Publications équipe CRYPTO - 2012

Articles

  1. Jacques Patarin. Transfinite Cryptography. IJUC 8(1):61-72, 2012. BibTeX

    @article{Pata2012,
    	author = "Jacques Patarin",
    	title = "Transfinite Cryptography",
    	journal = "IJUC",
    	year = 2012,
    	volume = 8,
    	pages = "61-72",
    	number = 1,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://www.oldcitypublishing.com/IJUC/IJUCabstracts/IJUC8.1abstracts/IJUCv8n1p61-72Patarin.html"
    }
    
  2. Marine Minier and Mar\'ıa Naya-Plasencia. A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. Inf. Process. Lett. 112(16):624-629, 2012. BibTeX

    @article{MiNa2012,
    	author = "Marine Minier and Mar\'{\i}a Naya-Plasencia",
    	title = "A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock",
    	journal = "Inf. Process. Lett.",
    	year = 2012,
    	volume = 112,
    	pages = "624-629",
    	number = 16,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1016/j.ipl.2012.04.012"
    }
    
  3. Luca De Feo and Éric Schost. Fast arithmetics in Artin-Schreier towers over finite fields. J. Symb. Comput. 47(7):771-792, 2012. BibTeX

    @article{DeSc2012,
    	author = "Luca {De Feo} and {\'E}ric Schost",
    	title = "Fast arithmetics in Artin-Schreier towers over finite fields",
    	journal = "J. Symb. Comput.",
    	year = 2012,
    	volume = 47,
    	pages = "771-792",
    	number = 7,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1016/j.jsc.2011.12.008"
    }
    
  4. Anne Canteaut and Mar\'ıa Naya-Plasencia. Parity-Check Relations on Combination Generators. IEEE Transactions on Information Theory 58(6):3900-3911, 2012. BibTeX

    @article{CaNa2012a,
    	author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia",
    	title = "Parity-Check Relations on Combination Generators",
    	journal = "IEEE Transactions on Information Theory",
    	year = 2012,
    	volume = 58,
    	pages = "3900-3911",
    	number = 6,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1109/TIT.2012.2184736"
    }
    
  5. Anne Canteaut and Mar\'ıa Naya-Plasencia. Correlation attacks on combination generators. Cryptography and Communications 4(3-4):147-171, 2012. BibTeX

    @article{CaNa2012,
    	author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia",
    	title = "Correlation attacks on combination generators",
    	journal = "Cryptography and Communications",
    	year = 2012,
    	volume = 4,
    	pages = "147-171",
    	number = "3-4",
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1007/s12095-012-0069-3"
    }
    
  6. Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux and Joana Treger. A family of weak keys in HFE and the corresponding practical key-recovery. J. Mathematical Cryptology 5(3-4):247-275, 2012. BibTeX

    @article{BFJT2012,
    	author = "Charles Bouillaguet and Pierre-Alain Fouque and Antoine Joux and Joana Treger",
    	title = "A family of weak keys in HFE and the corresponding practical key-recovery",
    	journal = "J. Mathematical Cryptology",
    	year = 2012,
    	volume = 5,
    	pages = "247-275",
    	number = "3-4",
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1515/jmc.2011.012"
    }
    
  7. Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller and Vincent Rijmen. Low-Data Complexity Attacks on AES. IEEE Transactions on Information Theory 58(11):7002-7017, 2012. BibTeX

    @article{BDDF2012,
    	author = "Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Pierre-Alain Fouque and Nathan Keller and Vincent Rijmen",
    	title = "Low-Data Complexity Attacks on AES",
    	journal = "IEEE Transactions on Information Theory",
    	year = 2012,
    	volume = 58,
    	pages = "7002-7017",
    	number = 11,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1109/TIT.2012.2207880"
    }
    

Inbooks

  1. Marc Joye and Michael Tunstall (eds.). A Survey of Differential Fault Analysis Against Classical RSA Implementations, in Fault Analysis in Cryptography. Series Information Security and Cryptography, pages 111-124, Springer Berlin Heidelberg, 2012. BibTeX

