Publications équipe CRYPTO- 2013

Articles

  1. Antoine Joux and Vanessa Vitse. Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on E(F$q^5$). J. Cryptology 26(1):119-143, 2013. BibTeX

    @article{JoVi2013,
    	author = "Antoine Joux and Vanessa Vitse",
    	title = "Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on E(F$q^5$)",
    	journal = "J. Cryptology",
    	year = 2013,
    	volume = 26,
    	pages = "119-143",
    	number = 1,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1007/s00145-011-9116-z"
    }
    
  2. Sorina Ionica and Antoine Joux. Pairing the volcano. Math. Comput. 82(281), 2013. BibTeX

    @article{IoJo2013,
    	author = "Sorina Ionica and Antoine Joux",
    	title = "Pairing the volcano",
    	journal = "Math. Comput.",
    	year = 2013,
    	volume = 82,
    	number = 281,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1090/S0025-5718-2012-02622-6"
    }
    
  3. Maria Christofi, Boutheina Chetali, Louis Goubin and David Vigilant. Formal verification of a CRT-RSA implementation against fault attacks. J. Cryptographic Engineering 3(3):157-167, 2013. BibTeX

    @article{CCGV2013,
    	author = "Maria Christofi and Boutheina Chetali and Louis Goubin and David Vigilant",
    	title = "Formal verification of a CRT-RSA implementation against fault attacks",
    	journal = "J. Cryptographic Engineering",
    	year = 2013,
    	volume = 3,
    	pages = "157-167",
    	number = 3,
    	annote = "revint",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://dx.doi.org/10.1007/s13389-013-0049-3"
    }
    

Inproceedings

  1. Emmanuel Volte, Jacques Patarin and Valérie Nachef. Zero Knowledge with Rubik's Cubes and Non-Abelian Groups. In CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings. 2013. BibTeX

    @inproceedings{VoPN2013,
    	author = "Emmanuel Volte and Jacques Patarin and Valérie Nachef",
    	title = "Zero Knowledge with Rubik's Cubes and Non-Abelian Groups",
    	booktitle = "CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings",
    	year = 2013,
    	annote = "confint"
    }
    
  2. Jacques Patarin. Generic Attacks for the Xor of k Random Permutations. In Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. 2013, 154-169. BibTeX

    @inproceedings{Pata2013a,
    	author = "Jacques Patarin",
    	title = "Generic Attacks for the Xor of k Random Permutations",
    	booktitle = "Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings",
    	year = 2013,
    	pages = "154-169",
    	annote = "confint"
    }
    
  3. Valerie Nachef, Emmanuel Volte and Jacques Patarin. Differential Attacks on Generalized Feistel Schemes. In CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings. 2013. BibTeX

    @inproceedings{NaVP2013,
    	author = "Valerie Nachef and Emmanuel Volte and Jacques Patarin",
    	title = "Differential Attacks on Generalized Feistel Schemes",
    	booktitle = "CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings",
    	year = 2013,
    	annote = "confint"
    }
    
  4. Ronan Lashermes, Jacques Fournier and Louis Goubin. Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults. In Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. 2013, 365-382. BibTeX

    @inproceedings{LaFG2013,
    	author = "Ronan Lashermes and Jacques Fournier and Louis Goubin",
    	title = "Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults",
    	booktitle = "Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings",
    	year = 2013,
    	pages = "365-382",
    	annote = "confint"
    }
    
  5. Rodolphe Lampe and Yannick Seurin. Tweakable Blockciphers with Asymptotically Optimal Security. In Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. 2013. BibTeX

    @inproceedings{LaSe2013b,
    	author = "Rodolphe Lampe and Yannick Seurin",
    	title = "Tweakable Blockciphers with Asymptotically Optimal Security",
    	booktitle = "Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers",
    	year = 2013,
    	annote = "confint"
    }
    
