benes revisité)",
    	school = "UVSQ",
    	year = 2006,
    	month = ""
    }
    

 Imprimer  E-mail

DMC Firewall is a Joomla Security extension!