Publications équipe CRYPTO - 2008 à 2013

  1. Michael Quisquater. How to mask S-Boxes of a block cipher against side channel attacks. Focus on the AES. juin 2013. Exposé invité à l'école d'été d'Albena (Bulgarie) organisée par la KULeuven (Belgique).. BibTeX

    @misc{Quis2013,
    	author = "Michael Quisquater",
    	title = "How to mask S-Boxes of a block cipher against side channel attacks. Focus on the AES",
    	month = "June",
    	year = 2013,
    	note = "Expos\'e invit\'e \`a l'\'ecole d'\'et\'e d'Albena (Bulgarie) organis\'ee par la KULeuven (Belgique).",
    	annote = "confinv"
    }
    
  2. Emmanuel Volte, Jacques Patarin and Valrie Nachef. Zero Knowledge with Rubik's Cubes and Non-Abelian Groups. In CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings. 2013. BibTeX

    @inproceedings{VoPN2013,
    	author = "Emmanuel Volte and Jacques Patarin and Valrie Nachef",
    	title = "Zero Knowledge with Rubik's Cubes and Non-Abelian Groups",
    	booktitle = "CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings",
    	year = 2013,
    	annote = "confint"
    }
    
  3. Bastien Vayssière. Conception et cryptanalyse de primitives symétriques. Thèse, Université de Versailles-St Quentin, 2013. BibTeX

    @phdthesis{Vays2013,
    	author = "Vayssi\`ere, Bastien",
    	title = "{Conception et cryptanalyse de primitives sym\'etriques}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2013,
    	type = "Th\`ese",
    	month = "Septembre",
    	annote = "these"
    }
    
  4. Jacques Patarin. Generic Attacks for the Xor of k Random Permutations. In Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. 2013, 154-169. BibTeX

    @inproceedings{Pata2013a,
    	author = "Jacques Patarin",
    	title = "Generic Attacks for the Xor of k Random Permutations",
    	booktitle = "Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings",
    	year = 2013,
    	pages = "154-169",
    	annote = "confint"
    }
    
  5. Valerie Nachef, Emmanuel Volte and Jacques Patarin. Differential Attacks on Generalized Feistel Schemes. In CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings. 2013. BibTeX

    @inproceedings{NaVP2013,
    	author = "Valerie Nachef and Emmanuel Volte and Jacques Patarin",
    	title = "Differential Attacks on Generalized Feistel Schemes",
    	booktitle = "CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings",
    	year = 2013,
    	annote = "confint"
    }
    
  6. Ronan Lashermes, Jacques Fournier and Louis Goubin. Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults. In Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. 2013, 365-382. BibTeX

    @inproceedings{LaFG2013,
    	author = "Ronan Lashermes and Jacques Fournier and Louis Goubin",
    	title = "Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults",
    	booktitle = "Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings",
    	year = 2013,
    	pages = "365-382",
    	annote = "confint"
    }
    
  7. Rodolphe Lampe and Yannick Seurin. Tweakable Blockciphers with Asymptotically Optimal Security. In Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. 2013. BibTeX

    @inproceedings{LaSe2013b,
    	author = "Rodolphe Lampe and Yannick Seurin",
    	title = "Tweakable Blockciphers with Asymptotically Optimal Security",
    	booktitle = "Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers",
    	year = 2013,
    	annote = "confint"
    }
    
  8. Rodolphe Lampe and Yannick Seurin. How to Construct an Ideal Cipher from a Small Set of Public Permutations. In Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bangalore, India, December 1-5, 2013. Proceedings. 2013. BibTeX

    @inproceedings{LaSe2013a,
    	author = "Rodolphe Lampe and Yannick Seurin",
    	title = "How to Construct an Ideal Cipher from a Small Set of Public Permutations",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bangalore, India, December 1-5, 2013. Proceedings",
    	year = 2013,
    	annote = "confint"
    }
    
  9. Antoine Joux and Vanessa Vitse. Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on E(F$q^5$). J. Cryptology 26(1):119-143, 2013. BibTeX

    @article{JoVi2013,
    	author = "Antoine Joux and Vanessa Vitse",
    	title = "Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on E(F$q^5$)",
    	journal = "J. Cryptology",
    	year = 2013,
    	volume = 26,
    	pages = "119-143",
    	number = 1,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1007/s00145-011-9116-z"
    }
    
  10. Antoine Joux. Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields. In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. 2013, 177-193. BibTeX

    @inproceedings{Joux2013b,
    	author = "Antoine Joux",
    	title = "Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields",
    	booktitle = "Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings",
    	year = 2013,
    	pages = "177-193",
    	annote = "confint"
    }
    
  11. Antoine Joux. Revisiting Discrete Logarithms in Small/Medium Characteristic Finite Fields - (Invited Talk Abstract). Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers, 2013. BibTeX

    @misc{Joux2013a,
    	author = "Antoine Joux",
    	title = "Revisiting Discrete Logarithms in Small/Medium Characteristic Finite Fields - (Invited Talk Abstract)",
    	howpublished = "Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers",
    	year = 2013,
    	annote = "confinv"
    }
    
  12. Sorina Ionica and Antoine Joux. Pairing the volcano. Math. Comput. 82(281), 2013. BibTeX

    @article{IoJo2013,
    	author = "Sorina Ionica and Antoine Joux",
    	title = "Pairing the volcano",
    	journal = "Math. Comput.",
    	year = 2013,
    	volume = 82,
    	number = 281,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1090/S0025-5718-2012-02622-6"
    }
    
  13. Andri Ioannou, Maria Christofi and Christina Vasiliou. A Case Study of Interactive Tabletops in Education: Attitudes, Issues of Orientation and Asymmetric Collaboration. In Scaling up Learning for Sustained Impact - 8th European Conference, on Technology Enhanced Learning, EC-TEL 2013, Paphos, Cyprus, September 17-21, 2013. Proceedings. 2013, 466-471. BibTeX

    @inproceedings{IoCV2013,
    	author = "Andri Ioannou and Maria Christofi and Christina Vasiliou",
    	title = "A Case Study of Interactive Tabletops in Education: Attitudes, Issues of Orientation and Asymmetric Collaboration",
    	booktitle = "Scaling up Learning for Sustained Impact - 8th European Conference, on Technology Enhanced Learning, EC-TEL 2013, Paphos, Cyprus, September 17-21, 2013. Proceedings",
    	year = 2013,
    	pages = "466-471",
    	annote = "confint"
    }
    
  14. Louis Goubin, Ange Martinelli and Matthieu Walle. Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design. In Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22- 24, 2013. Proceedings. 2013, 240-259. BibTeX

    @inproceedings{GoMW2013,
    	author = "Louis Goubin and Ange Martinelli and Matthieu Walle",
    	title = "Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design",
    	booktitle = "Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22- 24, 2013. Proceedings",
    	year = 2013,
    	pages = "240-259",
    	annote = "confint"
    }
    
  15. Nicolas Gama. Tutorial session: implementation of Lattice algorithms and attacks. CryptoBG, 2013. BibTeX

    @misc{Gama2013,
    	author = "Nicolas Gama",
    	title = "Tutorial session: implementation of Lattice algorithms and attacks",
    	howpublished = "CryptoBG",
    	year = 2013,
    	annote = "confinv"
    }
    
  16. Pierre-Alain Fouque, Antoine Joux and Mehdi Tibouchi. Injective Encodings to Elliptic Curves. In Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. 2013, 203-218. BibTeX

    @inproceedings{FoJT2013a,
    	author = "Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi",
    	title = "Injective Encodings to Elliptic Curves",
    	booktitle = "Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings",
    	year = 2013,
    	pages = "203-218",
    	annote = "confint"
    }
    
  17. Luca De Feo, Javad Doliskani and Éric Schost. Fast algorithms for ıt l-adic towers over finite fields. In International Symposium on Symbolic and Algebraic Computation, ISSAC'13, Boston, MA, USA, June 26-29, 2013. 2013, 165-172. BibTeX

    @inproceedings{DeDS2013a,
    	author = "Luca {De Feo} and Javad Doliskani and {\'E}ric Schost",
    	title = "Fast algorithms for {\it l}-adic towers over finite fields",
    	booktitle = "International Symposium on Symbolic and Algebraic Computation, ISSAC'13, Boston, MA, USA, June 26-29, 2013",
    	year = 2013,
    	pages = "165-172",
    	annote = "confint"
    }
    