  6. Rodolphe Lampe and Yannick Seurin. How to Construct an Ideal Cipher from a Small Set of Public Permutations. In Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bangalore, India, December 1-5, 2013. Proceedings. 2013. BibTeX

    @inproceedings{LaSe2013a,
    	author = "Rodolphe Lampe and Yannick Seurin",
    	title = "How to Construct an Ideal Cipher from a Small Set of Public Permutations",
    	booktitle = "Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bangalore, India, December 1-5, 2013. Proceedings",
    	year = 2013,
    	annote = "confint"
    }
    
  7. Antoine Joux. Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields. In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. 2013, 177-193. BibTeX

    @inproceedings{Joux2013b,
    	author = "Antoine Joux",
    	title = "Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields",
    	booktitle = "Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings",
    	year = 2013,
    	pages = "177-193",
    	annote = "confint"
    }
    
  8. Andri Ioannou, Maria Christofi and Christina Vasiliou. A Case Study of Interactive Tabletops in Education: Attitudes, Issues of Orientation and Asymmetric Collaboration. In Scaling up Learning for Sustained Impact - 8th European Conference, on Technology Enhanced Learning, EC-TEL 2013, Paphos, Cyprus, September 17-21, 2013. Proceedings. 2013, 466-471. BibTeX

    @inproceedings{IoCV2013,
    	author = "Andri Ioannou and Maria Christofi and Christina Vasiliou",
    	title = "A Case Study of Interactive Tabletops in Education: Attitudes, Issues of Orientation and Asymmetric Collaboration",
    	booktitle = "Scaling up Learning for Sustained Impact - 8th European Conference, on Technology Enhanced Learning, EC-TEL 2013, Paphos, Cyprus, September 17-21, 2013. Proceedings",
    	year = 2013,
    	pages = "466-471",
    	annote = "confint"
    }
    
  9. Louis Goubin, Ange Martinelli and Matthieu Walle. Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design. In Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22- 24, 2013. Proceedings. 2013, 240-259. BibTeX

    @inproceedings{GoMW2013,
    	author = "Louis Goubin and Ange Martinelli and Matthieu Walle",
    	title = "Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design",
    	booktitle = "Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22- 24, 2013. Proceedings",
    	year = 2013,
    	pages = "240-259",
    	annote = "confint"
    }
    
  10. Pierre-Alain Fouque, Antoine Joux and Mehdi Tibouchi. Injective Encodings to Elliptic Curves. In Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. 2013, 203-218. BibTeX

    @inproceedings{FoJT2013a,
    	author = "Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi",
    	title = "Injective Encodings to Elliptic Curves",
    	booktitle = "Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings",
    	year = 2013,
    	pages = "203-218",
    	annote = "confint"
    }
    
  11. Luca De Feo, Javad Doliskani and Éric Schost. Fast algorithms for ıt l-adic towers over finite fields. In International Symposium on Symbolic and Algebraic Computation, ISSAC'13, Boston, MA, USA, June 26-29, 2013. 2013, 165-172. BibTeX

    @inproceedings{DeDS2013a,
    	author = "Luca {De Feo} and Javad Doliskani and {\'E}ric Schost",
    	title = "Fast algorithms for {\it l}-adic towers over finite fields",
    	booktitle = "International Symposium on Symbolic and Algebraic Computation, ISSAC'13, Boston, MA, USA, June 26-29, 2013",
    	year = 2013,
    	pages = "165-172",
    	annote = "confint"
    }
    
  12. Anne Canteaut, Mar\'ıa Naya-Plasencia and Bastien Vayssière. Sieve-in-the-Middle: Improved MITM Attacks. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I. 2013, 222-240. BibTeX

    @inproceedings{CaNV2013a,
    	author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia and Bastien Vayssi{\`e}re",
    	title = "Sieve-in-the-Middle: Improved MITM Attacks",
    	booktitle = "Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I",
    	year = 2013,
    	pages = "222-240",
    	annote = "confint"
    }
    
