Publications équipe CRYPTO - 2008 -old

  1. Jacques Patarin. The coefficients H technique. In Proceedings of SAC. août 2008. BibTeX

    @inproceedings{Pata08c,
    	author = "Patarin, Jacques",
    	title = "{The coefficients H technique}",
    	booktitle = "Proceedings of SAC",
    	year = 2008,
    	series = "LNCS",
    	month = "aug",
    	publisher = "Springer-Verlag"
    }
    
  2. Yannick Seurin and Jacques Patarin. Building Secure Block Ciphers on Generic Attacks Assumptions. In Proceedings of SAC. août 2008. BibTeX

    @inproceedings{SePa08,
    	author = "Seurin, Yannick and Patarin, Jacques",
    	title = "{Building Secure Block Ciphers on Generic Attacks Assumptions}",
    	booktitle = "Proceedings of SAC",
    	year = 2008,
    	series = "LNCS",
    	month = "aug",
    	publisher = "Springer-Verlag"
    }
    
  3. Pascal Delaunay and Antoine Joux. Yet Another Attack on Vest. In Proceedings of AFRICACRYPT 5023. juin 2008, 221-235. BibTeX

    @inproceedings{DeJo08,
    	author = "Delaunay, Pascal and Joux, Antoine",
    	title = "{Yet Another Attack on Vest}",
    	booktitle = "Proceedings of AFRICACRYPT",
    	pages = "221-235",
    	year = 2008,
    	volume = 5023,
    	series = "LNCS",
    	month = "jun",
    	publisher = "Springer-Verlag"
    }
    
  4. Olivier Billet, Jacques Patarin and Yannick Seurin. Analysis of Intermediate Field Systems. In Symbolic Computation Conference. avril 2008. BibTeX

    @inproceedings{BPSe08,
    	author = "Billet, Olivier and Patarin, Jacques and Seurin, Yannick",
    	title = "{Analysis of Intermediate Field Systems}",
    	booktitle = "Symbolic Computation Conference",
    	year = 2008,
    	month = "apr"
    }
    
  5. Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi and Elisabeth Oswald. Susceptibility of eSTREAM Candidates towards Side Channel Analysis. In SASC. 2008. BibTeX

    @inproceedings{GBC+08,
    	author = "Gierlichs, Benedikt and Batina, Lejla and Clavier, Christophe and Eisenbarth, Thomas and Gouget, Aline and Handschuh, Helena and Kasper, Timo and Lemke-Rust, Kerstin and Mangard, Stefan and Moradi, Amir and Oswald, Elisabeth",
    	title = "{Susceptibility of eSTREAM Candidates towards Side Channel Analysis}",
    	booktitle = "SASC",
    	year = 2008
    }
    
  6. Christophe Clavier, Benedikt Gierlichs and Ingrid Verbauwhede. Fault Analysis Study of IDEA. In Proceedings of CT-RSA. 2008, 274-287. BibTeX

    @inproceedings{CGVe08,
    	author = "Clavier, Christophe and Gierlichs, Benedikt and Verbauwhede, Ingrid",
    	title = "{Fault Analysis Study of IDEA}",
    	booktitle = "Proceedings of CT-RSA",
    	pages = "274-287",
    	year = 2008,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  7. Stéphane Manuel and Thomas Peyrin. Collisions on SHA-0 in one Hour. In Proceedings of FSE. 2008. BibTeX

    @inproceedings{MaPe08,
    	author = "Manuel, Stéphane and Peyrin, Thomas",
    	title = "{Collisions on SHA-0 in one Hour}",
    	booktitle = "Proceedings of FSE",
    	year = 2008,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  8. Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew Robshaw and Yannick Seurin. Hash Functions and RFID Tags: Mind the Gap. In Proceedings of CHES. 2008. BibTeX

    @inproceedings{BLP+08,
    	author = "Bogdanov, Andrey and Leander, Gregor and Paar, Christof and Poschmann, Axel and Robshaw, Matthew and Seurin, Yannick",
    	title = "{Hash Functions and RFID Tags: Mind the Gap}",
    	booktitle = "Proceedings of CHES",
    	year = 2008,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  9. Henri Gilbert, Matthew Robshaw, Yannick Seurin and Shaoyi Yin. How to Encrypt with the LPN Problem. In Proceedings of ICALP. 2008. BibTeX

    @inproceedings{GRSe08,
    	author = "Gilbert, Henri and Robshaw, Matthew and Seurin, Yannick and Yin, Shaoyi",
    	title = "{How to Encrypt with the LPN Problem}",
    	booktitle = "Proceedings of ICALP",
    	year = 2008
    }
    
  10. Olivier Billet, Matthew Robshaw, Yannick Seurin and Shaoyi Yin. Looking Back at a New Hash Function. In Proceedings of ACISP. 2008. BibTeX

    @inproceedings{BRSe08,
    	author = "Billet, Olivier and Robshaw, Matthew and Seurin, Yannick and Yin, Shaoyi",
    	title = "{Looking Back at a New Hash Function}",
    	booktitle = "Proceedings of ACISP",
    	year = 2008,
    	series = "LNCS",
    	publisher = "Springer"
    }
    
  11. Henri Gilbert, Matthew Robshaw and Yannick Seurin. HB#: Increasing the Security and Efficiency of HB+. In Eurocrypt. 2008. BibTeX

