Articles
Jacques Patarin. Transfinite Cryptography. IJUC 8(1):61-72, 2012. BibTeX
@article{Pata2012, author = "Jacques Patarin", title = "Transfinite Cryptography", journal = "IJUC", year = 2012, volume = 8, pages = "61-72", number = 1, annote = "revint", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://www.oldcitypublishing.com/IJUC/IJUCabstracts/IJUC8.1abstracts/IJUCv8n1p61-72Patarin.html" }
Marine Minier and Mar\'ıa Naya-Plasencia. A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. Inf. Process. Lett. 112(16):624-629, 2012. BibTeX
@article{MiNa2012, author = "Marine Minier and Mar\'{\i}a Naya-Plasencia", title = "A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock", journal = "Inf. Process. Lett.", year = 2012, volume = 112, pages = "624-629", number = 16, annote = "revint", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://dx.doi.org/10.1016/j.ipl.2012.04.012" }
Luca De Feo and Éric Schost. Fast arithmetics in Artin-Schreier towers over finite fields. J. Symb. Comput. 47(7):771-792, 2012. BibTeX
@article{DeSc2012, author = "Luca {De Feo} and {\'E}ric Schost", title = "Fast arithmetics in Artin-Schreier towers over finite fields", journal = "J. Symb. Comput.", year = 2012, volume = 47, pages = "771-792", number = 7, annote = "revint", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://dx.doi.org/10.1016/j.jsc.2011.12.008" }
Anne Canteaut and Mar\'ıa Naya-Plasencia. Parity-Check Relations on Combination Generators. IEEE Transactions on Information Theory 58(6):3900-3911, 2012. BibTeX
@article{CaNa2012a, author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia", title = "Parity-Check Relations on Combination Generators", journal = "IEEE Transactions on Information Theory", year = 2012, volume = 58, pages = "3900-3911", number = 6, annote = "revint", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://dx.doi.org/10.1109/TIT.2012.2184736" }
Anne Canteaut and Mar\'ıa Naya-Plasencia. Correlation attacks on combination generators. Cryptography and Communications 4(3-4):147-171, 2012. BibTeX
@article{CaNa2012, author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia", title = "Correlation attacks on combination generators", journal = "Cryptography and Communications", year = 2012, volume = 4, pages = "147-171", number = "3-4", annote = "revint", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://dx.doi.org/10.1007/s12095-012-0069-3" }
Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux and Joana Treger. A family of weak keys in HFE and the corresponding practical key-recovery. J. Mathematical Cryptology 5(3-4):247-275, 2012. BibTeX
@article{BFJT2012, author = "Charles Bouillaguet and Pierre-Alain Fouque and Antoine Joux and Joana Treger", title = "A family of weak keys in HFE and the corresponding practical key-recovery", journal = "J. Mathematical Cryptology", year = 2012, volume = 5, pages = "247-275", number = "3-4", annote = "revint", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://dx.doi.org/10.1515/jmc.2011.012" }
Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller and Vincent Rijmen. Low-Data Complexity Attacks on AES. IEEE Transactions on Information Theory 58(11):7002-7017, 2012. BibTeX
@article{BDDF2012, author = "Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Pierre-Alain Fouque and Nathan Keller and Vincent Rijmen", title = "Low-Data Complexity Attacks on AES", journal = "IEEE Transactions on Information Theory", year = 2012, volume = 58, pages = "7002-7017", number = 11, annote = "revint", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://dx.doi.org/10.1109/TIT.2012.2207880" }
Inbooks
Marc Joye and Michael Tunstall (eds.). A Survey of Differential Fault Analysis Against Classical RSA Implementations, in Fault Analysis in Cryptography. Series Information Security and Cryptography, pages 111-124, Springer Berlin Heidelberg, 2012. BibTeX
@inbook{BeCG2012, pages = "111-124", title = "A Survey of Differential Fault Analysis Against Classical RSA Implementations, in Fault Analysis in Cryptography", publisher = "Springer Berlin Heidelberg", year = 2012, editor = "Joye, Marc and Tunstall, Michael", author = "Alexandre Berzati and C{\'e}cile Canovas-Dumas and Louis Goubin", series = "Information Security and Cryptography", annote = "chapitre", booktitle = "Fault Analysis in Cryptography", isbn = "978-3-642-29655-0" }
Inproceedings
Jacques Patarin, Benjamin Gittins and Joana Treger. Increasing Block Sizes Using Feistel Networks: The Example of the AES. In Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. 2012, 67-82. BibTeX
@inproceedings{PaGT2012, author = "Jacques Patarin and Benjamin Gittins and Joana Treger", title = "Increasing Block Sizes Using Feistel Networks: The Example of the AES", booktitle = "Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday", year = 2012, pages = "67-82", annote = "confint" }