  18. Maria Christofi, Boutheina Chetali, Louis Goubin and David Vigilant. Formal verification of a CRT-RSA implementation against fault attacks. J. Cryptographic Engineering 3(3):157-167, 2013. BibTeX

    @article{CCGV2013,
    	author = "Maria Christofi and Boutheina Chetali and Louis Goubin and David Vigilant",
    	title = "Formal verification of a CRT-RSA implementation against fault attacks",
    	journal = "J. Cryptographic Engineering",
    	year = 2013,
    	volume = 3,
    	pages = "157-167",
    	number = 3,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1007/s13389-013-0049-3"
    }
    
  19. Maria Christofi. Preuves de sécurité outillées d'implémentations cryptographiques. Thèse, Université de Versailles-St Quentin, 2013. BibTeX

    @phdthesis{Chri2013,
    	author = "Christofi, Maria",
    	title = "{Preuves de s\'ecurit\'e outill\'ees d'impl\'ementations cryptographiques}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2013,
    	type = "Th\`ese",
    	month = "F\'evrier",
    	annote = "these"
    }
    
  20. Anne Canteaut, Mar\'ıa Naya-Plasencia and Bastien Vayssière. Sieve-in-the-Middle: Improved MITM Attacks. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I. 2013, 222-240. BibTeX

    @inproceedings{CaNV2013a,
    	author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia and Bastien Vayssi{\`e}re",
    	title = "Sieve-in-the-Middle: Improved MITM Attacks",
    	booktitle = "Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I",
    	year = 2013,
    	pages = "222-240",
    	annote = "confint"
    }
    
  21. Charles Bouillaguet and Bastien Vayssière. Provable Second Preimage Resistance Revisited. In Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers. 2013. BibTeX

    @inproceedings{BoVa2013,
    	author = "Charles Bouillaguet and Bastien Vayssi\`ere",
    	title = "Provable Second Preimage Resistance Revisited",
    	booktitle = "Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers",
    	year = 2013,
    	annote = "confint"
    }
    
  22. Alberto Battistello and Christophe Giraud. Fault Analysis of Infective AES Computations. In Tenth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013, FDTC 2013, Santa Barbara, CA, USA, August 20, 2013. 2013. BibTeX

    @inproceedings{BaGi2013,
    	author = "Alberto Battistello and Christophe Giraud",
    	title = "Fault Analysis of Infective AES Computations",
    	booktitle = "Tenth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013, FDTC 2013, Santa Barbara, CA, USA, August 20, 2013",
    	year = 2013,
    	annote = "confint"
    }
    
  23. Jacques Patarin. Security in O($2^n$) for the Xor of Two Random Permutations – Proof with the standard H technique. 0. BibTeX

    @techreport{Pata2013,
    	author = "Jacques Patarin",
    	title = "Security in O($2^n$) for the Xor of Two Random Permutations -- Proof with the standard H technique",
    	year = "IACR Cryptology ePrint Archive, 2013/368",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/368",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 368,
    	volume = 2013
    }
    
  24. Rodolphe Lampe and Yannick Seurin. How to Construct an Ideal Cipher from a Small Set of Public Permutations. 0. BibTeX

    @techreport{LaSe2013,
    	author = "Rodolphe Lampe and Yannick Seurin",
    	title = "How to Construct an Ideal Cipher from a Small Set of Public Permutations",
    	year = "IACR Cryptology ePrint Archive, 2013/255",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/255",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 255,
    	volume = 2013
    }
    
  25. Antoine Joux and Antoine Rojat. On Diffie-Hellman - like Security Assumptions. 0. BibTeX

    @techreport{JoRo2013,
    	author = "Antoine Joux and Antoine Rojat",
    	title = "On Diffie-Hellman - like Security Assumptions",
    	year = "IACR Cryptology ePrint Archive, 2013/291",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/291",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 291,
    	volume = 2013
    }
    
  26. Antoine Joux. A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic. 0. BibTeX

    @techreport{Joux2013,
    	author = "Antoine Joux",
    	title = "A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic",
    	year = "IACR Cryptology ePrint Archive, 2013/095",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/095",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 95,
    	volume = 2013
    }
    
  27. Pierre-Alain Fouque, Antoine Joux and Mehdi Tibouchi. Injective Encoding to Elliptic Curves. 0. BibTeX

    @techreport{FoJT2013,
    	author = "Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi",
    	title = "Injective Encoding to Elliptic Curves",
    	year = "IACR Cryptology ePrint Archive, 2013/373",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/373",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 373,
    	volume = 2013
    }
    
  28. Luca De Feo, Javad Doliskani and Éric Schost. Fast algorithms for ell-adic towers over finite fields. 0. BibTeX

    @techreport{DeDS2013,
    	author = "Luca {De Feo} and Javad Doliskani and {\'E}ric Schost",
    	title = "Fast algorithms for ell-adic towers over finite fields",
    	year = "CoRR abs/1301.6021, 2013",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://arxiv.org/abs/1301.6021",
    	journal = "CoRR",
    	volume = "abs/1301.6021"
    }
    
  29. Anne Canteaut, Mar\'ıa Naya-Plasencia and Bastien Vayssière. Sieve-in-the-Middle: Improved MITM Attacks (Full Version). 0. BibTeX

    @techreport{CaNV2013,
    	author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia and Bastien Vayssi{\`e}re",
    	title = "Sieve-in-the-Middle: Improved MITM Attacks (Full Version)",
    	year = "IACR Cryptology ePrint Archive, 2013/324",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/324",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 324,
    	volume = 2013
    }
    
  30. Razvan Barbulescu, Pierrick Gaudry, Antoine Joux and Emmanuel Thomé. A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. 0. BibTeX

    @techreport{BGJT2013,
    	author = "Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'e}",
    	title = "A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic",
    	year = "CoRR abs/1306.4244, 2013",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://arxiv.org/abs/1306.4244",
    	journal = "CoRR",
    	volume = "abs/1306.4244"
    }
    
  31. Razvan Barbulescu, Pierrick Gaudry, Antoine Joux and Emmanuel Thomé. A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. 0. BibTeX

    @techreport{BGJT2013a,
    	author = "Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'e}",
    	title = "A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic",
    	year = "IACR Cryptology ePrint Archive, 2013/400",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/400",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 400,
    	volume = 2013
    }
    

  1. Emmanuel Volte, Jacques Patarin and Valérie Nachef. Zero Knowledge with Rubik's Cubes. IACR Cryptology ePrint archive 2012, page 174, 2012. BibTeX

    @article{VPNa12,
    	author = "Volte, Emmanuel and Patarin, Jacques and Nachef, Valérie",
    	title = "{Zero Knowledge with Rubik's Cubes}",
    	journal = "{IACR Cryptology ePrint archive 2012}",
    	year = "{2012}",
    	pages = "{174}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  2. Antoine Rojat. Review of Cryptanalysis of RSA and its variants by Jason Hineck. ACM Special Interest Group on Algorithms and Computation Theory (SIGACT) - SIGACT NEWS 43(1):16-18, 2012. BibTeX

    @article{Roja12,
    	author = "Rojat, Antoine",
    	title = "{Review of Cryptanalysis of RSA and its variants by Jason Hineck}",
    	journal = "{ACM Special Interest Group on Algorithms and Computation Theory (SIGACT) - SIGACT NEWS}",
    	year = "{2012}",
    	volume = "{43}",
    	pages = "{16-18}",
    	number = "{1}",
    	booktitle = "{ACM Special Interest Group on Algorithms and Computation Theory (SIGACT) News}",
    	owner = "MOIS",
    	timestamp = "2012.12.11"
    }
    
  3. Michael Quisquater. The Hidden Side of Jean-Jacques Quisquater. Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (6805):1-2, 2012. Préface. BibTeX

    @article{Quis12,
    	author = "Quisquater, Michael",
    	title = "{The Hidden Side of Jean-Jacques Quisquater}",
    	journal = "{Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}",
    	year = "{2012}",
    	pages = "{1-2}",
    	number = "{6805}",
    	eid = "{David Naccache}",
    	note = "Préface",
    	booktitle = "{Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}",
    	editor = "{David Naccache}",
    	owner = "MOIS",
    	publisher = "{Springer}",
    	series = "{Lecture Notes in Computer Science}",
    	timestamp = "2012.12.03"
    }
    
