Publications équipe CRYPTO - 2011

Articles

  1. Luca De Feo. Fast algorithms for computing isogenies between ordinary elliptic curves in small characteristic. Journal of Number Theory 131(5):873–893, 2011. BibTeX

    @article{DeF2011,
    	author = "Luca {De Feo}",
    	title = "Fast algorithms for computing isogenies between ordinary elliptic curves in small characteristic",
    	journal = "Journal of Number Theory",
    	year = 2011,
    	volume = 131,
    	pages = "873--893",
    	number = 5,
    	month = "",
    	annote = "revint"
    }
    

Inbooks

  1. Antoine Joux and Reynald Lercier. Number Field Sieve for the DLP, in Encyclopedia of Cryptography and Security (2nd Ed.). pages 867-873, 2011. BibTeX

    @inbook{JoLe2011,
    	pages = "867-873",
    	title = "Number Field Sieve for the DLP, in Encyclopedia of Cryptography and Security (2nd Ed.)",
    	year = 2011,
    	author = "Antoine Joux and Reynald Lercier",
    	annote = "chapitre",
    	booktitle = "Encyclopedia of Cryptography and Security (2nd Ed.)"
    }
    
  2. Louis Goubin, Jacques Patarin and Bo-Yin Yang. Multivariate Cryptography, in Encyclopedia of Cryptography and Security (2nd Ed.). pages 824-828, 2011. BibTeX

    @inbook{GoPY2011,
    	pages = "824-828",
    	title = "Multivariate Cryptography, in Encyclopedia of Cryptography and Security (2nd Ed.)",
    	year = 2011,
    	author = "Louis Goubin and Jacques Patarin and Bo-Yin Yang",
    	annote = "chapitre",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	booktitle = "Encyclopedia of Cryptography and Security (2nd Ed.)",
    	ee = "http://dx.doi.org/10.1007/978-1-4419-5906-5_421"
    }
    

Inproceedings

  1. Jérôme Plût. On Various Families of Twisted Jacobi Quartics. In Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. 2011, 373-383. BibTeX

    @inproceedings{Pl2011a,
    	author = "J{\'e}r{\^o}me Pl{\^u}t",
    	title = "On Various Families of Twisted Jacobi Quartics",
    	booktitle = "Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers",
    	year = 2011,
    	pages = "373-383",
    	annote = "confint"
    }
    
  2. Jacques Patarin. Some Transfinite Generalisations of Gödel's Incompleteness Theorem. In HyperNet2011, June 6-10, 2011, Turku, Finland, TUCS Lecture Notes N.14. 2011, 113-122. BibTeX

    @inproceedings{Pata2011,
    	author = "Jacques Patarin",
    	title = {Some Transfinite Generalisations of G{\"o}del's Incompleteness Theorem},
    	booktitle = "HyperNet2011, June 6-10, 2011, Turku, Finland, TUCS Lecture Notes N.14",
    	year = 2011,
    	pages = "113-122",
    	annote = "confint"
    }
    
  3. Mar\'ıa Naya-Plasencia, Deniz Toz and Kerem Varici. Rebound Attack on JH42. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 252-269. BibTeX

    @inproceedings{NaTV2011,
    	author = "Mar\'{\i}a Naya-Plasencia and Deniz Toz and Kerem Varici",
    	title = "Rebound Attack on JH42",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings",
    	year = 2011,
    	pages = "252-269",
    	annote = "confint"
    }
    
  4. Mar\'ıa Naya-Plasencia, Andrea Röck and Willi Meier. Practical Analysis of Reduced-Round Keccak. In Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. 2011, 236-254. BibTeX

    @inproceedings{NaRM2011,
    	author = {Mar\'{\i}a Naya-Plasencia and Andrea R{\"o}ck and Willi Meier},
    	title = "Practical Analysis of Reduced-Round Keccak",
    	booktitle = "Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings",
    	year = 2011,
    	pages = "236-254",
    	annote = "confint"
    }
    
