Partenaires





« décembre 2016 »
L M M J V S D
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Rechercher

Sur ce site

Sur le Web du CNRS


Accueil du site > Équipes > CRYPTO > Archives des publications de l’équipe CRYPTO > Publications équipe CRYPTO 2011

Publications équipe CRYPTO 2011

Articles

  • Luca De Feo. Fast algorithms for computing isogenies between ordinary elliptic curves in small characteristic. Journal of Number Theory 131(5):873–893, 2011.

Inbooks

  • Antoine Joux and Reynald Lercier. Number Field Sieve for the DLP, in Encyclopedia of Cryptography and Security (2nd Ed.). pages 867-873, 2011.
  • Louis Goubin, Jacques Patarin and Bo-Yin Yang. Multivariate Cryptography, in Encyclopedia of Cryptography and Security (2nd Ed.). pages 824-828, 2011. (doi)

Inproceedings

  • Jérôme Plût. On Various Families of Twisted Jacobi Quartics. In Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. 2011, 373-383.
  • Jacques Patarin. Some Transfinite Generalisations of Gödel’s Incompleteness Theorem. In HyperNet2011, June 6-10, 2011, Turku, Finland, TUCS Lecture Notes N.14. 2011, 113-122.
  • Mar\’ıa Naya-Plasencia, Deniz Toz and Kerem Varici. Rebound Attack on JH42. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 252-269.
  • Mar\’ıa Naya-Plasencia, Andrea Röck and Willi Meier. Practical Analysis of Reduced-Round Keccak. In Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. 2011, 236-254.
  • Marine Minier and Mar\’ıa Naya-Plasencia. Some Preliminary Studies on the Differential Behavior of the Lightweight Block Cipher LBlock. In ECRYPT II Workshop on Lightweight Cryptography, November 28-29, 2011, Louvain-la-Neuve, Belgium. 2011.
  • Antoine Joux and Vanessa Vitse. A Variant of the F4 Algorithm. In Topics in Cryptology - CT-RSA 2011 - The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. 2011, 356-375.
  • David Jao and Luca De Feo. Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. In Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings. 2011, 19-34.
  • Malika Izabachène, Benoît Libert and Damien Vergnaud. Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes. In Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. 2011, 431-450.
  • Louis Goubin and Ange Martinelli. Protecting AES with Shamir’s Secret Sharing Scheme. In Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings. 2011, 79-94.
  • Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. In Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings. 2011, 240-255.

Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Montgomery’s Trick and Fast Implementation of Masked AES. In Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings. 2011, 153-169.

  • Thomas Fuhr, Henri Gilbert, Jean-René Reinhard and Marion Videau. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. In Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. 2011, 230-242.
  • Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache and Mehdi Tibouchi. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. In Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. 2011, 147-155.
  • Serge Chaumette, Olivier Ly and Renaud Tabary. Automated extraction of polymorphic virus signatures using abstract interpretation. In 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011. 2011, 41-48.
  • Charles Bouillaguet, Pierre-Alain Fouque and Gilles Macario-Rat. Practical Key-Recovery for All Possible Parameters of SFLASH. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 667-685.
  • Charles Bouillaguet, Patrick Derbez and Pierre-Alain Fouque. Automatic Search of Attacks on Round-Reduced AES and Applications. In Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings. 2011, 169-187.
  • Anja Becker, Jean-Sébastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. In Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. 2011, 364-385.
  • Sébastien Bardin, Philippe Herrmann, Jérôme Leroux, Olivier Ly, Renaud Tabary and Aymeric Vincent. The BINCOA Framework for Binary Code Analysis. In Computer Aided Verification - 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings. 2011, 165-170.
  • Jean-Philippe Aumasson, Mar\’ıa Naya-Plasencia and Markku-Juhani O Saarinen. Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. In Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. 2011, 134-145.
  • Mohamed Ahmed Abdelraheem, Céline Blondeau, Mar\’ıa Naya-Plasencia, Marion Videau and Erik Zenner. Cryptanalysis of ARMADILLO2. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 308-326.

Misc

  • Aline Gouget, Louis Goubin, Pascal Paillier and Karine Villegas. Method for establishing a secured communication without preliminary information share. Patent EP 2389742 A1. novembre 2011.
  • Louis Goubin and Nicolas Courtois. Method and apparatus for generating cryptographic sets of instructions automatically and code generator. Patent 8000473. août 2011.
  • Vanessa Vitse. Cover and Decomposition Attacks. ECC Invited Talk (joint work with Antoine Joux), 2011.
  • Naomi Benger. Efficient Finite Field Arithmetic for Pairing-Based Cryptography (joint work with Selcuk Baktir). In 10th International Conference on Finite Fields and their Applications, 2011.

PhdThesis

  • Vanessa Vitse. Attaques algébriques du problème du logarithme discret sur courbes elliptiques. Thèse, Université de Versailles-St Quentin, 2011. (tel)
  • Jean-René Reinhard. Etude de Primitives Cryptographiques Symétriques : Chiffrements par Flot et Fonctions de Hachage. Thèse, Université de Versailles-St Quentin, 2011.
  • Ange Martinelli. Protection d’algorithmes de chiffrement par blocs contre les attaques par canaux auxiliaires d’ordre supérieur. Thèse, Université de Versailles-St Quentin, 2011.
  • Pascal Delaunay. Attaques physiques sur des algorithmes de chiffrement par flot. Thèse, Université de Versailles-St Quentin, 2011.

Proceedings

  • Antoine Joux (ed.). Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers . Lecture Notes in Computer Science. Springer, 2011, vol 6733. (doi)

Techreport

  • Jérôme Plût. p-adic analytic Banach spaces and the fundamental lemma of Colmez and Fontaine. 2011.
  • Valérie Nachef, Emmanuel Volte and Jacques Patarin. Differential Attacks on Generalized Feistel Schemes. IACR Cryptology ePrint Archive, 2011/705. (pdf)
  • Avradip Mandal, Jacques Patarin and Yannick Seurin. On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. IACR Cryptology ePrint Archive, 2011/496. ([http://eprint.iacr.org/2011/496])
  • Rodolphe Lampe and Jacques Patarin. Analysis of some natural variants of the PKP Algorithm. IACR Cryptology ePrint Archive, 2011/686. (pdf)
  • Antoine Joux and Vanessa Vitse. Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over F$p^6$. IACR Cryptology ePrint Archive, 2011/020. (pdf)
  • Louis Goubin and Ange Martinelli. Protecting AES with Shamir’s Secret Sharing Scheme. IACR Cryptology ePrint Archive, 2011/516. (pdf)
  • Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. IACR Cryptology ePrint Archive, 2011/425. (pdf)
  • Luca De Feo, David Jao and Jérôme Plût. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. IACR Cryptology ePrint Archive, 2011/506. (pdf)
  • Anja Becker, Jean-Sébastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. IACR Cryptology ePrint Archive, 2011/474. (pdf)