    @inbook{BeCG2012,
    	pages = "111-124",
    	title = "A Survey of Differential Fault Analysis Against Classical RSA Implementations, in Fault Analysis in Cryptography",
    	publisher = "Springer Berlin Heidelberg",
    	year = 2012,
    	editor = "Joye, Marc and Tunstall, Michael",
    	author = "Alexandre Berzati and C{\'e}cile Canovas-Dumas and Louis Goubin",
    	series = "Information Security and Cryptography",
    	annote = "chapitre",
    	booktitle = "Fault Analysis in Cryptography",
    	isbn = "978-3-642-29655-0"
    }
    

Inproceedings

  1. Jacques Patarin, Benjamin Gittins and Joana Treger. Increasing Block Sizes Using Feistel Networks: The Example of the AES. In Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. 2012, 67-82. BibTeX

    @inproceedings{PaGT2012,
    	author = "Jacques Patarin and Benjamin Gittins and Joana Treger",
    	title = "Increasing Block Sizes Using Feistel Networks: The Example of the AES",
    	booktitle = "Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday",
    	year = 2012,
    	pages = "67-82",
    	annote = "confint"
    }
    
  2. Jacques Patarin. Some Transfinite Generalisations of Gödel's Incompleteness Theorem. In Computation, Physics and Beyond - International Workshop on Theoretical Computer Science, WTCS 2012, Dedicated to Cristian S. Calude on the Occasion of His 60th Birthday, Auckland, New Zealand, February 21-24, 2012, Revised Selected and Invited Papers. 2012, 183-193. BibTeX

    @inproceedings{Pata2012a,
    	author = "Jacques Patarin",
    	title = {Some Transfinite Generalisations of G{\"o}del's Incompleteness Theorem},
    	booktitle = "Computation, Physics and Beyond - International Workshop on Theoretical Computer Science, WTCS 2012, Dedicated to Cristian S. Calude on the Occasion of His 60th Birthday, Auckland, New Zealand, February 21-24, 2012, Revised Selected and Invited Papers",
    	year = 2012,
    	pages = "183-193",
    	annote = "confint"
    }
    
  3. Mar\'ıa Naya-Plasencia and Thomas Peyrin. Practical Cryptanalysis of ARMADILLO2. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. 2012, 146-162. BibTeX

    @inproceedings{NaPe2012,
    	author = "Mar\'{\i}a Naya-Plasencia and Thomas Peyrin",
    	title = "Practical Cryptanalysis of ARMADILLO2",
    	booktitle = "Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers",
    	year = 2012,
    	pages = "146-162",
    	annote = "confint"
    }
    
  4. Valérie Nachef, Jacques Patarin and Emmanuel Volte. Zero-Knowledge for Multivariate Polynomials. In Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings. 2012, 194-213. BibTeX

    @inproceedings{NaPV2012a,
    	author = "Val{\'e}rie Nachef and Jacques Patarin and Emmanuel Volte",
    	title = "Zero-Knowledge for Multivariate Polynomials",
    	booktitle = "Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings",
    	year = 2012,
    	pages = "194-213",
    	annote = "confint"
    }
    
  5. Marcel Medwed, François-Xavier Standaert and Antoine Joux. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. In Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. 2012, 193-212. BibTeX

    @inproceedings{MeSJ2012,
    	author = "Marcel Medwed and Fran\c{c}ois-Xavier Standaert and Antoine Joux",
    	title = "Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs",
    	booktitle = "Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings",
    	year = 2012,
    	pages = "193-212",
    	annote = "confint"
    }
    
  6. Avradip Mandal, Jacques Patarin and Yannick Seurin. On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. In Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. 2012, 285-302. BibTeX

    @inproceedings{MaPS2012,
    	author = "Avradip Mandal and Jacques Patarin and Yannick Seurin",
    	title = "On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction",
    	booktitle = "Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings",
    	year = 2012,
    	pages = "285-302",
    	annote = "confint"
    }
    