  4. Jacques Patarin. Transfinite Cryptograhy. In International Journal of Unconventional Computing 8(1). 2012, 61-72. BibTeX

    @inproceedings{Pata12,
    	author = "Patarin, Jacques",
    	title = "{Transfinite Cryptograhy}",
    	booktitle = "{International Journal of Unconventional Computing}",
    	year = "{2012}",
    	volume = "{8}",
    	number = "{1}",
    	pages = "{61-72}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  5. Jacques Patarin. Some Transfinite Generalisations of Gödel's Incompletness Theorem. In André Nies Michael J. Dinneen Bakhadyr Khoussainov (ed.). Computation, Physics and Beyond - International Workshop on Theoretical Computer Science, WTCS 2012, Dedicated to Cristian S. Calude on the Occasion of His 60th Birthday, Auckland, New Zealand, February 21-24, 2012 (7160). 2012. Revised Selected and Invited Papers. BibTeX

    @inproceedings{Pata12a,
    	author = "Patarin, Jacques",
    	title = "{Some Transfinite Generalisations of Gödel's Incompletness Theorem}",
    	booktitle = "{Computation, Physics and Beyond - International Workshop on Theoretical Computer Science, WTCS 2012, Dedicated to Cristian S. Calude on the Occasion of His 60th Birthday, Auckland, New Zealand, February 21-24, 2012}",
    	year = "{2012}",
    	editor = "Michael J. Dinneen, Bakhadyr Khoussainov, André Nies",
    	number = "{7160}",
    	series = "{Lecture Notes in Computer Science}",
    	publisher = "{Spinger}",
    	note = "{Revised Selected and Invited Papers}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  6. Jacques Patarin, Benjamin Gittins and Joana Treger. Increasing Block Sizes Using Feistel Networks: The Example of the AES. Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday 6805:67-82, 2012. BibTeX

    @article{PGTr12,
    	author = "Patarin, Jacques and Gittins, Benjamin and Treger, Joana",
    	title = "{Increasing Block Sizes Using Feistel Networks: The Example of the AES}",
    	journal = "{Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}",
    	year = "{2012}",
    	volume = "{6805}",
    	pages = "{67-82}",
    	eid = "{David Naccache}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  7. Valérie Nachef, Jacques Patarin and Emmanuel Volte. Zero-Knowledge for Multivariate Polynomials. IACR Cryptology ePrint archive 2012, page 239, 2012. BibTeX

    @article{NPVo12a,
    	author = "Nachef, Valérie and Patarin, Jacques and Volte, Emmanuel",
    	title = "{Zero-Knowledge for Multivariate Polynomials}",
    	journal = "{IACR Cryptology ePrint archive 2012}",
    	year = "{2012}",
    	pages = "{239}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  8. Valérie Nachef, Jacques Patarin and Emmanuel Volte. Zero-Knowledge for Multivariate Polynomials. In Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings 7533. 2012, 194-213. BibTeX

    @inproceedings{NPVo12,
    	author = "Nachef, Valérie and Patarin, Jacques and Volte, Emmanuel",
    	title = "{Zero-Knowledge for Multivariate Polynomials}",
    	booktitle = "{Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}",
    	year = "{2012}",
    	volume = "{7533}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{194-213}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  9. Marcel Medwed, François-Xavier Standaert and Antoine Joux. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. In Emmanuel Prouff and Patrick Schaumont (eds.). Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012 7428. 2012, 193-212. BibTeX

    @inproceedings{MSJo12,
    	author = "Medwed, Marcel and Standaert, François-Xavier and Joux, Antoine",
    	title = "{Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs}",
    	booktitle = "{Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012}",
    	year = "{2012}",
    	editor = "Prouff,Emmanuel and Schaumont, Patrick",
    	volume = "{7428}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{193-212}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.11.09"
    }
    
  10. Avradip Mandal, Jacques Patarin and Yannick Seurin. On the Public indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. In Ronald Cramer (ed.). 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. (7194). 2012. BibTeX

    @inproceedings{MPSe12,
    	author = "Mandal, Avradip and Patarin, Jacques and Seurin, Yannick",
    	title = "{On the Public indifferentiability and Correlation Intractability of the 6-Round Feistel Construction}",
    	booktitle = "{9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.}",
    	year = "{2012}",
    	editor = "{Ronald Cramer}",
    	number = "{7194}",
    	series = "{Lecture Notes in Computer Science}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  11. Rodolphe Lampe and Jacques Patarin. Security of Feistel Schemes with New and Various Tools. IACR Cryptology ePrint archive 2012 (131), 2012. BibTeX

    @article{Lapa12a,
    	author = "Lampe, Rodolphe and Patarin, Jacques",
    	title = "{Security of Feistel Schemes with New and Various Tools}",
    	journal = "{IACR Cryptology ePrint archive 2012}",
    	year = "{2012}",
    	number = "{131}",
    	owner = "MOIS",
    	timestamp = "2012.11.08"
    }
    
  12. Rodolphe Lampe and Jacques Patarin. Analysis of Some Natural Variants of the PKP Algorithm. In Jianying Zhou (Eds.) Pierangela Samarati Wenjing Lou (ed.). SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012. 2012, 209-2014. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. BibTeX

    @inproceedings{LaPA12,
    	author = "Lampe, Rodolphe and Patarin, Jacques",
    	title = "{Analysis of Some Natural Variants of the PKP Algorithm}",
    	booktitle = "{SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012}",
    	year = "{2012}",
    	editor = "Pierangela Samarati, Wenjing Lou, Jianying Zhou (Eds.)",
    	pages = "{209-2014}",
    	publisher = "{SciTePress}",
    	note = "{SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}",
    	owner = "MOIS",
    	timestamp = "2012.11.08"
    }
    
  13. Rodolphe Lampe, Jacques Patarin and Yannick Seurin. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. In Kazue Sako Xiaoyun Wang (ed.). Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings 7658. 2012, 278-295. BibTeX

    @inproceedings{LPSe12,
    	author = "Lampe, Rodolphe and Patarin, Jacques and Seurin, Yannick",
    	title = "{An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher}",
    	booktitle = "{Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}",
    	year = "{2012}",
    	editor = "Xiaoyun Wang, Kazue Sako",
    	volume = "{7658}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{278-295}",
    	owner = "MOIS",
    	timestamp = "2012.12.03"
    }
    
  14. Antoine Joux. A Tutorial on High Performance Computing Applied to Cryptanalysis. In Thomas Johansson David Pointcheval (ed.). Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings 7237. 2012, 1-7. BibTeX

    @inproceedings{Joux12,
    	author = "Joux, Antoine",
    	title = "{A Tutorial on High Performance Computing Applied to Cryptanalysis}",
    	booktitle = "{Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}",
    	year = "{2012}",
    	editor = "David Pointcheval, Thomas Johansson",
    	volume = "{7237}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{1-7}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.11.09"
    }
    
  15. Antoine Joux and Vanessa Vitse. {Cover and Decompostion Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over §\mathbb F _ p^6}. In EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings 7237. 2012, 9-26. BibTeX

    @inproceedings{JoVi12,
    	author = "Joux, Antoine and Vitse, Vanessa",
    	title = "{Cover and Decompostion Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over §\mathbb {F} _ {p^6}}",
    	booktitle = "{EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}",
    	year = "{2012}",
    	volume = "{7237}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{9-26}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.11.09"
    }
    
  16. Nadia El Mrabet and Nicolas Gama. Efficient Multiplication over Extension Fields. In International Workshop on the Arithmetic of Finite Fields - WAIFI 2012 - Bochum, Germany. July 16-19, 2012. 2012, 136-151. BibTeX

    @inproceedings{ElGa12,
    	author = "El Mrabet, Nadia and Gama, Nicolas",
    	title = "{Efficient Multiplication over Extension Fields}",
    	booktitle = "{International Workshop on the Arithmetic of Finite Fields - WAIFI 2012 - Bochum, Germany. July 16-19, 2012}",
    	year = "{2012}",
    	pages = "{136-151}",
    	owner = "MOIS",
    	timestamp = "2012.11.30"
    }
    
  17. Maria Christofi and Aline Gouget. Formal Verification of the mERA-Based eServices with trusted Third Party Protocol. In Dimitris Gritzalis, Steven Furnell and Marianthi Theoharidou (eds.). Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology. 2012, 299-314. BibTeX