  5. Marine Minier and Mara Naya-Plasencia. Some Preliminary Studies on the Differential Behavior of the Lightweight Block Cipher LBlock. In ECRYPT II Workshop on Lightweight Cryptography, November 28-29, 2011, Louvain-la-Neuve, Belgium. 2011. BibTeX

    @inproceedings{MiNa2011,
    	author = "Marine Minier and Mara Naya-Plasencia",
    	title = "Some Preliminary Studies on the Differential Behavior of the Lightweight Block Cipher LBlock",
    	booktitle = "ECRYPT II Workshop on Lightweight Cryptography, November 28-29, 2011, Louvain-la-Neuve, Belgium",
    	year = 2011,
    	annote = "confint"
    }
    
  6. Antoine Joux and Vanessa Vitse. A Variant of the F4 Algorithm. In Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. 2011, 356-375. BibTeX

    @inproceedings{JoVi2011a,
    	author = "Antoine Joux and Vanessa Vitse",
    	title = "A Variant of the F4 Algorithm",
    	booktitle = "Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings",
    	year = 2011,
    	pages = "356-375",
    	annote = "confint"
    }
    
  7. David Jao and Luca De Feo. Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. In Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings. 2011, 19-34. BibTeX

    @inproceedings{JaDe2011,
    	author = "David Jao and Luca {De Feo}",
    	title = "Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies",
    	booktitle = "Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings",
    	year = 2011,
    	pages = "19-34",
    	annote = "confint"
    }
    
  8. Malika Izabachène, Beno\^ıt Libert and Damien Vergnaud. Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes. In Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. 2011, 431-450. BibTeX

    @inproceedings{IzLV2011,
    	author = "Malika Izabach{\`e}ne and Beno\^{\i}t Libert and Damien Vergnaud",
    	title = "Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes",
    	booktitle = "Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings",
    	year = 2011,
    	pages = "431-450",
    	annote = "confint"
    }
    
  9. Louis Goubin and Ange Martinelli. Protecting AES with Shamir's Secret Sharing Scheme. In Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings. 2011, 79-94. BibTeX

    @inproceedings{GoMa2011a,
    	author = "Louis Goubin and Ange Martinelli",
    	title = "Protecting AES with Shamir's Secret Sharing Scheme",
    	booktitle = "Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings",
    	year = 2011,
    	pages = "79-94",
    	annote = "confint"
    }
    
  10. Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. In Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings. 2011, 240-255. BibTeX

    @inproceedings{GePQ2011b,
    	author = {Laurie Genelle and Emmanuel Prouff and Micha{\"e}l Quisquater},
    	title = "Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings",
    	booktitle = "Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings",
    	year = 2011,
    	pages = "240-255",
    	annote = "confint"
    }
    
  11. Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Montgomery's Trick and Fast Implementation of Masked AES. In Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings. 2011, 153-169. BibTeX

    @inproceedings{GePQ2011a,
    	author = {Laurie Genelle and Emmanuel Prouff and Micha{\"e}l Quisquater},
    	title = "Montgomery's Trick and Fast Implementation of Masked AES",
    	booktitle = "Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings",
    	year = 2011,
    	pages = "153-169",
    	annote = "confint"
    }
    
  12. Thomas Fuhr, Henri Gilbert, Jean-René Reinhard and Marion Videau. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. In Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. 2011, 230-242. BibTeX

    @inproceedings{FGRV2011,
    	author = "Thomas Fuhr and Henri Gilbert and Jean-Ren{\'e} Reinhard and Marion Videau",
    	title = "Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3",
    	booktitle = "Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers",
    	year = 2011,
    	pages = "230-242",
    	annote = "confint"
    }
    
  13. Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache and Mehdi Tibouchi. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. In Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. 2011, 147-155. BibTeX

    @inproceedings{CJMN2011,
    	author = "Jean-S{\'e}bastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi",
    	title = "Cryptanalysis of the RSA Subgroup Assumption from TCC 2005",
    	booktitle = "Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings",
    	year = 2011,
    	pages = "147-155",
    	annote = "confint"
    }
    