  7. Ronan Lashermes, Guillaume Reymond, Jean-Max Dutertre, Jacques Fournier, Bruno Robisson and Assia Tria. A DFA on AES Based on the Entropy of Error Distributions. In 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012. 2012, 34-43. BibTeX

    @inproceedings{LRDF2012,
    	author = "Ronan Lashermes and Guillaume Reymond and Jean-Max Dutertre and Jacques Fournier and Bruno Robisson and Assia Tria",
    	title = "A DFA on AES Based on the Entropy of Error Distributions",
    	booktitle = "2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012",
    	year = 2012,
    	pages = "34-43",
    	annote = "confint"
    }
    
  8. Rodolphe Lampe, Jacques Patarin and Yannick Seurin. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. In Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. 2012, 278-295. BibTeX

    @inproceedings{LaPS2012,
    	author = "Rodolphe Lampe and Jacques Patarin and Yannick Seurin",
    	title = "An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings",
    	year = 2012,
    	pages = "278-295",
    	annote = "confint"
    }
    
  9. Rodolphe Lampe and Jacques Patarin. Analysis of Some Natural Variants of the PKP Algorithm. In SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. 2012, 209-214. BibTeX

    @inproceedings{LaPa2012a,
    	author = "Rodolphe Lampe and Jacques Patarin",
    	title = "Analysis of Some Natural Variants of the PKP Algorithm",
    	booktitle = "SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications",
    	year = 2012,
    	pages = "209-214",
    	annote = "confint",
    	bibsource = "DBLP, http://dblp.uni-trier.de"
    }
    
  10. Antoine Joux and Vanessa Vitse. Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over F$p^6$. In Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. 2012, 9-26. BibTeX

    @inproceedings{JoVi2012,
    	author = "Antoine Joux and Vanessa Vitse",
    	title = "Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over F$p^6$",
    	booktitle = "Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings",
    	year = 2012,
    	pages = "9-26",
    	annote = "confint"
    }
    
  11. Jérémy Jean, Mar\'ıa Naya-Plasencia and Thomas Peyrin. Improved Rebound Attack on the Finalist Grøstl. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. 2012, 110-126. BibTeX

    @inproceedings{JeNP2012,
    	author = "J{\'e}r{\'e}my Jean and Mar\'{\i}a Naya-Plasencia and Thomas Peyrin",
    	title = "Improved Rebound Attack on the Finalist Gr{\o}stl",
    	booktitle = "Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers",
    	year = 2012,
    	pages = "110-126",
    	annote = "confint"
    }
    
  12. Nadia El Mrabet and Nicolas Gama. Efficient Multiplication over Extension Fields. In Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings. 2012, 136-151. BibTeX

    @inproceedings{ElGa2012,
    	author = "Nadia {El Mrabet} and Nicolas Gama",
    	title = "Efficient Multiplication over Extension Fields",
    	booktitle = "Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings",
    	year = 2012,
    	pages = "136-151",
    	annote = "confint"
    }
    
  13. Maria Christofi and Aline Gouget. Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol. In Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. 2012, 299-314. BibTeX

    @inproceedings{ChGo2012,
    	author = "Maria Christofi and Aline Gouget",
    	title = "Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol",
    	booktitle = "Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings",
    	year = 2012,
    	pages = "299-314",
    	annote = "confint"
    }
    
  14. Maria Christofi, Boutheina Chetali, Louis Goubin and David Vigilant. Formal verification of an implementation of CRT-RSA Vigilant's algorithm. In First International Workshop on Security Proofs for Embedded Systems, 2012, PROOFS 2012, Leuven, Belgium, September 13, 2012. 2012. BibTeX

    @inproceedings{CCGV2012,
    	author = "Maria Christofi and Boutheina Chetali and Louis Goubin and David Vigilant",
    	title = "Formal verification of an implementation of CRT-RSA Vigilant's algorithm",
    	booktitle = "First International Workshop on Security Proofs for Embedded Systems, 2012, PROOFS 2012, Leuven, Belgium, September 13, 2012",
    	year = 2012,
    	annote = "confint"
    }
    
