publications

recent publications in reversed chronological order

2023

  1. VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
    Quentin Meunier, and Abdul Rahman Taleb
    In Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Roma, Italia, July 10-12, 2023 (Sabrina De Capitani Vimercati, and Pierangela Samarati, eds), SCITEPRESS, pp. 8 (2023).
    open access
  2. Unifying Freedom and Separation for Tight Probing-Secure Composition
    Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, and Abdul Rahman Taleb
    In Advances in Cryptology - CRYPTO 2023 - 43nd Annual International Cryptology Conference, CRYPTO 20223 Santa Barbara, CA, USA, August 19-24, 2023, Proceedings (Anna Lysyanskaya, and Helena Handschuh, eds), Springer, Lecture Notes in Computer Science, vol. to appear, (2023).
  3. Quantum security of subset cover problems
    Samuel Bouaziz-Ermann, Alex B. Grilo, and Damien Vergnaud
    In 4th Conference on Information-Theoretic Cryptography, ITC 2023, June 6-8, 2023, Aarhus, Denmark (Kai-Min Chung, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. to appear, (2023).
    open access
  4. Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
    Jules Maire, and Damien Vergnaud
    In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, Netherlands, September 25-29, 2023, Proceedings (Mauro Conti, and Gene Tsudik, eds), Springer, Lecture Notes in Computer Science, vol. to appear, (2023).

2022

  1. Les attaques cryptographiques sont-elles toujours meilleures que la force brute ?
    Charles Bouillaguet
    Habilitation à diriger des recherches. Sorbonne Université (2022).
    open access
  2. Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
    Thibauld Feneuil, Jules Maire, Matthieu Rivain, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
    open access doi
  3. On Polynomial Modular Number Systems over Z/pZ
    Jean-Claude Bajard, Jérémy Marrez, Thomas Plantard, and Pascal Véron
    Adv. in Math. of Comm. to appear, (2022).
    open access doi
  4. Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
    Florette Martinez
    In Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings (Giuseppe Ateniese, and Daniele Venturi, eds), Springer, Lecture Notes in Computer Science, vol. 13269, pp. 212–229 (2022).
    open access doi
  5. Secure storage - Confidentiality and Authentication
    Ryad Benadjila, Louiza Khati, and Damien Vergnaud
    Comput. Sci. Rev. 44, pp. 100465 (2022).
    open access doi
  6. IronMask: Versatile Verification of Masking Security
    Sonia Belaı̈d, Matthieu Rivain, and Abdul Rahman Taleb
    In 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, 22-26 May 2022 IEEE, vol. to appear, (2022).
    open access
  7. Attacks on Pseudo Random Number Generators Hiding a Linear Structure
    Florette Martinez
    In Topics in Cryptology - CT-RSA 2022 - Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings (Steven D. Galbraith, ed), Springer, Lecture Notes in Computer Science, vol. 13161, pp. 145–168 (2022).
    open access doi
  8. Cryptanalysis of Modular Exponentiation Outsourcing Protocols
    Charles Bouillaguet, Florette Martinez, and Damien Vergnaud
    Comput. J. 65, 9, pp. 2299-2314 (2022).
    open access doi
  9. A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over F2
    Charles Bouillaguet, Claire Delaplace, and Monika Trimoska
    In 5th SIAM symposium on simplicity in algorithms, SOSA 2022, co-located with SODA 2022, virtual, in January 10–11, 2022. Proceedings. pp. 285-296 (2022).
    open access doi

2021

  1. Drinfeld modules with complex multiplication, Hasse invariants and factoring polynomials over finite fields
    Javad Doliskani, Anand Kumar Narayanan, and Schost
    J. Symb. Comput. 105, pp. 199–213 (2021).
    open access doi
  2. Computational records with aging hardware: Controlling half the output of SHA-256
    Mellila Bouam, Charles Bouillaguet, Claire Delaplace, and Camille Noûs
    Parallel Comput. 106, pp. 102804 (2021).
    open access doi
  3. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
    Céline Chevalier, Fabien Laguillaumie, and Damien Vergnaud
    Algorithmica 83, 1, pp. 72–115 (2021).
    open access doi
  4. Speeding-up verification of digital signatures
    Abdul Rahman Taleb, and Damien Vergnaud
    J. Comput. Syst. Sci. 116, pp. 22–39 (2021).
    open access doi
  5. Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
    Eyal Kushilevitz, Rafail Ostrovsky, Emmanuel Prouff, Adi Rosén, Adrian Thillard, and Damien Vergnaud
    SIAM J. Discret. Math. 35, 1, pp. 465–484 (2021).
    open access doi
  6. Probing Security through Input-Output Separation and Revisited Quasilinear Masking
    Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, and Damien Vergnaud
    IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 3, pp. 599–640 (2021).
    open access doi
  7. Hardware security without secure hardware: How to decrypt with a password and a server
    Olivier Blazy, Laura Brouilhet, Céline Chevalier, Patrick Towa, Ida Tucker, and Damien Vergnaud
    Theor. Comput. Sci. 895, pp. 178–211 (2021).
    open access doi
  8. Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
    Sonia Belaı̈d, Matthieu Rivain, Abdul Rahman Taleb, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II (Mehdi Tibouchi, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 13091, pp. 157–188 (2021).
    open access doi
  9. On the Power of Expansion: More Efficient Constructions in the Random Probing Model
    Sonia Belaı̈d, Matthieu Rivain, and Abdul Rahman Taleb
    In Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part II (Anne Canteaut, and François-Xavier Standaert, eds), Springer, Lecture Notes in Computer Science, vol. 12697, pp. 313–343 (2021).
    open access doi
  10. The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
    Pooya Farshim, Louiza Khati, Yannick Seurin, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2021 - Cryptographers’ Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings (Kenneth G. Paterson, ed), Springer, Lecture Notes in Computer Science, vol. 12704, pp. 351–374 (2021).
    open access doi