Jacques Patarin. Some Transfinite Generalisations of Gödel's Incompleteness Theorem. In Computation, Physics and Beyond - International Workshop on Theoretical Computer Science, WTCS 2012, Dedicated to Cristian S. Calude on the Occasion of His 60th Birthday, Auckland, New Zealand, February 21-24, 2012, Revised Selected and Invited Papers. 2012, 183-193. BibTeX
@inproceedings{Pata2012a, author = "Jacques Patarin", title = {Some Transfinite Generalisations of G{\"o}del's Incompleteness Theorem}, booktitle = "Computation, Physics and Beyond - International Workshop on Theoretical Computer Science, WTCS 2012, Dedicated to Cristian S. Calude on the Occasion of His 60th Birthday, Auckland, New Zealand, February 21-24, 2012, Revised Selected and Invited Papers", year = 2012, pages = "183-193", annote = "confint" }
Mar\'ıa Naya-Plasencia and Thomas Peyrin. Practical Cryptanalysis of ARMADILLO2. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. 2012, 146-162. BibTeX
@inproceedings{NaPe2012, author = "Mar\'{\i}a Naya-Plasencia and Thomas Peyrin", title = "Practical Cryptanalysis of ARMADILLO2", booktitle = "Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers", year = 2012, pages = "146-162", annote = "confint" }
Valérie Nachef, Jacques Patarin and Emmanuel Volte. Zero-Knowledge for Multivariate Polynomials. In Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings. 2012, 194-213. BibTeX
@inproceedings{NaPV2012a, author = "Val{\'e}rie Nachef and Jacques Patarin and Emmanuel Volte", title = "Zero-Knowledge for Multivariate Polynomials", booktitle = "Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings", year = 2012, pages = "194-213", annote = "confint" }
Marcel Medwed, François-Xavier Standaert and Antoine Joux. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. In Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. 2012, 193-212. BibTeX
@inproceedings{MeSJ2012, author = "Marcel Medwed and Fran\c{c}ois-Xavier Standaert and Antoine Joux", title = "Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs", booktitle = "Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings", year = 2012, pages = "193-212", annote = "confint" }
Avradip Mandal, Jacques Patarin and Yannick Seurin. On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. In Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. 2012, 285-302. BibTeX
@inproceedings{MaPS2012, author = "Avradip Mandal and Jacques Patarin and Yannick Seurin", title = "On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction", booktitle = "Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings", year = 2012, pages = "285-302", annote = "confint" }
Ronan Lashermes, Guillaume Reymond, Jean-Max Dutertre, Jacques Fournier, Bruno Robisson and Assia Tria. A DFA on AES Based on the Entropy of Error Distributions. In 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012. 2012, 34-43. BibTeX
@inproceedings{LRDF2012, author = "Ronan Lashermes and Guillaume Reymond and Jean-Max Dutertre and Jacques Fournier and Bruno Robisson and Assia Tria", title = "A DFA on AES Based on the Entropy of Error Distributions", booktitle = "2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012", year = 2012, pages = "34-43", annote = "confint" }
Rodolphe Lampe, Jacques Patarin and Yannick Seurin. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. In Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. 2012, 278-295. BibTeX
@inproceedings{LaPS2012, author = "Rodolphe Lampe and Jacques Patarin and Yannick Seurin", title = "An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher", booktitle = "Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings", year = 2012, pages = "278-295", annote = "confint" }
Rodolphe Lampe and Jacques Patarin. Analysis of Some Natural Variants of the PKP Algorithm. In SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. 2012, 209-214. BibTeX
@inproceedings{LaPa2012a, author = "Rodolphe Lampe and Jacques Patarin", title = "Analysis of Some Natural Variants of the PKP Algorithm", booktitle = "SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications", year = 2012, pages = "209-214", annote = "confint", bibsource = "DBLP, http://dblp.uni-trier.de" }
Antoine Joux and Vanessa Vitse. Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over F$p^6$. In Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. 2012, 9-26. BibTeX
@inproceedings{JoVi2012, author = "Antoine Joux and Vanessa Vitse", title = "Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over F$p^6$", booktitle = "Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings", year = 2012, pages = "9-26", annote = "confint" }
Jérémy Jean, Mar\'ıa Naya-Plasencia and Thomas Peyrin. Improved Rebound Attack on the Finalist Grøstl. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. 2012, 110-126. BibTeX