  15. Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater and Matthieu Rivain. Higher-Order Masking Schemes for S-Boxes. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. 2012, 366-384. BibTeX

    @inproceedings{CGPQ2012,
    	author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Micha{\"e}l Quisquater and Matthieu Rivain},
    	title = "Higher-Order Masking Schemes for S-Boxes",
    	booktitle = "Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers",
    	year = 2012,
    	pages = "366-384",
    	annote = "confint"
    }
    
  16. Alexandre Berzati, Cécile Canovas-Dumas and Louis Goubin. Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems. In Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. 2012, 233-247. BibTeX

    @inproceedings{BeCG2012a,
    	author = "Alexandre Berzati and C{\'e}cile Canovas-Dumas and Louis Goubin",
    	title = "Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems",
    	booktitle = "Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday",
    	year = 2012,
    	pages = "233-247",
    	annote = "confint"
    }
    
  17. Anja Becker, Antoine Joux, Alexander May and Alexander Meurer. Decoding Random Binary Linear Codes in ${2^(n/20)}$: How 1+1=0 Improves Information Set Decoding. In Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. 2012, 520-536. BibTeX

    @inproceedings{BJMM2012a,
    	author = "Anja Becker and Antoine Joux and Alexander May and Alexander Meurer",
    	title = "Decoding Random Binary Linear Codes in ${2^{(n/20)}}$: How 1+1=0 Improves Information Set Decoding",
    	booktitle = "Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings",
    	year = 2012,
    	pages = "520-536",
    	annote = "confint"
    }
    

Misc

  1. Antoine Rojat. Review of cryptanalysis of RSA and its variants by Jason Hinek, in SIGACT News, vol. 43, pp. 16-18. 2012. BibTeX

    @misc{Roja2012,
    	author = "Antoine Rojat",
    	title = "Review of cryptanalysis of RSA and its variants by Jason Hinek, in SIGACT News, vol. 43, pp. 16-18",
    	year = 2012,
    	annote = "vulg"
    }
    
  2. Michaël Quisquater. The Hidden Side of Jean-Jacques Quisquater, in Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 1-2. 2012. BibTeX

    @misc{Quis2012,
    	author = {Micha{\"e}l Quisquater},
    	title = "The Hidden Side of Jean-Jacques Quisquater, in Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 1-2",
    	year = 2012,
    	annote = "vulg"
    }
    
  3. Antoine Joux. A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract). Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, 2012. BibTeX

    @misc{Joux2012a,
    	author = "Antoine Joux",
    	title = "A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract)",
    	howpublished = "Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings",
    	year = 2012,
    	annote = "confinv",
    	pages = "1-7"
    }
    
  4. Nicolas Gama. Lattice reduction algorithms and Applications in Cryptology. CryptoBG, 2012. BibTeX

    @misc{Gama2012,
    	author = "Nicolas Gama",
    	title = "Lattice reduction algorithms and Applications in Cryptology",
    	howpublished = "CryptoBG",
    	year = 2012,
    	annote = "confinv"
    }
    
  5. Louis Goubin. Post-Quantum Cryptography and Quantum Algorithms. Lorentz Center, Leiden, Pays-Bas, 0. BibTeX

    @misc{Goub2012,
    	author = "Louis Goubin",
    	title = "Post-Quantum Cryptography and Quantum Algorithms",
    	howpublished = "Lorentz Center, Leiden, Pays-Bas",
    	year = "November 2012",
    	annote = "confinv"
    }
    
  6. Luca De Feo. Isogeny graphs in cryptography. YACC, Centre Igesa, Porquerolles, France, 0. BibTeX

    @misc{DeF2012,
    	author = "De Feo, Luca",
    	title = "Isogeny graphs in cryptography",
    	howpublished = "YACC, Centre Igesa, Porquerolles, France",
    	year = "September 2012",
    	annote = "confinv"
    }
    

PhdThesis

  1. Anja Becker. La technique de représentation – Application à des problèmes difficiles en cryptographie. Thèse, Université de Versailles-St Quentin, 2012. BibTeX

