Bibliography by year
2014
Recovering a sum of two squares decomposition.
with
Jaime Gutierrez
and
Álvar Ibeas.
Journal of Symbolic Computation
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields.
with
Cécile Pierrot.
ASIACRYPT
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
with
Pierre-Alain Fouque
and
Chrysanthi Mavromati.
ASIACRYPT
A sieve algorithm based on overlattices.
with
Anja Becker
and
Nicolas Gama.
LMS Journal of Computation and Mathematics
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
with
Jean-Charles Faugère, Louise Huot, Guénaël Renault
and
Vanessa Vitse.
EUROCRYPT
2013
The Special Number Field Sieve in GF(p
^{n}
), Application to Pairing-Friendly Constructions
with
Cécile Pierrot
.
Pairing
On Diffie-Hellman like Security Assumptions
with
Antoine Rojat
.
ISC
A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic.
SAC
Injective Encodings to Elliptic Curves
with
Pierre-Alain Fouque
and
Mehdi Tibouchi
.
ACISP
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields.
EUROCRYPT
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on E(GF(q
^{5}
))
with
Vanessa Vitse
.
J. Cryptology
Pairing the volcano
with
Sorina Ionica
.
Math. Comput.
2012
A family of weak keys in HFE and the corresponding practical key-recovery
with
Charles Bouillaguet
,
Pierre-Alain Fouque
and
Joana Treger
.
J. Mathematical Cryptology
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
with
Marcel Medwed
and
François-Xavier Standaert
.
CHES
A Tutorial on High Performance Computing Applied to Cryptanalysis.
EUROCRYPT
(Invited Talk)
Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over GF(p
^{6}
)
with
Vanessa Vitse
.
EUROCRYPT
Decoding Random Binary Linear Codes in 2
^{n/20}
: How 1 + 1 = 0 Improves Information Set Decoding
with
Anja Becker
,
Alexander May
and
Alexander Meurer
.
EUROCRYPT
2011
A Variant of the F4 Algorithm
with
Vanessa Vitse
.
CT-RSA
Improved Generic Algorithms for Hard Knapsacks
with
Anja Becker
and
Jean-Sébastien Coron
.
EUROCRYPT
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
with
Jean-Sébastien Coron
,
Avradip Mandal
,
David Naccache
and
Mehdi Tibouchi
.
PKC
Fast Software Encryption, Lyngby, Denmark.
(Volume Editor)
2010
On the security of blockwise secure modes of operation beyond the birthday bound.
IEEE TIT
Pairing the volcano
with
Sorina Ionica
.
ANTS
New Generic Algorithms for Hard Knapsacks
with
Nick Howgrave-Graham
.
EUROCRYPT
Cryptanalysis of the Hidden Matrix Cryptosystem
with
Jean-Charles Faugère
,
Ludovic Perret
and
Joana Treger
.
LATINCRYPT
Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree
with
Sorina Ionica
.
Pairing
2009
Algorithmic Cryptanalysis.
Chapman & Hall/CRC Cryptography and Network Security Series
Improved Generic Algorithms for 3-Collisions
with
Stefan Lucks
.
ASIACRYPT
Factoring pq
^{2}
with Quadratic Forms: Nice Cryptanalyses
with
Guilhem Castagnos
,
Fabien Laguillaumie
and
Phong Q. Nguyen
.
ASIACRYPT
Fault Attacks on RSA Signatures with Partially Unknown Messages
with
Jean-Sébastien Coron
,
Ilya Kizhvatov
,
David Naccache
and
Pascal Paillier
.
CHES
Oracle-Assisted Static Diffie-Hellman Is Easier than Discrete Logarithms
with
Reynald Lercier
,
David Naccache
and
Emmanuel Thomé
.
IMA Int. Conf.
Advances in Cryptology - EUROCRYPT 2009, Cologne, Germany.
(Volume Editor)
2008
Introduction chapter of
Identity-Based Cryptography
edited by
Marc Joye
and
Gregory Neven
.
IOS Press, Cryptology and Information Security Series
Yet Another Attack on Vest
with
Pascal Delaunay
.
AFRICACRYPT
Another Approach to Pairing Computation in Edwards Coordinates
with
Sorina Ionica
.
INDOCRYPT
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
with
Côme Berbain
and
Henri Gilbert
.
SAC
2007
When e-th Roots Become Easier than Factoring
with
David Naccache
and
Emmanuel Thomé
.
ASIACRYPT
Hash Functions and the (Amplified) Boomerang Attack
with
Thomas Peyrin
.
CRYPTO
Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables
with
Aurélie Bauer
.
EUROCRYPT
Overtaking VEST
with
Jean-René Reinhard
.