  14. Serge Chaumette, Olivier Ly and Renaud Tabary. Automated extraction of polymorphic virus signatures using abstract interpretation. In 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011. 2011, 41-48. BibTeX

    @inproceedings{ChLT2011,
    	author = "Serge Chaumette and Olivier Ly and Renaud Tabary",
    	title = "Automated extraction of polymorphic virus signatures using abstract interpretation",
    	booktitle = "5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011",
    	year = 2011,
    	pages = "41-48",
    	annote = "confint"
    }
    
  15. Charles Bouillaguet, Pierre-Alain Fouque and Gilles Macario-Rat. Practical Key-Recovery for All Possible Parameters of SFLASH. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 667-685. BibTeX

    @inproceedings{BoFM2011,
    	author = "Charles Bouillaguet and Pierre-Alain Fouque and Gilles Macario-Rat",
    	title = "Practical Key-Recovery for All Possible Parameters of SFLASH",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings",
    	year = 2011,
    	pages = "667-685",
    	annote = "confint"
    }
    
  16. Charles Bouillaguet, Patrick Derbez and Pierre-Alain Fouque. Automatic Search of Attacks on Round-Reduced AES and Applications. In Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings. 2011, 169-187. BibTeX

    @inproceedings{BoDF2011,
    	author = "Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque",
    	title = "Automatic Search of Attacks on Round-Reduced AES and Applications",
    	booktitle = "Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings",
    	year = 2011,
    	pages = "169-187",
    	annote = "confint"
    }
    
  17. Anja Becker, Jean-Sébastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. In Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. 2011, 364-385. BibTeX

    @inproceedings{BeCJ2011a,
    	author = "Anja Becker and Jean-S{\'e}bastien Coron and Antoine Joux",
    	title = "Improved Generic Algorithms for Hard Knapsacks",
    	booktitle = "Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings",
    	year = 2011,
    	pages = "364-385",
    	annote = "confint"
    }
    
  18. Sébastien Bardin, Philippe Herrmann, Jérôme Leroux, Olivier Ly, Renaud Tabary and Aymeric Vincent. The BINCOA Framework for Binary Code Analysis. In Computer Aided Verification - 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings. 2011, 165-170. BibTeX

    @inproceedings{BHLL2011,
    	author = "S{\'e}bastien Bardin and Philippe Herrmann and J{\'e}r{\^o}me Leroux and Olivier Ly and Renaud Tabary and Aymeric Vincent",
    	title = "The BINCOA Framework for Binary Code Analysis",
    	booktitle = "Computer Aided Verification - 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings",
    	year = 2011,
    	pages = "165-170",
    	annote = "confint"
    }
    
  19. Jean-Philippe Aumasson, Mar\'ıa Naya-Plasencia and Markku-Juhani O Saarinen. Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. In Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. 2011, 134-145. BibTeX

    @inproceedings{AuNS2011,
    	author = "Jean-Philippe Aumasson and Mar\'{\i}a Naya-Plasencia and Markku-Juhani O. Saarinen",
    	title = "Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN",
    	booktitle = "Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings",
    	year = 2011,
    	pages = "134-145",
    	annote = "confint"
    }
    
  20. Mohamed Ahmed Abdelraheem, Céline Blondeau, Mar\'ıa Naya-Plasencia, Marion Videau and Erik Zenner. Cryptanalysis of ARMADILLO2. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 308-326. BibTeX

    @inproceedings{ABNV2011,
    	author = "Mohamed Ahmed Abdelraheem and C{\'e}line Blondeau and Mar\'{\i}a Naya-Plasencia and Marion Videau and Erik Zenner",
    	title = "Cryptanalysis of ARMADILLO2",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings",
    	year = 2011,
    	pages = "308-326",
    	annote = "confint"
    }
    

Misc

  1. Aline Gouget, Louis Goubin, Pascal Paillier and Karine Villegas. Method for establishing a secured communication without preliminary information share. Patent EP 2389742 A1. novembre 2011. BibTeX