@inproceedings{JeNP2012, author = "J{\'e}r{\'e}my Jean and Mar\'{\i}a Naya-Plasencia and Thomas Peyrin", title = "Improved Rebound Attack on the Finalist Gr{\o}stl", booktitle = "Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers", year = 2012, pages = "110-126", annote = "confint" }
Nadia El Mrabet and Nicolas Gama. Efficient Multiplication over Extension Fields. In Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings. 2012, 136-151. BibTeX
@inproceedings{ElGa2012, author = "Nadia {El Mrabet} and Nicolas Gama", title = "Efficient Multiplication over Extension Fields", booktitle = "Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings", year = 2012, pages = "136-151", annote = "confint" }
Maria Christofi and Aline Gouget. Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol. In Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. 2012, 299-314. BibTeX
@inproceedings{ChGo2012, author = "Maria Christofi and Aline Gouget", title = "Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol", booktitle = "Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings", year = 2012, pages = "299-314", annote = "confint" }
Maria Christofi, Boutheina Chetali, Louis Goubin and David Vigilant. Formal verification of an implementation of CRT-RSA Vigilant's algorithm. In First International Workshop on Security Proofs for Embedded Systems, 2012, PROOFS 2012, Leuven, Belgium, September 13, 2012. 2012. BibTeX
@inproceedings{CCGV2012, author = "Maria Christofi and Boutheina Chetali and Louis Goubin and David Vigilant", title = "Formal verification of an implementation of CRT-RSA Vigilant's algorithm", booktitle = "First International Workshop on Security Proofs for Embedded Systems, 2012, PROOFS 2012, Leuven, Belgium, September 13, 2012", year = 2012, annote = "confint" }
Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater and Matthieu Rivain. Higher-Order Masking Schemes for S-Boxes. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. 2012, 366-384. BibTeX
@inproceedings{CGPQ2012, author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Micha{\"e}l Quisquater and Matthieu Rivain}, title = "Higher-Order Masking Schemes for S-Boxes", booktitle = "Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers", year = 2012, pages = "366-384", annote = "confint" }
Alexandre Berzati, Cécile Canovas-Dumas and Louis Goubin. Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems. In Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. 2012, 233-247. BibTeX
@inproceedings{BeCG2012a, author = "Alexandre Berzati and C{\'e}cile Canovas-Dumas and Louis Goubin", title = "Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems", booktitle = "Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday", year = 2012, pages = "233-247", annote = "confint" }
Anja Becker, Antoine Joux, Alexander May and Alexander Meurer. Decoding Random Binary Linear Codes in ${2^(n/20)}$: How 1+1=0 Improves Information Set Decoding. In Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. 2012, 520-536. BibTeX
@inproceedings{BJMM2012a, author = "Anja Becker and Antoine Joux and Alexander May and Alexander Meurer", title = "Decoding Random Binary Linear Codes in ${2^{(n/20)}}$: How 1+1=0 Improves Information Set Decoding", booktitle = "Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings", year = 2012, pages = "520-536", annote = "confint" }
Misc
Antoine Rojat. Review of cryptanalysis of RSA and its variants by Jason Hinek, in SIGACT News, vol. 43, pp. 16-18. 2012. BibTeX
@misc{Roja2012, author = "Antoine Rojat", title = "Review of cryptanalysis of RSA and its variants by Jason Hinek, in SIGACT News, vol. 43, pp. 16-18", year = 2012, annote = "vulg" }
Michaël Quisquater. The Hidden Side of Jean-Jacques Quisquater, in Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 1-2. 2012. BibTeX
@misc{Quis2012, author = {Micha{\"e}l Quisquater}, title = "The Hidden Side of Jean-Jacques Quisquater, in Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 1-2", year = 2012, annote = "vulg" }
Antoine Joux. A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract). Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, 2012. BibTeX
@misc{Joux2012a, author = "Antoine Joux", title = "A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract)", howpublished = "Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings", year = 2012, annote = "confinv", pages = "1-7" }
Nicolas Gama. Lattice reduction algorithms and Applications in Cryptology. CryptoBG, 2012. BibTeX
@misc{Gama2012, author = "Nicolas Gama", title = "Lattice reduction algorithms and Applications in Cryptology", howpublished = "CryptoBG", year = 2012, annote = "confinv" }
Louis Goubin. Post-Quantum Cryptography and Quantum Algorithms. Lorentz Center, Leiden, Pays-Bas, 0. BibTeX