    @inproceedings{ChGo12,
    	author = "Christofi, Maria and Gouget, Aline",
    	title = "{Formal Verification of the mERA-Based eServices with trusted Third Party Protocol}",
    	booktitle = "{Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology}",
    	year = "{2012}",
    	editor = "Gritzalis, Dimitris and Furnell, Steven and Theoharidou, Marianthi",
    	pages = "{299-314}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.12.11"
    }
    
  18. Maria Christofi, Chetali Boutheina, Louis Goubin and David Vigilant. Formal Verification of an Implementation of CRT-RSA Vigilant's Algorithm. In PROOFS: Security Proofs for Embedded Systems, Leuven, Belgium, Thursday, September 13 rd, 2012. 2012. BibTeX

    @inproceedings{CBGV12,
    	author = "Christofi, Maria and Boutheina, Chetali and Goubin, Louis and Vigilant, David",
    	title = "{Formal Verification of an Implementation of CRT-RSA Vigilant's Algorithm}",
    	booktitle = "{PROOFS: Security Proofs for Embedded Systems, Leuven, Belgium, Thursday, September 13 rd, 2012}",
    	year = "{2012}",
    	owner = "MOIS",
    	timestamp = "2012.12.13"
    }
    
  19. Claude Carlet, Louis Goubin, Emmanuel Prouff, Michael Quisquater and Matthieu Rivain. {Higher-Order Masking Schemes for S - Boxes},. In Anne Canteaut (ed.). Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers 7549. 2012, 366-384. BibTeX

    @inproceedings{CGP+12,
    	author = "Carlet, Claude and Goubin, Louis and Prouff, Emmanuel and Quisquater, Michael and Rivain, Matthieu",
    	title = "{Higher-{O}rder {M}asking {S}chemes for {S} - {B}oxes},",
    	booktitle = "{Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}",
    	year = "{2012}",
    	editor = "Anne Canteaut",
    	volume = "{7549}",
    	series = "{Lecture Notes in Computer Sciences}",
    	pages = "{366-384}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.10.08"
    }
    
  20. Anne Canteaut and Maria Naya-Plasencia. Parity-Check Relations on Combination Generators. IEEE Transactions on Information Theory 58(6):3900-3911, 2012. BibTeX

    @article{CaNa12a,
    	author = "Canteaut, Anne and Naya-Plasencia, Maria",
    	title = "{Parity-Check Relations on Combination Generators}",
    	journal = "{IEEE Transactions on Information Theory}",
    	year = "{2012}",
    	volume = "{58}",
    	pages = "{3900-3911}",
    	number = "{6}",
    	owner = "MOIS",
    	timestamp = "2012.11.08"
    }
    
  21. Anne Canteaut and Maria Naya-Plasencia. Correlation Attacks on Combination Generators. In Cryptography and Communications 4(3-4). 2012, 147-171. BibTeX

    @inproceedings{CaNa12,
    	author = "Canteaut, Anne and Naya-Plasencia, Maria",
    	title = "{Correlation Attacks on Combination Generators}",
    	booktitle = "{Cryptography and Communications}",
    	year = "{2012}",
    	volume = "{4}",
    	number = "{3-4}",
    	pages = "{147-171}",
    	owner = "MOIS",
    	timestamp = "2012.11.08"
    }
    
  22. Anne Canteaut, Thomas Furh, Maria Naya-Plasencia, Pascal Paillier, Jean-René Reinhard and Marion Videau. A Unified Indifferentiability Proof for Permutation or Block Cipher-Based Hash Functions. IACR Cryptology ePrint archive 2012, page 363, 2012. BibTeX

    @article{CFN+12,
    	author = "Canteaut, Anne and Furh, Thomas and Naya-Plasencia, Maria and Paillier, Pascal and Reinhard, Jean-Ren{\'e} and Videau, Marion",
    	title = "{A Unified Indifferentiability Proof for Permutation or Block Cipher-Based Hash Functions}",
    	journal = "{IACR Cryptology ePrint archive 2012}",
    	year = "{2012}",
    	pages = "{363}",
    	owner = "MOIS",
    	timestamp = "2012.11.09"
    }
    
  23. Alexandre Berzati, Cecile Canovas-Dumas and Louis Goubin. Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems. In David Naccache (ed.). Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday 6805. 2012, 233-247. BibTeX

    @conference{BCGo12,
    	author = "Berzati, Alexandre and Canovas-Dumas, Cecile and Goubin, Louis",
    	title = "{Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems}",
    	booktitle = "{Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday }",
    	year = "{2012}",
    	editor = "{David Naccache}",
    	volume = "{6805}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{233-247}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.11.07"
    }
    
  24. Anja Becker. La Technique de représentation - Application à des problèmes difficiles en cryptographie. Université de Versailles Saint-Quentin en Yvelines, laboratoire Prism, 2012. BibTeX

    @phdthesis{ANJA12,
    	author = "Becker, Anja",
    	title = "{La Technique de représentation - Application à des problèmes difficiles en cryptographie}",
    	school = "{Université de Versailles Saint-Quentin en Yvelines, laboratoire Prism}",
    	year = "{2012}",
    	owner = "MOIS",
    	timestamp = "2012.10.26"
    }
    
  25. Anja Becker, Antoine Joux, Alexander May and Alexandre Meuer. Decoding Random Binary Linear Codes in 2n/20: How 1 + 1 = 0 Improves Information Set Decoding. In IACR Cryptology ePrint Archive 2012 2012(26). 2012. BibTeX

    @inproceedings{BJMM12a,
    	author = "Becker, Anja and Joux, Antoine and May, Alexander and Meuer, Alexandre",
    	title = "{Decoding Random Binary Linear Codes in 2n/20: How 1 + 1 = 0 Improves Information Set Decoding}",
    	booktitle = "{IACR Cryptology ePrint Archive 2012}",
    	year = "{2012}",
    	volume = "{2012}",
    	number = "{26}",
    	owner = "MOIS",
    	timestamp = "2012.11.09"
    }
    
  26. Anja Becker, Antoine Joux, Alexander May and Alexandre Meuer. Decoding Random Binary Linear Codes in 2n/20: How 1 + 1 = 0 Improves Information Set Decoding. In Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. 2012, 520-536. BibTeX

    @inproceedings{BJMM12,
    	author = "Becker, Anja and Joux, Antoine and May, Alexander and Meuer, Alexandre",
    	title = "{Decoding Random Binary Linear Codes in 2n/20: How 1 + 1 = 0 Improves Information Set Decoding}",
    	booktitle = "{Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012}",
    	year = "{2012}",
    	pages = "{520-536}",
    	owner = "MOIS",
    	timestamp = "2012.11.09"
    }
    

  1. Vanessa Vitse. Attaques algébriques du problème du logarithme discret sur courbes elliptiques. Université de Versailles-Saint-Quentin en Yvelines, laboratoire PRISM, 2011. BibTeX

    @phdthesis{Vits11,
    	author = "Vitse, Vanessa",
    	title = "{Attaques algébriques du problème du logarithme discret sur courbes elliptiques}",
    	school = "{Université de Versailles-Saint-Quentin en Yvelines, laboratoire PRISM}",
    	year = "{2011}",
    	owner = "MOIS",
    	timestamp = "2012.02.23"
    }
    
  2. Jerome Plut. On Various Families of Twisted Jacobi Quartics. In Selected Areas in Cryptography 2011. 2011, 373-383. BibTeX

    @inproceedings{PLUT11,
    	author = "Plut, Jerome",
    	title = "{On Various Families of Twisted Jacobi Quartics}",
    	booktitle = "{Selected Areas in Cryptography 2011}",
    	year = "{2011}",
    	pages = "{373-383}",
    	owner = "MOIS",
    	timestamp = "2012.11.12"
    }
    
  3. Jacques Patarin. Some Transfinite Generalisations of Gödel's Incompleteness Theorem. In Proceedings of the Hyper Net 2011 Conference 14. 2011, 113-122. BibTeX