  13. Charles Bouillaguet and Bastien Vayssière. Provable Second Preimage Resistance Revisited. In Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers. 2013. BibTeX

    @inproceedings{BoVa2013,
    	author = "Charles Bouillaguet and Bastien Vayssi\`ere",
    	title = "Provable Second Preimage Resistance Revisited",
    	booktitle = "Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers",
    	year = 2013,
    	annote = "confint"
    }
    
  14. Alberto Battistello and Christophe Giraud. Fault Analysis of Infective AES Computations. In Tenth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013, FDTC 2013, Santa Barbara, CA, USA, August 20, 2013. 2013. BibTeX

    @inproceedings{BaGi2013,
    	author = "Alberto Battistello and Christophe Giraud",
    	title = "Fault Analysis of Infective AES Computations",
    	booktitle = "Tenth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013, FDTC 2013, Santa Barbara, CA, USA, August 20, 2013",
    	year = 2013,
    	annote = "confint"
    }
    

Misc

  1. Michael Quisquater. How to mask S-Boxes of a block cipher against side channel attacks. Focus on the AES. juin 2013. Exposé invité à l'école d'été d'Albena (Bulgarie) organisée par la KULeuven (Belgique).. BibTeX

    @misc{Quis2013,
    	author = "Michael Quisquater",
    	title = "How to mask S-Boxes of a block cipher against side channel attacks. Focus on the AES",
    	month = "June",
    	year = 2013,
    	note = "Expos\'e invit\'e \`a l'\'ecole d'\'et\'e d'Albena (Bulgarie) organis\'ee par la KULeuven (Belgique).",
    	annote = "confinv"
    }
    
  2. Antoine Joux. Revisiting Discrete Logarithms in Small/Medium Characteristic Finite Fields - (Invited Talk Abstract). Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers, 2013. BibTeX

    @misc{Joux2013a,
    	author = "Antoine Joux",
    	title = "Revisiting Discrete Logarithms in Small/Medium Characteristic Finite Fields - (Invited Talk Abstract)",
    	howpublished = "Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers",
    	year = 2013,
    	annote = "confinv"
    }
    
  3. Nicolas Gama. Tutorial session: implementation of Lattice algorithms and attacks. CryptoBG, 2013. BibTeX

    @misc{Gama2013,
    	author = "Nicolas Gama",
    	title = "Tutorial session: implementation of Lattice algorithms and attacks",
    	howpublished = "CryptoBG",
    	year = 2013,
    	annote = "confinv"
    }
    

PhdThesis

  1. Bastien Vayssière. Conception et cryptanalyse de primitives symétriques. Thèse, Université de Versailles-St Quentin, 2013. BibTeX

    @phdthesis{Vays2013,
    	author = "Vayssi\`ere, Bastien",
    	title = "{Conception et cryptanalyse de primitives sym\'etriques}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2013,
    	type = "Th\`ese",
    	month = "Septembre",
    	annote = "these"
    }
    
  2. Maria Christofi. Preuves de sécurité outillées d'implémentations cryptographiques. Thèse, Université de Versailles-St Quentin, 2013. BibTeX

    @phdthesis{Chri2013,
    	author = "Christofi, Maria",
    	title = "{Preuves de s\'ecurit\'e outill\'ees d'impl\'ementations cryptographiques}",
    	school = "Universit{\'e} de Versailles-St Quentin",
    	year = 2013,
    	type = "Th\`ese",
    	month = "F\'evrier",
    	annote = "these"
    }
    

Techreport

  1. Jacques Patarin. Security in O($2^n$) for the Xor of Two Random Permutations – Proof with the standard H technique. 0. BibTeX

    @techreport{Pata2013,
    	author = "Jacques Patarin",
    	title = "Security in O($2^n$) for the Xor of Two Random Permutations -- Proof with the standard H technique",
    	year = "IACR Cryptology ePrint Archive, 2013/368",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/368",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 368,
    	volume = 2013
    }
    
