Partenaires





« décembre 2016 »
L M M J V S D
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Rechercher

Sur ce site

Sur le Web du CNRS


Accueil du site > Équipes > CRYPTO > Archives des publications de l’équipe CRYPTO > Publications équipe CRYPTO 2005

Publications équipe CRYPTO 2005

  • Jacques Patarin. On Linear Systems of Equations with Distinct Variables and small Block Size. In Proceedings of ICISC. décembre 2005.
  • Jacques Patarin and Audrey Montreuil. Benes and Butterfly Schemes Revisited. In Proceedings of ICISC. décembre 2005.
  • Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DECIM, a new stream cipher for hardware applications. In Proceedings of Symmetric Key Encryption Workshop. mai 2005.
  • Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. DECIM, a new Stream Cipher for Hardware applications. ECRYPT Stream Cipher Project Report 2005/027, 2005.
  • Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. Sosemanuk, a fast software-oriented stream cipher. ECRYPT Stream Cipher Project Report 2005/027, 2005.
  • Nicolas Courtois and Louis Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks. IACR ePrint Archive, 2005/204, 2005.
  • Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris J Mitchell. Analysis of the Bit-Search Generator and Sequence Compression Techniques. In Fast Software Encryption 3557. 2005, 196-214.
  • Olivier Billet and Henri Gilbert. Resistance of SNOW 2.0 Against Algebraic Attacks. In Topics in Cryptology-CT-RSA 3376. 2005, 19-28.
  • Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. SOSEMANUK, a fast software-oriented stream cipher. In Proceedings of Symmetric Key Encryption Workshop. 2005.
  • Nicolas Courtois and Louis Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks. In Proceedings of ICISC. 2005.
  • Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller and Pierre-Michel Ricordel. Cryptanalysis of the Tractable Rational Map Cryptosystem. In Proceedings of Public Key Cryptography. 2005, 258-274.
  • Antoine Joux and Frédéric Muller. Two Attacks Against the HBB Stream Cipher. In Proceedings of FSE. 2005, 330-341.
  • Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, C Lemuet and William Jalby. Collisions of SHA-0 and Reduced SHA-1. In Proceedings of EUROCRYPT. 2005, 36-57.
  • Michael Quisquater, Bart Preneel and Jean-Jacques Vandewalle. Spectral Characterization of Cryptographic Boolean Functions Satifying the (Extended) Propagation Criterium of Degree $l$ and Order $k$. Information Processing letters 93(1):25-28, 2005.
  • Louis Goubin and Jacques Patarin. Le hasard, une idée, un concept, un outil. Chapter La génération d’aléas sur ordinateur, L’Harmattan, 2005.
  • Olivier Billet. Cryptologie Multivariable. UVSQ, 2005.