    @inproceedings{Patar11,
    	author = "Patarin, Jacques",
    	title = "{Some Transfinite Generalisations of Gödel's Incompleteness Theorem}",
    	booktitle = "{Proceedings of the Hyper Net 2011 Conference}",
    	year = "{2011}",
    	volume = "{14}",
    	series = "{Lecture Notes in computer Sciences (LNCS)}",
    	pages = "{113-122}",
    	address = "{Turku, Finlande}",
    	month = "{June 6-10}",
    	publisher = "{TUCS}",
    	owner = "MOIS",
    	timestamp = "2011.11.28"
    }
    
  4. Valérie Nachef, Emmanuel Volte and Jacques Patarin. Differential Attacks on Generalized Feistel Schemes. IACR Cryptology ePrint, page 705, 2011. BibTeX

    @article{NVPa11,
    	author = "Nachef, Valérie and Volte, Emmanuel and Patarin, Jacques",
    	title = "{Differential Attacks on Generalized Feistel Schemes}",
    	journal = "{IACR Cryptology ePrint}",
    	year = "{2011}",
    	pages = "{705}",
    	owner = "MOIS",
    	timestamp = "2012.02.13"
    }
    
  5. Jean Martinelli. Protection d'algorithmes de chiffrement par blocs contre les attaques par canaux auxiliaires d'ordre supérieur. Université de Versailles-Saint-Quentin en Yvelines, laboratoire PRISM, 2011. BibTeX

    @phdthesis{Mart11,
    	author = "Martinelli, Jean",
    	title = "{Protection d'algorithmes de chiffrement par blocs contre les attaques par canaux auxiliaires d'ordre supérieur}",
    	school = "{Université de Versailles-Saint-Quentin en Yvelines, laboratoire PRISM}",
    	year = "{2011}",
    	owner = "MOIS",
    	timestamp = "2012.02.23"
    }
    
  6. Avradip Mandal, Jacques Patarin and Yannick Seurin. On the Public Indifferentiability and Correlation intractability of the 6-Round Feistel Construction. IACR Cryptology ePrint Archive 2011 496, 2011. BibTeX

    @article{MPSe11,
    	author = "Mandal, Avradip and Patarin, Jacques and Seurin, Yannick",
    	title = "{On the Public Indifferentiability and Correlation intractability of the 6-Round Feistel Construction}",
    	journal = "{IACR Cryptology ePrint Archive 2011}",
    	year = "{2011}",
    	volume = "{496}",
    	owner = "MOIS",
    	timestamp = "2011.11.29"
    }
    
  7. Rodolphe Lampe and Jacques Patarin. Analysis of some Natural Variants of the PKP Algorithm. IACR Cryptology ePrint Archive 2011, page 686, 2011. BibTeX

    @article{LaPa11,
    	author = "Lampe, Rodolphe and Patarin, Jacques",
    	title = "{Analysis of some Natural Variants of the PKP Algorithm}",
    	journal = "{IACR Cryptology ePrint Archive 2011}",
    	year = "{2011}",
    	pages = "{686}",
    	owner = "MOIS",
    	timestamp = "2012.02.13"
    }
    
  8. Antoine Joux and Vanessa Vitse. Cover and Decomposition Index Calculus on Elliptic Curves Made Pratical. Application to a Seemingly Secure Curve Over F p6. IACR Cryptology ePrint Archive 2011 20, 2011. BibTeX

    @article{JoVi11a,
    	author = "Joux, Antoine and Vitse, Vanessa",
    	title = "{Cover and Decomposition Index Calculus on Elliptic Curves Made Pratical. Application to a Seemingly Secure Curve Over F p6}",
    	journal = "{IACR Cryptology ePrint Archive 2011}",
    	year = "{2011}",
    	volume = "{20}",
    	owner = "MOIS",
    	timestamp = "2011.12.02"
    }
    
  9. Antoine Joux and Vanessa Vitse. A Variant of the F4 Algorithm. In CT-RSA 2011. 2011, 356-375. BibTeX

    @inproceedings{JoVi11,
    	author = "Joux, Antoine and Vitse, Vanessa",
    	title = "{A Variant of the F4 Algorithm}",
    	booktitle = "{CT-RSA 2011}",
    	year = "{2011}",
    	pages = "356-375",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  10. Antoine Joux and Renald Lercier. Number Field Sieve for the DLP. Encyclopedia of Cryptography and Security (2nd Ed.), pages 867-873, 2011. BibTeX

    @article{JoLe11,
    	author = "Joux, Antoine and Lercier, Renald",
    	title = "{Number Field Sieve for the DLP}",
    	journal = "{Encyclopedia of Cryptography and Security (2nd Ed.)}",
    	year = "{2011}",
    	pages = "{867-873}",
    	owner = "MOIS",
    	timestamp = "2011.12.02"
    }
    
  11. Antoine Joux (ed.). Fast Software Encryption. Springer, Lyngby, Denmark, 2011. Revised Selected Papers Springer. BibTeX

    @proceedings{Joux11,
    	title = "{Fast Software Encryption}",
    	year = "{2011}",
    	editor = "Joux, Antoine",
    	address = "{Lyngby, Denmark}",
    	publisher = "{Springer}",
    	note = "{Revised Selected Papers Springer}",
    	month = "{February 13-16}",
    	author = "Joux, Antoine",
    	booktitle = "18th International Workshop (FSE 2011)",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  12. David Jao and Luca De Feo. Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. (506), 2011. BibTeX

    @article{JaDe11a,
    	author = "Jao, David and De Feo, Luca",
    	title = "{Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies}",
    	year = "{2011}",
    	number = "{506}",
    	owner = "MOIS",
    	timestamp = "2012.11.06"
    }
    
  13. David Jao and Luca De Feo. Towards Quantum-Resistant Cryptosystems from Supersingular elliptic Curve Isogenies. In Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings 7071. 2011, 19-34. BibTeX

    @conference{JaDe11,
    	author = "Jao, David and De Feo, Luca",
    	title = "{Towards Quantum-Resistant Cryptosystems from Supersingular elliptic Curve Isogenies}",
    	booktitle = "{Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings}",
    	year = "{2011}",
    	volume = "{7071}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{19-34}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.11.06"
    }
    
  14. Louis Goubin, Jacques Patarin and Bo-Yin Yang. Multivariate Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.), pages 824-828, 2011. BibTeX

    @article{GPYa11a,
    	author = "Goubin, Louis and Patarin, Jacques and Yang, Bo-Yin",
    	title = "{Multivariate Cryptography}",
    	journal = "{Encyclopedia of Cryptography and Security (2nd Ed.)}",
    	year = "{2011}",
    	pages = "{824-828}",
    	owner = "MOIS",
    	timestamp = "2011.12.02"
    }
    
  15. Louis Goubin, Jacques Patarin and Bo-Yin Yang. Encyclopedia of Cryptography and Security (2nd E.). Chapter Multivariate Cryptography, pages 824-828, 2011. BibTeX

    @inbook{GPYa11,
    	chapter = "Multivariate Cryptography",
    	pages = "{824-828}",
    	title = "{Encyclopedia of Cryptography and Security (2nd E.)}",
    	year = "{2011}",
    	author = "Goubin, Louis and Patarin, Jacques and Yang, Bo-Yin",
    	owner = "MOIS",
    	timestamp = "2011.11.29"
    }
    
  16. Louis Goubin and Ange Martinelli. Protecting AES with Shamir's Secret Sharing Scheme. IACR Cryptology ePrint Archive 2011, page 516, 2011. BibTeX

    @article{GoMa11a,
    	author = "Goubin, Louis and Martinelli, Ange",
    	title = "{Protecting AES with Shamir's Secret Sharing Scheme}",
    	journal = "{IACR Cryptology ePrint Archive 2011}",
    	year = "{2011}",
    	pages = "{516}",
    	owner = "MOIS",
    	timestamp = "2011.12.02"
    }
    
  17. Louis Goubin and Ange Martinelli. Protecting AES with Shamir's Secret Sharing Scheme. In Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011). 2011, 79-94. BibTeX

    @inproceedings{GoMa11,
    	author = "Goubin, Louis and Martinelli, Ange",
    	title = "{Protecting AES with Shamir's Secret Sharing Scheme}",
    	booktitle = "{Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)}",
    	year = "{2011}",
    	pages = "{79-94}",
    	address = "{Nara, Japan}",
    	month = "{Wednesday September 28th - Saturday October 1st}",
    	owner = "MOIS",
    	timestamp = "2011.12.02"
    }
    
