publications
recent publications in reversed chronological order
2023
-
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
In Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Roma, Italia, July 10-12, 2023 (Sabrina De Capitani Vimercati, and Pierangela Samarati, eds), SCITEPRESS, pp. 8 (2023).
open access -
Unifying Freedom and Separation for Tight Probing-Secure Composition
In Advances in Cryptology - CRYPTO 2023 - 43nd Annual International Cryptology Conference, CRYPTO 20223 Santa Barbara, CA, USA, August 19-24, 2023, Proceedings (Anna Lysyanskaya, and Helena Handschuh, eds), Springer, Lecture Notes in Computer Science, vol. to appear, (2023). -
Quantum security of subset cover problems
In 4th Conference on Information-Theoretic Cryptography, ITC 2023, June 6-8, 2023, Aarhus, Denmark (Kai-Min Chung, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. to appear, (2023).
open access -
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, Netherlands, September 25-29, 2023, Proceedings (Mauro Conti, and Gene Tsudik, eds), Springer, Lecture Notes in Computer Science, vol. to appear, (2023).
2022
-
Les attaques cryptographiques sont-elles toujours meilleures que la force brute ?
Habilitation à diriger des recherches. Sorbonne Université (2022).
open access -
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
open access doi -
On Polynomial Modular Number Systems over Z/pZ
Adv. in Math. of Comm. to appear, (2022).
open access doi -
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
In Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings (Giuseppe Ateniese, and Daniele Venturi, eds), Springer, Lecture Notes in Computer Science, vol. 13269, pp. 212–229 (2022).
open access doi -
Secure storage - Confidentiality and Authentication
Comput. Sci. Rev. 44, pp. 100465 (2022).
open access doi -
IronMask: Versatile Verification of Masking Security
In 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, 22-26 May 2022 IEEE, vol. to appear, (2022).
open access -
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
In Topics in Cryptology - CT-RSA 2022 - Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings (Steven D. Galbraith, ed), Springer, Lecture Notes in Computer Science, vol. 13161, pp. 145–168 (2022).
open access doi -
Cryptanalysis of Modular Exponentiation Outsourcing Protocols
Comput. J. 65, 9, pp. 2299-2314 (2022).
open access doi -
A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over F2
In 5th SIAM symposium on simplicity in algorithms, SOSA 2022, co-located with SODA 2022, virtual, in January 10–11, 2022. Proceedings. pp. 285-296 (2022).
open access doi
2021
-
Drinfeld modules with complex multiplication, Hasse invariants and factoring polynomials over finite fields
J. Symb. Comput. 105, pp. 199–213 (2021).
open access doi -
Computational records with aging hardware: Controlling half the output of SHA-256
Parallel Comput. 106, pp. 102804 (2021).
open access doi -
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Algorithmica 83, 1, pp. 72–115 (2021).
open access doi -
Speeding-up verification of digital signatures
J. Comput. Syst. Sci. 116, pp. 22–39 (2021).
open access doi -
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
SIAM J. Discret. Math. 35, 1, pp. 465–484 (2021).
open access doi -
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 3, pp. 599–640 (2021).
open access doi -
Hardware security without secure hardware: How to decrypt with a password and a server
Theor. Comput. Sci. 895, pp. 178–211 (2021).
open access doi -
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
In Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II (Mehdi Tibouchi, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 13091, pp. 157–188 (2021).
open access doi -
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
In Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part II (Anne Canteaut, and François-Xavier Standaert, eds), Springer, Lecture Notes in Computer Science, vol. 12697, pp. 313–343 (2021).
open access doi -
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
In Topics in Cryptology - CT-RSA 2021 - Cryptographers’ Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings (Kenneth G. Paterson, ed), Springer, Lecture Notes in Computer Science, vol. 12704, pp. 351–374 (2021).
open access doi