    @inproceedings{GRSe08b,
    	author = "Gilbert, Henri and Robshaw, Matthew and Seurin, Yannick",
    	title = "{HB\#: Increasing the Security and Efficiency of HB+}",
    	booktitle = "Eurocrypt",
    	year = 2008
    }
    
  12. Henri Gilbert, Matthew Robshaw and Yannick Seurin. Good Variants of HB+ are Hard to Find. In Financial Crypto. 2008. BibTeX

    @inproceedings{GRSe08a,
    	author = "Gilbert, Henri and Robshaw, Matthew and Seurin, Yannick",
    	title = "{Good Variants of HB+ are Hard to Find}",
    	booktitle = "Financial Crypto",
    	year = 2008
    }
    
  13. Blandine Debraize and Louis Goubin. Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. In Proceedings of FSE. 2008. BibTeX

    @inproceedings{DeGo08,
    	author = "Debraize, Blandine and Goubin, Louis",
    	title = "{Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator}",
    	booktitle = "Proceedings of FSE",
    	year = 2008,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  14. Alexandre Berzati, Cecile Canovas-Dumas and Louis Goubin. Security against Fault Injection Attacks for CRT-RSA Implementations. In Proceedings of FDTC. 2008. BibTeX

    @inproceedings{BCGo08b,
    	author = "Berzati, Alexandre and Canovas-Dumas, Cecile and Goubin, Louis",
    	title = "{Security against Fault Injection Attacks for CRT-RSA Implementations}",
    	booktitle = "Proceedings of FDTC",
    	year = 2008,
    	publisher = "IEEE-CS Press"
    }
    
  15. Alexandre Berzati, Cecile Canovas-Dumas and Louis Goubin. Perturbating RSA Public Keys: an Improved Attack. In Proceedings of CHES. 2008. BibTeX

    @inproceedings{BCGo08a,
    	author = "Berzati, Alexandre and Canovas-Dumas, Cecile and Goubin, Louis",
    	title = "{Perturbating RSA Public Keys: an Improved Attack}",
    	booktitle = "Proceedings of CHES",
    	year = 2008,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  16. Jean-Sebastien Coron, Jacques Patarin and Yannick Seurin. The Random Oracle Model and the Ideal Cipher Model are Equivalent. In Proceedings of CRYPTO. 2008. BibTeX

    @inproceedings{CPSe08,
    	author = "Coron, Jean-Sebastien and Patarin, Jacques and Seurin, Yannick",
    	title = "{The Random Oracle Model and the Ideal Cipher Model are Equivalent}",
    	booktitle = "Proceedings of CRYPTO",
    	year = 2008,
    	series = "LNCS",
    	publisher = "Springer-Verlag"
    }
    
  17. Jacques Patarin. Proof of security in $O(2^n)$ for the Xor of two random permutations. In ICITS. 2008. BibTeX

    @inproceedings{Pata08b,
    	author = "Patarin, Jacques",
    	title = "{Proof of security in $O(2^n)$ for the Xor of two random permutations}",
    	booktitle = "ICITS",
    	year = 2008,
    	month = ""
    }
    
  18. Jacques Patarin. A proof of security in $O(2^n)$ for the Benes Scheme. In Proceedings of AFRICACRYPT 5023. 2008, 209-220. BibTeX

    @inproceedings{Pata08a,
    	author = "Patarin, Jacques",
    	title = "{A proof of security in $O(2^n)$ for the Benes Scheme}",
    	booktitle = "Proceedings of AFRICACRYPT",
    	pages = "209-220",
    	year = 2008,
    	volume = 5023,
    	series = "LNCS",
    	month = "",
    	publisher = "Springer-Verlag"
    }
    
  19. David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert and Jacques Patarin. QUAD: a multivariate stream cipher with provable security. Special Edition of the Journal of Symbolic Computation, 2008. to be published. BibTeX

    @article{ABB+08,
    	author = "Arditti, David and Berbain, Côme and Billet, Olivier and Gilbert, Henri and Patarin, Jacques",
    	title = "{QUAD: a multivariate stream cipher with provable security}",
    	journal = "Special Edition of the Journal of Symbolic Computation",
    	year = 2008,
    	editor = "Springer",
    	note = "to be published"
    }
    
  20. Paul Camion and Jacques Patarin. t-resilient functions and the partial exposure problem. Appl. Algebra Eng. Commun. Comput 19(2):99-133, 2008. BibTeX

    @article{CaPa08,
    	author = "Camion, Paul and Patarin, Jacques",
    	title = "{t-resilient functions and the partial exposure problem}",
    	journal = "Appl. Algebra Eng. Commun. Comput",
    	year = 2008,
    	volume = 19,
    	number = 2,
    	pages = "99-133"
    }
    
  21. Blandine Debraize. Méthodes de cryptanalyse pour les schémas de chiffrement symétrique. UVSQ, 2008. BibTeX

    @phdthesis{Deba08,
    	author = "Debraize, Blandine",
    	title = "Méthodes de cryptanalyse pour les schémas de chiffrement symétrique",
    	school = "UVSQ",
    	year = 2008,
    	month = ""
    }
    

 Imprimer 

DMC Firewall is developed by Dean Marshall Consultancy Ltd