  18. Laurie Genelle, Emmanuel Prouff and Michael Quisquater. {Montgomery's Trick and Fast Implementation of Masked AES}. In AFRICACRYPT 2011, 4th International Conference on Cryptology in Africa 6737. 2011, 152-169. BibTeX

    @inproceedings{GPQu11a,
    	author = "Genelle, Laurie and Prouff, Emmanuel and Quisquater, Michael",
    	title = "{Montgomery's {T}rick and {F}ast {I}mplementation of {M}asked {AES}}",
    	booktitle = "{AFRICACRYPT 2011, 4th International Conference on Cryptology in Africa}",
    	year = "{2011}",
    	volume = "{6737}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{152-169}",
    	month = "{July 5-7 th}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2011.08.18"
    }
    
  19. Laurie Genelle, Emmanuel Prouff and Michael Quisquater. {Thwarting Higher - Order Side Channel Analysis with Additive and Multipicative Maskings.}. In CHES 2011 - 13 th International Workshop, proceedings 6917. 2011, 240-255. BibTeX

    @inproceedings{GPQu11,
    	author = "Genelle, Laurie and Prouff, Emmanuel and Quisquater, Michael",
    	title = "{Thwarting {H}igher - {O}rder {S}ide {C}hannel {A}nalysis with {A}dditive and {M}ultipicative {M}askings.}",
    	booktitle = "{CHES 2011 - 13 th International Workshop, proceedings}",
    	year = "{2011}",
    	volume = "{6917}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{240-255}",
    	month = "{September 28 - October 1}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2011.10.28"
    }
    
  20. Laurie Genelle, Emmanuel Prouff and Michael Quisquater. Thwarting Higher-Order Side Channel Analysis with Additive and Multipicative Maskings.. IACR Cryptology ePrint Archive 2011 425, 2011. BibTeX

    @article{GPQu11b,
    	author = "Genelle, Laurie and Prouff, Emmanuel and Quisquater, Michael",
    	title = "{Thwarting Higher-Order Side Channel Analysis with Additive and Multipicative Maskings.}",
    	journal = "{IACR Cryptology ePrint Archive 2011}",
    	year = "{2011}",
    	volume = "{425}",
    	owner = "MOIS",
    	timestamp = "2011.11.29"
    }
    
  21. Jean-Sebastien Coron, Antoine Joux, Avradip Manda, David Naccache and Mehdi Tibouchi. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. In Public Key Cryptography 2011. 2011, 147-155. BibTeX

    @inproceedings{CJM+11,
    	author = "Coron, Jean-Sebastien and Joux, Antoine and Manda,l Avradip and Naccache, David and Tibouchi, Mehdi",
    	title = "{Cryptanalysis of the RSA Subgroup Assumption from TCC 2005}",
    	booktitle = "{Public Key Cryptography 2011}",
    	year = "{2011}",
    	pages = "{147-155}",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  22. Anja Becker, Jean-Sebastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. In EUROCRYPT 2011. 2011, 364-385. BibTeX

    @inproceedings{BCJo11a,
    	author = "Becker, Anja and Coron, Jean-Sebastien and Joux, Antoine",
    	title = "{Improved Generic Algorithms for Hard Knapsacks}",
    	booktitle = "{EUROCRYPT 2011}",
    	year = "{2011}",
    	pages = "{364-385}",
    	address = "{Tallinn, Estonia}",
    	month = "{May 15th-19th}",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  23. Anja Becker, Jean-Sebastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. IACR Cryptology ePrint Archive 2011, page 474, 2011. BibTeX

    @article{BCJo11,
    	author = "Becker, Anja and Coron, Jean-Sebastien and Joux, Antoine",
    	title = "{Improved Generic Algorithms for Hard Knapsacks}",
    	journal = "{IACR Cryptology ePrint Archive 2011}",
    	year = "{2011}",
    	pages = "{474}",
    	owner = "MOIS",
    	timestamp = "2011.12.02"
    }
    
  24. Alexandre Berzati, Cecile Canovas-Dumas and Louis Goubin. Public Key Perturbation of Randomized RSA Implementations. In François-Xavier Standaert Stefan Mangard (ed.). Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings 6225. 2010, 306-319. BibTeX

    @inproceedings{BCGo10,
    	author = "Berzati, Alexandre and Canovas-Dumas, Cecile and Goubin, Louis",
    	title = "{Public Key Perturbation of Randomized RSA Implementations}",
    	booktitle = "{Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}",
    	year = "{2010}",
    	editor = "Stefan Mangard, François-Xavier Standaert",
    	volume = "{6225}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{306-319}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.11.07"
    }
    

  1. Ionica Sorinca and Antoine Joux. Pairing the Volcano. In ANTS 2010. 2010, 201-218. BibTeX

    @inproceedings{SoJo10,
    	author = "Sorinca, Ionica and Joux, Antoine",
    	title = "{Pairing the Volcano}",
    	booktitle = "{ANTS 2010}",
    	year = "{2010}",
    	pages = "{201-218}",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  2. Jacques Patarin and Valérie Nachef. I Shall Love You Until Death (Marie-Antoinette to Axel von Fersen. Cryptologia 34(2), 2010. BibTeX

    @article{PaNa10,
    	author = "Patarin, Jacques and Nachef, Valérie",
    	title = "{I Shall Love You Until Death (Marie-Antoinette to Axel von Fersen}",
    	journal = "{Cryptologia}",
    	year = "{2010}",
    	volume = "{34}",
    	number = "{2}",
    	month = "{Avril}",
    	owner = "MOIS",
    	timestamp = "2011.11.25"
    }
    
  3. Jean-Michel Masereel. Analyse de la sécurité de protocoles cryptographiques de chiffrement et de signature à base de polynômes multivariables. Laboratoire PRISM, Université de Versailles Saint-Quentin en Yvelines UFR des Sciences - bâtiment Descartes Laboratoire PRISM - 45 avenue des Etats-Unis 78035 Versailles cedex, 2010. BibTeX

    @phdthesis{Mase10,
    	author = "Masereel, Jean-Michel",
    	title = "{Analyse de la sécurité de protocoles cryptographiques de chiffrement et de signature à base de polynômes multivariables}",
    	school = "{Laboratoire PRISM}",
    	year = "{2010}",
    	address = "{Université de Versailles Saint-Quentin en Yvelines UFR des Sciences - bâtiment Descartes Laboratoire PRISM - 45 avenue des Etats-Unis 78035 Versailles cedex}",
    	month = "{décembre}",
    	owner = "MOIS",
    	timestamp = "2012.02.23"
    }
    
  4. Helene Le Cadre. Stability of Alliances between Service Providers. In Incentives, Overlays, and Economic Traffic Control, Third International WorkshopIncentives, Overlays, and Economic Traffic Control, Third International Workshop, ETM 6236. 2010, 85–92. BibTeX

    @inproceedings{Cadr10,
    	author = "Le Cadre, Helene",
    	title = "{Stability of Alliances between Service Providers}",
    	booktitle = "{Incentives, Overlays, and Economic Traffic Control, Third International WorkshopIncentives, Overlays, and Economic Traffic Control, Third International Workshop, ETM}",
    	year = "{2010}",
    	volume = "{6236}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{85--92}",
    	publisher = "{Springer}",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1007/978-3-642-15485-0_9",
    	owner = "MOIS",
    	timestamp = "2012.06.27"
    }
    
  5. Helene Le Cadre and Mustapha Bouhtou. An interconnection game between mobile network operators: Hidden information forecasting using expert advice fusion. Computer Networks 54(17):2913-2942, 2010. BibTeX

    @article{CaBo10,
    	author = "Le Cadre, Helene and Bouhtou, Mustapha",
    	title = "{An interconnection game between mobile network operators: Hidden information forecasting using expert advice fusion}",
    	journal = "{Computer Networks}",
    	year = "{2010}",
    	volume = "{54}",
    	pages = "{2913-2942}",
    	number = "{17}",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1016/j.comnet.2010.05.007",
    	owner = "MOIS",
    	timestamp = "2012.06.29"
    }
    