    @phdthesis{Beck2012,
    	author = "Becker, Anja",
    	title = "{La technique de repr\'esentation -- Application \`a des probl\`emes difficiles en cryptographie}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2012,
    	type = "Th\`ese",
    	month = "Octobre",
    	annote = "these"
    }
    

Techreport

  1. Jérôme Plût. Slope filtration on Banach-Colmez spaces. 2012. URL BibTeX

    @techreport{Pl2012,
    	author = "J{\'e}r{\^o}me Pl{\^u}t",
    	title = "Slope filtration on Banach-Colmez spaces",
    	year = 2012,
    	annote = "rapport",
    	url = "http://www.prism.uvsq.fr/~plut/filtration.pdf"
    }
    
  2. Emmanuel Volte, Jacques Patarin and Valérie Nachef. Zero Knowledge with Rubik's Cubes. 0. BibTeX

    @techreport{VoPN2012,
    	author = "Emmanuel Volte and Jacques Patarin and Val{\'e}rie Nachef",
    	title = "Zero Knowledge with Rubik's Cubes",
    	year = "IACR Cryptology ePrint Archive, 2012/174",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2012/174",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 174,
    	volume = 2012
    }
    
  3. Valérie Nachef, Jacques Patarin and Emmanuel Volte. Zero-Knowledge for Multivariate Polynomials. 0. BibTeX

    @techreport{NaPV2012,
    	author = "Val{\'e}rie Nachef and Jacques Patarin and Emmanuel Volte",
    	title = "Zero-Knowledge for Multivariate Polynomials",
    	year = "IACR Cryptology ePrint Archive, 2012/239",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2012/239",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 239,
    	volume = 2012
    }
    
  4. Rodolphe Lampe and Jacques Patarin. Security of Feistel Schemes with New and Various Tools. 0. BibTeX

    @techreport{LaPa2012,
    	author = "Rodolphe Lampe and Jacques Patarin",
    	title = "Security of Feistel Schemes with New and Various Tools",
    	year = "IACR Cryptology ePrint Archive, 2012/131",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2012/131",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 131,
    	volume = 2012
    }
    
  5. Antoine Joux. Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields. 0. BibTeX

    @techreport{Joux2012,
    	author = "Antoine Joux",
    	title = "Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields",
    	year = "IACR Cryptology ePrint Archive, 2012/720",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2012/720",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 720,
    	volume = 2012
    }
    
  6. Anne Canteaut, Thomas Fuhr, Mar\'ıa Naya-Plasencia, Pascal Paillier, Jean-René Reinhard and Marion Videau. A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions. 0. BibTeX

    @techreport{CFNP2012,
    	author = "Anne Canteaut and Thomas Fuhr and Mar\'{\i}a Naya-Plasencia and Pascal Paillier and Jean-Ren{\'e} Reinhard and Marion Videau",
    	title = "A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions",
    	year = "IACR Cryptology ePrint Archive, 2012/363",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2012/363",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 363,
    	volume = 2012
    }
    
  7. Charles Bouillaguet, Patrick Derbez and Pierre-Alain Fouque. Automatic Search of Attacks on round-reduced AES and Applications. 0. BibTeX

    @techreport{BoDF2012,
    	author = "Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque",
    	title = "Automatic Search of Attacks on round-reduced AES and Applications",
    	year = "IACR Cryptology ePrint Archive, 2012/069",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2012/069",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 69,
    	volume = 2012
    }
    
  8. Anja Becker, Antoine Joux, Alexander May and Alexander Meurer. Decoding Random Binary Linear Codes in $2^n/20$: How 1+1=0 Improves Information Set Decoding. 0. BibTeX

    @techreport{BJMM2012,
    	author = "Anja Becker and Antoine Joux and Alexander May and Alexander Meurer",
    	title = "Decoding Random Binary Linear Codes in $2^{n/20}$: How 1+1=0 Improves Information Set Decoding",
    	year = "IACR Cryptology ePrint Archive, 2012/026",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2012/026",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 26,
    	volume = 2012
    }
    
 

 Imprimer  E-mail

Our website is protected by DMC Firewall!