selected publications

selected publications in reversed chronological order

  1. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
    Céline Chevalier, Fabien Laguillaumie, and Damien Vergnaud
    Algorithmica 83, 1, pp. 72–115 (2021).
    open access doi
  2. Practical seed-recovery for the PCG Pseudo-Random Number Generator
    Charles Bouillaguet, Florette Martinez, and Julia Sauvage
    IACR Trans. Symmetric Cryptol. 2020, 3, pp. 175–196 (2020).
    open access doi
  3. On Decoding Cohen-Haeupler-Schulman Tree Codes
    Anand Kumar Narayanan, and Matthew Weidner
    In Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, SODA 2020, Salt Lake City, UT, USA, January 5-8, 2020 (Shuchi Chawla, ed), SIAM, pp. 1337–1356 (2020).
    open access doi
  4. HyPoRes: An Hybrid Representation System for ECC
    Paulo Martins, Jérémy Marrez, Jean-Claude Bajard, and Leonel Sousa
    In 26th IEEE Symposium on Computer Arithmetic, ARITH 2019, Kyoto, Japan, June 10-12, 2019 (Naofumi Takagi, Sylvie Boldo, and Martin Langhammer, eds), IEEE, pp. 207–214 (2019).
    open access doi
  5. GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited
    Gilles Barthe, Sonia Belaı̈d, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, and Mehdi Tibouchi
    In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019 (Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz, eds), ACM, pp. 2147–2164 (2019).
    open access doi
  6. Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols
    Thomas Espitau, Pierre-Alain Fouque, Benoı̂t Gérard, and Mehdi Tibouchi
    IEEE Trans. Computers 67, 11, pp. 1535–1549 (2018).
    open access doi
  7. Masking the GLP Lattice-Based Signature Scheme at Any Order
    Gilles Barthe, Sonia Belaı̈d, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, and Mehdi Tibouchi
    In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II (Jesper Buus Nielsen, and Vincent Rijmen, eds), Springer, Lecture Notes in Computer Science, vol. 10821, pp. 354–384 (2018).
    open access doi
  8. Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in LΔK(1/2) and Application to the Cryptanalysis of a FHE Scheme
    Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, and Paul Kirchner
    In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I (Jean-Sébastien Coron, and Jesper Buus Nielsen, eds), Lecture Notes in Computer Science, vol. 10210, pp. 60–88 (2017).
    open access doi
  9. Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances (Invited Talk)
    Antoine Joux
    In 34th Symposium on Theoretical Aspects of Computer Science, STACS 2017, March 8-11, 2017, Hannover, Germany (Heribert Vollmer, and Brigitte Vallée, eds), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. 66, pp. 3:1–3:1 (2017).
    open access doi
  10. Parametrizations for Families of ECM-Friendly Curves
    Alexandre Gélin, Thorsten Kleinjung, and Arjen K. Lenstra
    In Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC 2017, Kaiserslautern, Germany, July 25-28, 2017 (Michael A. Burr, Chee K. Yap, and Mohab Safey El Din, eds), ACM, pp. 165–171 (2017).
    open access doi