Partenaires





« décembre 2016 »
L M M J V S D
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Rechercher

Sur ce site

Sur le Web du CNRS


Accueil du site > Équipes > CRYPTO > Archives des publications de l’équipe CRYPTO > Publications équipe CRYPTO 2013

Publications équipe CRYPTO 2013

Articles

  • Antoine Joux and Vanessa Vitse. Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on E(F$q^5$). J. Cryptology 26(1):119-143, 2013. (doi)
  • Sorina Ionica and Antoine Joux. Pairing the volcano. Math. Comput. 82(281), 2013. (doi)
  • Maria Christofi, Boutheina Chetali, Louis Goubin and David Vigilant. Formal verification of a CRT-RSA implementation against fault attacks. J. Cryptographic Engineering 3(3):157-167, 2013. (doi)

Inproceedings

  • Emmanuel Volte, Jacques Patarin and Valérie Nachef. Zero Knowledge with Rubik’s Cubes and Non-Abelian Groups. In CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings. 2013.
  • Jacques Patarin. Generic Attacks for the Xor of k Random Permutations. In Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. 2013, 154-169.
  • Valerie Nachef, Emmanuel Volte and Jacques Patarin. Differential Attacks on Generalized Feistel Schemes. In CANS 2013, The 12th International Conference on Cryptology and Network Security Paraty, Brazil, 20-22 November 2013. Proceedings. 2013.
  • Ronan Lashermes, Jacques Fournier and Louis Goubin. Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults. In Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. 2013, 365-382.
  • Rodolphe Lampe and Yannick Seurin. Tweakable Blockciphers with Asymptotically Optimal Security. In Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. 2013.
  • Rodolphe Lampe and Yannick Seurin. How to Construct an Ideal Cipher from a Small Set of Public Permutations. In Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bangalore, India, December 1-5, 2013. Proceedings. 2013.
  • Antoine Joux. Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields. In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. 2013, 177-193.
  • Andri Ioannou, Maria Christofi and Christina Vasiliou. A Case Study of Interactive Tabletops in Education : Attitudes, Issues of Orientation and Asymmetric Collaboration. In Scaling up Learning for Sustained Impact - 8th European Conference, on Technology Enhanced Learning, EC-TEL 2013, Paphos, Cyprus, September 17-21, 2013. Proceedings. 2013, 466-471.
  • Louis Goubin, Ange Martinelli and Matthieu Walle. Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design. In Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22- 24, 2013. Proceedings. 2013, 240-259.
  • Pierre-Alain Fouque, Antoine Joux and Mehdi Tibouchi. Injective Encodings to Elliptic Curves. In Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. 2013, 203-218.
  • Luca De Feo, Javad Doliskani and Éric Schost. Fast algorithms for ıt l-adic towers over finite fields. In International Symposium on Symbolic and Algebraic Computation, ISSAC’13, Boston, MA, USA, June 26-29, 2013. 2013, 165-172.
  • Anne Canteaut, Mar\’ıa Naya-Plasencia and Bastien Vayssière. Sieve-in-the-Middle : Improved MITM Attacks. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I. 2013, 222-240.
  • Charles Bouillaguet and Bastien Vayssière. Provable Second Preimage Resistance Revisited. In Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers. 2013.
  • Alberto Battistello and Christophe Giraud. Fault Analysis of Infective AES Computations. In Tenth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013, FDTC 2013, Santa Barbara, CA, USA, August 20, 2013. 2013.

Misc

  • Michael Quisquater. How to mask S-Boxes of a block cipher against side channel attacks. Focus on the AES. juin 2013. Exposé invité à l’école d’été d’Albena (Bulgarie) organisée par la KULeuven (Belgique)..
  • Antoine Joux. Revisiting Discrete Logarithms in Small/Medium Characteristic Finite Fields - (Invited Talk Abstract). Selected Areas in Cryptography - 20th International Workshop, SAC 2013, Simon Fraser University, Burnaby, British Columbia, Canada, August 14-16, 2013. Revised Selected Papers, 2013.
  • Nicolas Gama. Tutorial session : implementation of Lattice algorithms and attacks. CryptoBG, 2013.

PhdThesis

  • Bastien Vayssière. Conception et cryptanalyse de primitives symétriques. Thèse, Université de Versailles-St Quentin, 2013.
  • Maria Christofi. Preuves de sécurité outillées d’implémentations cryptographiques. Thèse, Université de Versailles-St Quentin, 2013.

Techreport

  • Jacques Patarin. Security in O($2^n$) for the Xor of Two Random Permutations – Proof with the standard H technique. IACR Cryptology ePrint Archive, 2013/368. (pdf)
  • Rodolphe Lampe and Yannick Seurin. How to Construct an Ideal Cipher from a Small Set of Public Permutations. IACR Cryptology ePrint Archive, 2013/255. (pdf)
  • Antoine Joux and Antoine Rojat. On Diffie-Hellman - like Security Assumptions. IACR Cryptology ePrint Archive, 2013/291. (pdf)
  • Antoine Joux. A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic. IACR Cryptology ePrint Archive, 2013/095. (pdf)
  • Pierre-Alain Fouque, Antoine Joux and Mehdi Tibouchi. Injective Encoding to Elliptic Curves. IACR Cryptology ePrint Archive, 2013/373.(pdf)
  • Luca De Feo, Javad Doliskani and Éric Schost. Fast algorithms for ell-adic towers over finite fields. CoRR abs/1301.6021, 2013. (arxiv)
  • Anne Canteaut, Mar\’ıa Naya-Plasencia and Bastien Vayssière. Sieve-in-the-Middle : Improved MITM Attacks . IACR Cryptology ePrint Archive, 2013/324. (pdf)
  • Razvan Barbulescu, Pierrick Gaudry, Antoine Joux and Emmanuel Thomé. A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. CoRR abs/1306.4244, 2013. (arxiv)
  • Razvan Barbulescu, Pierrick Gaudry, Antoine Joux and Emmanuel Thomé. A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic. IACR Cryptology ePrint Archive, 2013/400. (pdf)