  6. Sorina Ionica and Antoine Joux. Pairing the Volcano. 2010. article theorie des nombres , applications cryptographiques.
    Abstract Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are $l$-isogenies. Algorithms allowing to travel on these graphs were developed by Kohel in his thesis (1996) and later on, by Fouquet and Morain (2001). However, up to now, no method was known, to predict, before taking a step on the volcano, the direction of this step. Consequently, in Kohel's and Fouquet-Morain's algorithms, we always take more steps than necessary, before choosing the right direction. Suppose we know the cardinality of the curve. Given a point $P$ of order $l$ on the elliptic curve, we develop a method to decide whether the subgroup generated by $P$ is the kernel of a horizontal isogeny, a descending or an ascending one. In most cases, our method is very efficient and gives simple algorithms, which are more efficient than previous ones. In the other cases, we show that the two methods should be combined in order to obtain efficient algorithms. URL BibTeX

    @misc{IoJo10,
    	author = "Ionica, Sorina and Joux, Antoine",
    	title = "{Pairing the Volcano}",
    	month = "{} } # Jan # { {}",
    	year = "{2010}",
    	note = "{article theorie des nombres , applications cryptographiques}",
    	abstract = "{Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are $l$-isogenies. Algorithms allowing to travel on these graphs were developed by Kohel in his thesis (1996) and later on, by Fouquet and Morain (2001). However, up to now, no method was known, to predict, before taking a step on the volcano, the direction of this step. Consequently, in Kohel's and Fouquet-Morain's algorithms, we always take more steps than necessary, before choosing the right direction. Suppose we know the cardinality of the curve. Given a point $P$ of order $l$ on the elliptic curve, we develop a method to decide whether the subgroup generated by $P$ is the kernel of a horizontal isogeny, a descending or an ascending one. In most cases, our method is very efficient and gives simple algorithms, which are more efficient than previous ones. In the other cases, we show that the two methods should be combined in order to obtain efficient algorithms.}",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM - CNRS : UMR8144 - Universit{\'e} de Versailles-Saint Quentin en Yvelines",
    	file = "version5volcan.pdf:http\://hal.archives-ouvertes.fr/hal-00448031/PDF/version5volcan.pdf:PDF",
    	hal_id = "hal-00448031",
    	keywords = "couplages, courbes elliptiques",
    	language = "Anglais",
    	owner = "MOIS",
    	timestamp = "2011.07.25",
    	url = "http://hal.archives-ouvertes.fr/hal-00448031/en/"
    }
    
  7. Laurie Genelle, Emmanuel Prouff and Michael Quisquater. {Secure Multiplicative Masking of Power Functions}. In ACNS 2010, 8th International Conference 6123. 2010, 200-217. BibTeX

    @inproceedings{GPQu10a,
    	author = "Genelle, Laurie and Prouff, Emmanuel and Quisquater, Michael",
    	title = "{Secure {M}ultiplicative {M}asking of {P}ower {F}unctions}",
    	booktitle = "{ACNS 2010, 8th International Conference}",
    	year = "{2010}",
    	volume = "{6123}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{200-217}",
    	address = "{Beijing, China}",
    	month = "{June 22-25, 2010}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2011.10.19"
    }
    
  8. Jean-Charles Faugere, Antoine Joux, Ludovic Perret and Joana Treger. New Generic Algorithms for Hard Knapsacks. In EUROCRYPT2010. 2010, 235-256. BibTeX

    @inproceedings{FJPT10a,
    	author = "Faugere, Jean-Charles and Joux, Antoine and Perret, Ludovic and Treger, Joana",
    	title = "{New Generic Algorithms for Hard Knapsacks}",
    	booktitle = "{EUROCRYPT2010}",
    	year = "{2010}",
    	pages = "235-256",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  9. Jean-Charles Faugere, Antoine Joux, Ludovic Perret and Joana Treger. Cryptanalysis of the Hidden Matrix Cryptosystem. In LATINCRYPT 2010. 2010, 241-254. BibTeX

    @inproceedings{FJPT10,
    	author = "Faugere, Jean-Charles and Joux, Antoine and Perret, Ludovic and Treger, Joana",
    	title = "{Cryptanalysis of the Hidden Matrix Cryptosystem}",
    	booktitle = "{LATINCRYPT 2010}",
    	year = "{2010}",
    	pages = "241-254",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  10. Alexandre Berzati, Cecile Canovas-Dumas and Louis Goubin. Public Key Perturbation of Randomized RSA Implementations. In François-Xavier Standaert Stefan Mangard (ed.). Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings 6225. 2010, 306-319. BibTeX

    @inproceedings{BCGo10,
    	author = "Berzati, Alexandre and Canovas-Dumas, Cecile and Goubin, Louis",
    	title = "{Public Key Perturbation of Randomized RSA Implementations}",
    	booktitle = "{Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}",
    	year = "{2010}",
    	editor = "Stefan Mangard, François-Xavier Standaert",
    	volume = "{6225}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{306-319}",
    	publisher = "{Springer}",
    	owner = "MOIS",
    	timestamp = "2012.11.07"
    }
    

  1. David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert and Jacques Patarin. QUAD: a Multivariate Stream Cipher with Provable Security. Journal of Symbolic Computation 44(12), décembre 2009. BibTeX

    @article{ABBGP+09,
    	author = "Arditti, David and Berbain, Côme and Billet, Olivier and Gilbert, Henri and Patarin, Jacques",
    	title = "{QUAD: a Multivariate Stream Cipher with Provable Security}",
    	journal = "{Journal of Symbolic Computation}",
    	year = "{2009}",
    	volume = "{44}",
    	number = "{12}",
    	month = "{December}",
    	owner = "MOIS",
    	timestamp = "2011.11.25"
    }
    
  2. Olivier Ly and Louis Goubin. {Sûreté de fonctionnement et sécurité des algorithmes cryptographiques}. Multi-system & Internet Security Cookbook (MISC) 42:6, 2009. URL BibTeX

    @article{LyGo09,
    	author = "Ly, Olivier and Goubin, Louis",
    	title = "{S{\^u}ret{\'e} de fonctionnement et s{\'e}curit{\'e} des algorithmes cryptographiques}",
    	journal = "Multi-system \& Internet Security Cookbook (MISC)",
    	year = "{2009}",
    	volume = "{42}",
    	pages = "{6}",
    	affiliation = "Laboratoire Bordelais de Recherche en Informatique - LaBRI - CNRS : UMR5800 - Universit{\'e} Sciences et Technologies - Bordeaux I - Ecole Nationale Sup{\'e}rieure d'Electronique, Informatique et Radiocommunications de Bordeaux - Universit{\'e} Victor Segalen - Bordeaux II - Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM - CNRS : UMR8144 - Universit{\'e} de Versailles-Saint Quentin en Yvelines - Universit{\'e} Versailles Saint-Quentin en Yvelines - UVSQ - Universit{\'e} de Versailles-Saint Quentin en Yvelines - Gemalto - GemAlto",
    	hal_id = "hal-00353222",
    	language = "Fran{\c c}ais",
    	url = "http://hal.archives-ouvertes.fr/hal-00353222/en/"
    }
    
  3. Antoine Joux and Stefan Lucks. Improved Generic Algorythms for 3-Collisions. In ASIACRYPT 2009. 2009, 347-363. BibTeX

    @inproceedings{JoLu09,
    	author = "Joux, Antoine and Lucks, Stefan",
    	title = "{Improved Generic Algorythms for 3-Collisions}",
    	booktitle = "{ASIACRYPT 2009}",
    	year = "{2009}",
    	pages = "{347-363}",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  4. Antoine Joux, Reynald Lercier, David Naccache and Emmanuel Thome. Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. In IMA International Conference 2009. 2009, 351-367. BibTeX

    @inproceedings{JLN+09,
    	author = "Joux, Antoine and Lercier, Reynald and Naccache, David and Thome, Emmanuel",
    	title = "{Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}",
    	booktitle = "{IMA International Conference 2009}",
    	year = "{2009}",
    	pages = "{351-367}",
    	owner = "MOIS",
    	timestamp = "2011.07.28"
    }
    
  5. Antoine Joux, Reynald Lercier, David Naccache and Emmanuel Thome. Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. In Matthew G Parker (ed.). Twelfth IMA International Conference on Cryptography and Coding 5921. 2009, 351-367. The original publication is available at www.springerlink.com.
    Abstract {This paper extends Joux-Naccache-Thomé's e-th root algorithm to the static Diffie-Hellman problem (sdhp). The new algorithm can be adapted to diverse finite fields by customizing it with an nfs-like core or an ffs-like core. In both cases, after a number of sdhp oracle queries, the attacker builds-up the ability to solve new sdhp instances unknown before the query phase. While sub-exponential, the algorithm is still significantly faster than all currently known dlp and sdhp resolution methods. We explore the applicability of the technique to various cryptosystems. The attacks were implemented in F_2^1025 and also in F_p, for a 516-bit p.} URL, DOI BibTeX