    @misc{GGPV2011,
    	author = "Aline Gouget and Louis Goubin and Pascal Paillier and Karine Villegas",
    	title = "Method for establishing a secured communication without preliminary information share. Patent EP 2389742 A1",
    	month = "November",
    	year = 2011,
    	annote = "brevet"
    }
    
  2. Louis Goubin and Nicolas Courtois. Method and apparatus for generating cryptographic sets of instructions automatically and code generator. Patent 8000473. août 2011. BibTeX

    @misc{GoCo2011,
    	author = "Louis Goubin and Nicolas Courtois",
    	title = "Method and apparatus for generating cryptographic sets of instructions automatically and code generator. Patent 8000473",
    	month = "August",
    	year = 2011,
    	annote = "brevet"
    }
    
  3. Vanessa Vitse. Cover and Decomposition Attacks. ECC Invited Talk (joint work with Antoine Joux), 2011. BibTeX

    @misc{Vits2011a,
    	author = "Vanessa Vitse",
    	title = "Cover and Decomposition Attacks",
    	howpublished = "ECC Invited Talk (joint work with Antoine Joux)",
    	year = 2011,
    	annote = "confinv"
    }
    
  4. Naomi Benger. Efficient Finite Field Arithmetic for Pairing-Based Cryptography (joint work with Selcuk Baktir). In 10th International Conference on Finite Fields and their Applications, 2011. BibTeX

    @misc{Beng2011,
    	author = "Naomi Benger",
    	title = "Efficient Finite Field Arithmetic for Pairing-Based Cryptography (joint work with Selcuk Baktir)",
    	howpublished = "In 10th International Conference on Finite Fields and their Applications",
    	year = 2011,
    	annote = "confinv"
    }
    

PhdThesis

  1. Vanessa Vitse. Attaques algébriques du problème du logarithme discret sur courbes elliptiques. Thèse, Université de Versailles-St Quentin, 2011. BibTeX

    @phdthesis{Vits2011,
    	author = "Vitse, Vanessa",
    	title = "{Attaques alg\'ebriques du probl\`eme du logarithme discret sur courbes elliptiques}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2011,
    	type = "Th\`ese",
    	month = "Octobre",
    	annote = "these"
    }
    
  2. Jean-René Reinhard. Etude de Primitives Cryptographiques Symétriques : Chiffrements par Flot et Fonctions de Hachage. Thèse, Université de Versailles-St Quentin, 2011. BibTeX

    @phdthesis{Rein2011,
    	author = "Reinhard, Jean-Ren\'e",
    	title = "{Etude de Primitives Cryptographiques Sym\'etriques : Chiffrements par Flot et Fonctions de Hachage}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2011,
    	type = "Th\`ese",
    	month = "D\'ecembre",
    	annote = "these"
    }
    
  3. Ange Martinelli. Protection d'algorithmes de chiffrement par blocs contre les attaques par canaux auxiliaires d'ordre supérieur. Thèse, Université de Versailles-St Quentin, 2011. BibTeX

    @phdthesis{Mart2011,
    	author = "Martinelli, Ange",
    	title = "{Protection d'algorithmes de chiffrement par blocs contre les attaques par canaux auxiliaires d'ordre sup\'erieur}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2011,
    	type = "Th\`ese",
    	month = "Novembre",
    	annote = "these"
    }
    
  4. Pascal Delaunay. Attaques physiques sur des algorithmes de chiffrement par flot. Thèse, Université de Versailles-St Quentin, 2011. BibTeX

    @phdthesis{Dela2011,
    	author = "Delaunay, Pascal",
    	title = "{Attaques physiques sur des algorithmes de chiffrement par flot}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2011,
    	type = "Th\`ese",
    	month = "Janvier",
    	annote = "these"
    }
    

Proceedings

  1. Antoine Joux (ed.). Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers 6733. Springer, 2011. BibTeX

    @proceedings{Joux2011,
    	title = "Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers",
    	year = 2011,
    	editor = "Antoine Joux",
    	volume = 6733,
    	series = "Lecture Notes in Computer Science",
    	publisher = "Springer",
    	annote = "confintautre",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	booktitle = "FSE",
    	ee = "http://dx.doi.org/10.1007/978-3-642-21702-9",
    	isbn = "978-3-642-21701-2"
    }
    