  2. Rodolphe Lampe and Yannick Seurin. How to Construct an Ideal Cipher from a Small Set of Public Permutations. 0. BibTeX

    @techreport{LaSe2013,
    	author = "Rodolphe Lampe and Yannick Seurin",
    	title = "How to Construct an Ideal Cipher from a Small Set of Public Permutations",
    	year = "IACR Cryptology ePrint Archive, 2013/255",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/255",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 255,
    	volume = 2013
    }
    
  3. Antoine Joux and Antoine Rojat. On Diffie-Hellman - like Security Assumptions. 0. BibTeX

    @techreport{JoRo2013,
    	author = "Antoine Joux and Antoine Rojat",
    	title = "On Diffie-Hellman - like Security Assumptions",
    	year = "IACR Cryptology ePrint Archive, 2013/291",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/291",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 291,
    	volume = 2013
    }
    
  4. Antoine Joux. A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic. 0. BibTeX

    @techreport{Joux2013,
    	author = "Antoine Joux",
    	title = "A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic",
    	year = "IACR Cryptology ePrint Archive, 2013/095",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/095",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 95,
    	volume = 2013
    }
    
  5. Pierre-Alain Fouque, Antoine Joux and Mehdi Tibouchi. Injective Encoding to Elliptic Curves. 0. BibTeX

    @techreport{FoJT2013,
    	author = "Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi",
    	title = "Injective Encoding to Elliptic Curves",
    	year = "IACR Cryptology ePrint Archive, 2013/373",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/373",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 373,
    	volume = 2013
    }
    
  6. Luca De Feo, Javad Doliskani and Éric Schost. Fast algorithms for ell-adic towers over finite fields. 0. BibTeX

    @techreport{DeDS2013,
    	author = "Luca {De Feo} and Javad Doliskani and {\'E}ric Schost",
    	title = "Fast algorithms for ell-adic towers over finite fields",
    	year = "CoRR abs/1301.6021, 2013",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://arxiv.org/abs/1301.6021",
    	journal = "CoRR",
    	volume = "abs/1301.6021"
    }
    
  7. Anne Canteaut, Mar\'ıa Naya-Plasencia and Bastien Vayssière. Sieve-in-the-Middle: Improved MITM Attacks (Full Version). 0. BibTeX

    @techreport{CaNV2013,
    	author = "Anne Canteaut and Mar\'{\i}a Naya-Plasencia and Bastien Vayssi{\`e}re",
    	title = "Sieve-in-the-Middle: Improved MITM Attacks (Full Version)",
    	year = "IACR Cryptology ePrint Archive, 2013/324",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/324",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 324,
    	volume = 2013
    }
    
  8. Razvan Barbulescu, Pierrick Gaudry, Antoine Joux and Emmanuel Thomé. A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. 0. BibTeX

    @techreport{BGJT2013,
    	author = "Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'e}",
    	title = "A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic",
    	year = "CoRR abs/1306.4244, 2013",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://arxiv.org/abs/1306.4244",
    	journal = "CoRR",
    	volume = "abs/1306.4244"
    }
    
  9. Razvan Barbulescu, Pierrick Gaudry, Antoine Joux and Emmanuel Thomé. A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. 0. BibTeX

    @techreport{BGJT2013a,
    	author = "Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'e}",
    	title = "A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic",
    	year = "IACR Cryptology ePrint Archive, 2013/400",
    	annote = "rapport",
    	bibsource = "DBLP, http://dblp.uni-trier.de",
    	ee = "http://eprint.iacr.org/2013/400",
    	journal = "IACR Cryptology ePrint Archive",
    	pages = 400,
    	volume = 2013
    }
    
 

 Imprimer 

DMC Firewall is developed by Dean Marshall Consultancy Ltd