    @inproceedings{JLNT09,
    	author = "Joux, Antoine and Lercier, Reynald and Naccache, David and Thome, Emmanuel",
    	title = "{Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}",
    	booktitle = "{Twelfth IMA International Conference on Cryptography and Coding}",
    	year = "{2009}",
    	editor = "Parker, Matthew G.",
    	volume = "{5921}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{351-367}",
    	address = "{Cirencester, Royaume-Uni}",
    	publisher = "{Springer Berlin / Heidelberg}",
    	note = "{The original publication is available at www.springerlink.com}",
    	abstract = "{This paper extends Joux-Naccache-Thom{\'e}'s e-th root algorithm to the static Diffie-Hellman problem (sdhp). The new algorithm can be adapted to diverse finite fields by customizing it with an nfs-like core or an ffs-like core. In both cases, after a number of sdhp oracle queries, the attacker builds-up the ability to solve new sdhp instances unknown before the query phase. While sub-exponential, the algorithm is still significantly faster than all currently known dlp and sdhp resolution methods. We explore the applicability of the technique to various cryptosystems. The attacks were implemented in F\_{2^1025} and also in F\_p, for a 516-bit p.}",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM - CNRS : UMR8144 - Universit{\'e} de Versailles-Saint Quentin en Yvelines - Institut de Recherche Math{\'e}matique de Rennes - IRMAR - CNRS : UMR6625 - Universit{\'e} de Rennes I - {\'E}cole normale sup{\'e}rieure de Cachan - ENS Cachan - Institut National des Sciences Appliqu{\'e}es de Rennes - Universit{\'e} Rennes 2 - Laboratoire d'informatique de l'{\'e}cole normale sup{\'e}rieure - LIENS - CNRS : UMR8548 - Ecole Normale Sup{\'e}rieure de Paris - ENS Paris - CACAO (Courbes, Alg{\`e}bre, Calculs, Arithm{\'e}tique des Ordinateurs) - INRIA Lorraine - LORIA - CNRS : UMR7503 - INRIA - Universit{\'e} Henri Poincar{\'e} - Nancy I - Universit{\'e} Nancy II - Institut National Polytechnique de Lorraine",
    	audience = "internationale",
    	doi = "10.1007/978-3-642-10868-6\_21",
    	file = "DLForgeV3.pdf:http\://hal.inria.fr/inria-00337753/PDF/DLForgeV3.pdf:PDF",
    	hal_id = "inria-00337753",
    	keywords = "Discrete logarithm problem ; Static Diffie-Hellman problem ; Function Field Sieve ; Number Field Sieve",
    	language = "Anglais",
    	url = "http://hal.inria.fr/inria-00337753/en/"
    }
    
  6. Antoine Joux (ed.). Advances in Cryptology. Springer, Cologne, Germany, 2009. BibTeX

    @proceedings{Joux09,
    	title = "{Advances in Cryptology}",
    	year = "{2009}",
    	editor = "Joux, Antoine",
    	series = "{Chapman \& Hall}",
    	address = "{Cologne, Germany}",
    	publisher = "{Springer}",
    	month = "{April 26-30}",
    	author = "Joux, Antoine",
    	booktitle = "Proceedings of EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  7. Jean-Sebastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache and Pascal Paillier. Fault Attacks on RSA Signatures with Partially Unknown Messages. In CHES 2009. 2009, 444-456. BibTeX

    @inproceedings{CJ+09,
    	author = "Coron, Jean-Sebastien and Joux, Antoine and Kizhvatov, Ilya and Naccache, David and Paillier, Pascal",
    	title = "{Fault Attacks on RSA Signatures with Partially Unknown Messages}",
    	booktitle = "{CHES 2009}",
    	year = "{2009}",
    	pages = "{444-456}",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  8. Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie and Phong Q Nguyen. Factoring pq2 with Quadratic Forms. In ASIACRYPT 2009. 2009. BibTeX

    @inproceedings{CJLN09,
    	author = "Castagnos, Guilhem and Joux, Antoine and Laguillaumie, Fabien and Nguyen, Phong Q.",
    	title = "{Factoring pq2 with Quadratic Forms}",
    	booktitle = "{ASIACRYPT 2009}",
    	year = "{2009}",
    	owner = "MOIS",
    	timestamp = "2011.07.29"
    }
    
  9. Guilhem Castagnos, Alexandre Berzati, Cecile Canovas-Dumas, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier and Stephanie Salgado. Fault Analysis of Grain-128. In HOST 2009. 2009, 7-14. BibTeX

    @inproceedings{CBC+09,
    	author = "Castagnos, Guilhem and Berzati, Alexandre and Canovas-Dumas, Cecile and Debraize, Blandine and Goubin, Louis and Gouget, Aline and Paillier, Pascal and Salgado, Stephanie",
    	title = "{Fault Analysis of Grain-128}",
    	booktitle = "{HOST 2009}",
    	year = "{2009}",
    	pages = "{7-14}",
    	owner = "MOIS",
    	timestamp = "2011.07.28"
    }
    
  10. Alexandre Berzati, Cecile Canovas-Dumas and Louis Goubin. Fault Analysis of Rabbit: Toward a Secret Key Leakage. In INDOCRYPT 2009. 2009, 72-87. BibTeX

    @inproceedings{BCGo09,
    	author = "Berzati, Alexandre and Canovas-Dumas, Cecile and Goubin, Louis",
    	title = "{Fault Analysis of Rabbit: Toward a Secret Key Leakage}",
    	booktitle = "{INDOCRYPT 2009}",
    	year = "{2009}",
    	pages = "{72-87}",
    	owner = "MOIS",
    	timestamp = "2011.07.28"
    }
    
  11. Alexandre Berzati, Cecile Canovas-Dumas, Jean-Guillaume Dumas and Louis Goubin. Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable. In Marc Fischlin (ed.). Topics in Cryptology – CT-RSA 2009 5473. 2009, 414–428.
    Abstract After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications is overcome by modifying the public modulus to a number with known factorization. This fault model is justified here by a complete study of faulty prime numbers with a fixed size. The good success rate of this attack combined with its practicability raises the question of using faults for changing algebraic properties of finite field based cryptosystems. URL BibTeX

    @inproceedings{BCDG09,
    	author = "Berzati, Alexandre and Canovas-Dumas, Cecile and Dumas, Jean-Guillaume and Goubin, Louis",
    	title = "{Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable}",
    	booktitle = "{Topics in Cryptology -- CT-RSA 2009}",
    	year = "{2009}",
    	editor = "{Marc Fischlin}",
    	volume = "{5473}",
    	series = "{Lecture Notes in Computer Science}",
    	pages = "{414--428}",
    	address = "{San Francisco, {\'E}tats-Unis}",
    	publisher = "{Springer}",
    	abstract = {{After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications is overcome by modifying the public modulus to a number with known factorization. This fault model is justified here by a complete study of faulty prime numbers with a fixed size. The good success rate of this attack combined with its practicability raises the question of using faults for changing algebraic properties of finite field based cryptosystems.}},
    	affiliation = "Laboratoire d'Electronique et des Technologies de l'Information - LETI - CEA : DRT/LETI - Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM - CNRS : UMR8144 - Universit{\'e} de Versailles-Saint Quentin en Yvelines - Laboratoire Jean Kuntzmann - LJK - CNRS : UMR5224 - Universit{\'e} Joseph Fourier - Grenoble I - Universit{\'e} Pierre Mend{\`e}s-France - Grenoble II - Institut Polytechnique de Grenoble",
    	audience = "internationale",
    	file = "_laser.pdf:http\://hal.archives-ouvertes.fr/hal-00348416/PDF/rsa\\_laser.pdf:PDF",
    	hal_id = "hal-00348416",
    	keywords = {RSA ; fault attacks ; "Left-To-Right" exponentiation ; number theory.},
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00348416/en/"
    }
    

{bibtex}bibtex_crypto_2008.bib{/bibtex}

 Imprimer 

Our website is protected by DMC Firewall!