FSE
2006
The Number Field Sieve in the Medium Prime Case
with
Reynald Lercier
,
Nigel P. Smart
and
Frederik Vercauteren
.
CRYPTO
Inverting HFE Is Quasipolynomial
with
Louis Granboulan
and
Jacques Stern
.
CRYPTO
The Function Field Sieve in the Medium Prime Case
with
Reynald Lercier
.
EUROCRYPT
Chosen-Ciphertext Attacks Against MOSQUITO
with
Frédéric Muller
.
FSE
Galois LFSR, Embedded Devices and Side Channel Weaknesses
with
Pascal Delaunay
.
INDOCRYPT
2005
Collisions of SHA-0 and Reduced SHA-1
with
Eli Biham
,
Rafi Chen
,
Patrick Carribault
,
Christophe Lemuet
and
William Jalby
.
EUROCRYPT
Two Attacks Against the HBB Stream Cipher
with
Frédéric Muller
.
FSE
Cryptanalysis of the Tractable Rational Map Cryptosystem
with
Sébastien Kunz-Jacques
,
Frédéric Muller
and
Pierre-Michel Ricordel
.
PKC
2004
A One Round Protocol for Tripartite Diffie-Hellman.
J. Cryptology
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
CRYPTO
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
with
Pierre-Alain Fouque
and
Guillaume Poupard
.
SAC
2003
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups
with
Kim Nguyen
.
J. Cryptology
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the Gaussian integer method
with
Reynald Lercier
.
Math. Comput.
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
with
Jean-Charles Faugère
.
CRYPTO
Cryptanalysis of the EMD Mode of Operation.
EUROCRYPT
Loosening the KNOT
with
Frédéric Muller
.
FSE
New Attacks against Standardized MACs
with
Guillaume Poupard
and
Jacques Stern
.
FSE
Authenticated On-Line Encryption
with
Pierre-Alain Fouque
,
Gwenaëlle Martinet
and
Frédéric Valette
.
SAC
A Chosen IV Attack Against Turing
with
Frédéric Muller
.
SAC
2002
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems.
ANTS
(Invited Talk)
The Function Field Sieve Is Quite Special
with
Reynald Lercier
.
ANTS
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC
with
Gwenaëlle Martinet
and
Frédéric Valette
.
CRYPTO
Fast Correlation Attacks: An Algorithmic Point of View
with
Philippe Chose
and
Michel Mitton
.
EUROCRYPT
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction
with
Éliane Jaulmes
and
Frédéric Valette
.
FSE
2001
"Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm
with
Reynald Lercier
.
Math. Comput.
Cryptanalysis of PKP: A New Approach
with
Éliane Jaulmes
.
PKC
2000
A One Round Protocol for Tripartite Diffie-Hellman.
ANTS
Why Textbook ElGamal and RSA Encryption Are Insecure
with
Dan Boneh
and
Phong Q. Nguyen
.
ASIACRYPT
A Chosen-Ciphertext Attack against NTRU
with
Éliane Jaulmes
.
CRYPTO
A NICE Cryptanalysis
with
Éliane Jaulmes
.
EUROCRYPT
A Statistical Attack on RC6
with
Henri Gilbert
,
Helena Handschuh
and
Serge Vaudenay
.
FSE
1998
Lattice Reduction: A Toolbox for the Cryptanalyst
with
Jacques Stern
.
J. Cryptology
The action of a few permutations on r-tuples is quickly transitive
with
Joel Friedman
,
Yuval Roichman
,
Jacques Stern
and
Jean-Pierre Tillich
.
Random Struct. Algorithms
Differential Collisions in SHA-0
with
Florent Chabaud
.
CRYPTO
1996
The action of a few permutations on r-tuples is quickly transitive
with
Joel Friedman
,
Yuval Roichman
,
Jacques Stern
and
Jean-Pierre Tillich
.
STACS
1995
Sur les sommes de caractères liées aux courbes elliptiques à multiplication complexe
with
François Morain
.
J. Number Theory
1994
A Practical Attack against Knapsack based Hash Functions
with
Louis Granboulan
.
EUROCRYPT
1993
A fast parallel lattice reduction algorithm.
Second Gauss Symposium
1992
Improved Low-Density Subset Sum Algorithms
with
Matthijs J. Coster
,
Brian A. LaMacchia
,
Andrew M. Odlyzko
,
Claus-Peter Schnorr
and
Jacques Stern
.
Computational Complexity
1991
Cryptanalysis of Another Knapsack Cryptosystem
with
Jacques Stern
.
ASIACRYPT
The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks
with
Yeow Meng Chee
and
Jacques Stern
.
CRYPTO
Last modified: Fri Jan 16 14:54:27 CET 2015