Techreport

  1. Jérôme Plût. p-adic analytic Banach spaces and the fundamental lemma of Colmez and Fontaine. 2011. URL BibTeX

    @techreport{Pl2011,
    	author = "J{\'e}r{\^o}me Pl{\^u}t",
    	title = "p-adic analytic Banach spaces and the fundamental lemma of Colmez and Fontaine",
    	year = 2011,
    	annote = "rapport",
    	url = "http://www.prism.uvsq.fr/~plut/banach.pdf"
    }
    
  2. Valérie Nachef, Emmanuel Volte and Jacques Patarin. Differential Attacks on Generalized Feistel Schemes. 0. BibTeX

    @techreport{NaVP2011,
    	author = "Val{\'e}rie Nachef and Emmanuel Volte and Jacques Patarin",
    	title = "Differential Attacks on Generalized Feistel Schemes",
    	year = "IACR Cryptology ePrint Archive, 2011/705",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/705",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 705,
    	volume = 2011
    }
    
  3. Avradip Mandal, Jacques Patarin and Yannick Seurin. On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. 0. BibTeX

    @techreport{MaPS2011,
    	author = "Avradip Mandal and Jacques Patarin and Yannick Seurin",
    	title = "On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction",
    	year = "IACR Cryptology ePrint Archive, 2011/496",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/496",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 496,
    	volume = 2011
    }
    
  4. Rodolphe Lampe and Jacques Patarin. Analysis of some natural variants of the PKP Algorithm. 0. BibTeX

    @techreport{LaPa2011,
    	author = "Rodolphe Lampe and Jacques Patarin",
    	title = "Analysis of some natural variants of the PKP Algorithm",
    	year = "IACR Cryptology ePrint Archive, 2011/686",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/686",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 686,
    	volume = 2011
    }
    
  5. Antoine Joux and Vanessa Vitse. Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over F$p^6$. 0. BibTeX

    @techreport{JoVi2011,
    	author = "Antoine Joux and Vanessa Vitse",
    	title = "Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over F$p^6$",
    	year = "IACR Cryptology ePrint Archive, 2011/020",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/020",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 20,
    	volume = 2011
    }
    
  6. Louis Goubin and Ange Martinelli. Protecting AES with Shamir's Secret Sharing Scheme. 0. BibTeX

    @techreport{GoMa2011,
    	author = "Louis Goubin and Ange Martinelli",
    	title = "Protecting AES with Shamir's Secret Sharing Scheme",
    	year = "IACR Cryptology ePrint Archive, 2011/516",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/516",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 516,
    	volume = 2011
    }
    
  7. Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. 0. BibTeX

    @techreport{GePQ2011,
    	author = {Laurie Genelle and Emmanuel Prouff and Micha{\"e}l Quisquater},
    	title = "Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings",
    	year = "IACR Cryptology ePrint Archive, 2011/425",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/425",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 425,
    	volume = 2011
    }
    
  8. Luca De Feo, David Jao and Jérôme Plût. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. 0. BibTeX

    @techreport{DeJP2011,
    	author = "Luca {De Feo} and David Jao and J\'er\^ome Pl\^ut",
    	title = "Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies",
    	year = "IACR Cryptology ePrint Archive, 2011/506",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/506",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 506,
    	volume = 2011
    }
    
  9. Anja Becker, Jean-Sébastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. 0. BibTeX

    @techreport{BeCJ2011,
    	author = "Anja Becker and Jean-S{\'e}bastien Coron and Antoine Joux",
    	title = "Improved Generic Algorithms for Hard Knapsacks",
    	year = "IACR Cryptology ePrint Archive, 2011/474",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2011/474",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 474,
    	volume = 2011
    }
    

 Imprimer  E-mail

DMC Firewall is a Joomla Security extension!