@misc{Goub2012, author = "Louis Goubin", title = "Post-Quantum Cryptography and Quantum Algorithms", howpublished = "Lorentz Center, Leiden, Pays-Bas", year = "November 2012", annote = "confinv" }
Luca De Feo. Isogeny graphs in cryptography. YACC, Centre Igesa, Porquerolles, France, 0. BibTeX
@misc{DeF2012, author = "De Feo, Luca", title = "Isogeny graphs in cryptography", howpublished = "YACC, Centre Igesa, Porquerolles, France", year = "September 2012", annote = "confinv" }
PhdThesis
Anja Becker. La technique de représentation – Application à des problèmes difficiles en cryptographie. Thèse, Université de Versailles-St Quentin, 2012. BibTeX
@phdthesis{Beck2012, author = "Becker, Anja", title = "{La technique de repr\'esentation -- Application \`a des probl\`emes difficiles en cryptographie}", school = "Universit{\'e} de Versailles-St Quentin", year = 2012, type = "Th\`ese", month = "Octobre", annote = "these" }
Techreport
Jérôme Plût. Slope filtration on Banach-Colmez spaces. 2012. URL BibTeX
@techreport{Pl2012, author = "J{\'e}r{\^o}me Pl{\^u}t", title = "Slope filtration on Banach-Colmez spaces", year = 2012, annote = "rapport", url = "http://www.prism.uvsq.fr/~plut/filtration.pdf" }
Emmanuel Volte, Jacques Patarin and Valérie Nachef. Zero Knowledge with Rubik's Cubes. 0. BibTeX
@techreport{VoPN2012, author = "Emmanuel Volte and Jacques Patarin and Val{\'e}rie Nachef", title = "Zero Knowledge with Rubik's Cubes", year = "IACR Cryptology ePrint Archive, 2012/174", annote = "rapport", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://eprint.iacr.org/2012/174", journal = "IACR Cryptology ePrint Archive", pages = 174, volume = 2012 }
Valérie Nachef, Jacques Patarin and Emmanuel Volte. Zero-Knowledge for Multivariate Polynomials. 0. BibTeX
@techreport{NaPV2012, author = "Val{\'e}rie Nachef and Jacques Patarin and Emmanuel Volte", title = "Zero-Knowledge for Multivariate Polynomials", year = "IACR Cryptology ePrint Archive, 2012/239", annote = "rapport", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://eprint.iacr.org/2012/239", journal = "IACR Cryptology ePrint Archive", pages = 239, volume = 2012 }
Rodolphe Lampe and Jacques Patarin. Security of Feistel Schemes with New and Various Tools. 0. BibTeX
@techreport{LaPa2012, author = "Rodolphe Lampe and Jacques Patarin", title = "Security of Feistel Schemes with New and Various Tools", year = "IACR Cryptology ePrint Archive, 2012/131", annote = "rapport", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://eprint.iacr.org/2012/131", journal = "IACR Cryptology ePrint Archive", pages = 131, volume = 2012 }
Antoine Joux. Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields. 0. BibTeX
@techreport{Joux2012, author = "Antoine Joux", title = "Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields", year = "IACR Cryptology ePrint Archive, 2012/720", annote = "rapport", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://eprint.iacr.org/2012/720", journal = "IACR Cryptology ePrint Archive", pages = 720, volume = 2012 }
Anne Canteaut, Thomas Fuhr, Mar\'ıa Naya-Plasencia, Pascal Paillier, Jean-René Reinhard and Marion Videau. A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions. 0. BibTeX
@techreport{CFNP2012, author = "Anne Canteaut and Thomas Fuhr and Mar\'{\i}a Naya-Plasencia and Pascal Paillier and Jean-Ren{\'e} Reinhard and Marion Videau", title = "A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions", year = "IACR Cryptology ePrint Archive, 2012/363", annote = "rapport", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://eprint.iacr.org/2012/363", journal = "IACR Cryptology ePrint Archive", pages = 363, volume = 2012 }
Charles Bouillaguet, Patrick Derbez and Pierre-Alain Fouque. Automatic Search of Attacks on round-reduced AES and Applications. 0. BibTeX
@techreport{BoDF2012, author = "Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque", title = "Automatic Search of Attacks on round-reduced AES and Applications", year = "IACR Cryptology ePrint Archive, 2012/069", annote = "rapport", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://eprint.iacr.org/2012/069", journal = "IACR Cryptology ePrint Archive", pages = 69, volume = 2012 }
Anja Becker, Antoine Joux, Alexander May and Alexander Meurer. Decoding Random Binary Linear Codes in $2^n/20$: How 1+1=0 Improves Information Set Decoding. 0. BibTeX
@techreport{BJMM2012, author = "Anja Becker and Antoine Joux and Alexander May and Alexander Meurer", title = "Decoding Random Binary Linear Codes in $2^{n/20}$: How 1+1=0 Improves Information Set Decoding", year = "IACR Cryptology ePrint Archive, 2012/026", annote = "rapport", bibsource = "DBLP, http://dblp.uni-trier.de", ee = "http://eprint.iacr.org/2012/026", journal = "IACR Cryptology ePrint Archive", pages = 26, volume = 2012 }