- Louis Goubin, Jean-Michel Masereel and Michael Quisquater. Cryptanalysis of white box DES implementations. IACR ePrint Archive, 2007/035, 2007.
- Louis Goubin and Giuseppe Persiano. New Technical Trends in Asymmetric Cryptography. Rapport D.AZTEC.7 du réseau européen d’excellence en cryptologie (ECRYPT), 2007.
- Christophe Giraud and Hugues Thiebeauld. The Difficulty of Securing Software Applications on Smart Cards with Unknown Architecture. In E-Smart. 2007.
- Christophe Clavier and Jean-Sebastien Coron. On the implementation of a fast prime generation algorithm. In Pascal Paillier and Ingrid Verbauwhede (eds.). Cryptographic Hardware and Embedded Systems, CHES 2007 4727. 2007, 443-449.
- Christophe Clavier. Secret external encodings do not prevent transient fault analysis. In Pascal Paillier and Ingrid Verbauwhede (eds.). Cryptographic Hardware and Embedded Systems, CHES 2007 4727. 2007, 181-194.
- Christophe Clavier. An improved SCARE cryptanalysis against a secret A3/A8 GSM algorithm. In International Conference on Information Systems Security. 2007.
- Nicolas Courtois and Blandine Debraize. S-box Multivariate Equations that Allow Faster Algebraic Attacks on Block Ciphers. In Weworc. 2007.
- Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini and Josef Pieprzyk. Cryptanalysis of FORK-256. In Fast Software Encryption 4593. 2007. 14th International Workshop, FSE 2007.
- Thomas Peyrin. Cryptanalysis of Grindahl. In Proceedings of Advances in Cryptology – ASIACRYPT 2007. 2007. 13th International Conference on the Theory and Application of Cryptology and Information Security.
- Andrey Bogdanov, Lars Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew Robshaw, Yannick Seurin and Charlotte Vikkelsoe. PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of CHES 4727. 2007, 450-466.
- Yannick Seurin and Thomas Peyrin. Security Analysis of Constructions Combining FIL Random Oracles. In Proceedings of FSE 4593. 2007, 119-136.
- Emmanuel Bresson, Benoit Chevallier-Mames, Christophe Clavier, Blandine Debraize, Pierre-Alain Fouque, Louis Goubin, Aline Gouget, Gaëtan Leurent, Phong Q Nguyen, Pascal Paillier, Thomas Peyrin and Sébastien Zimmer. Revisiting security relations between signature schemes and their inner hash functions. In ECRYPT Hash Workshop. 2007.
- Blandine Debraize and Louis Goubin. Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. In Workshop Tools for Cryptanalysis. 2007.
- Claude Barral, Louis Goubin and Pascal Paillier. The Fuzzy Interaction between Cryptography & Biometrics. In Proceedings of E-Smart. 2007.
- Antoine Joux and Jean-Rene Reinhard. Overtaking VEST. In Proceedings of FSE. 2007, 58-72.
- Aurélie Bauer and Antoine Joux. Toward a Rigorous Variation of Coppersmith’s Algorithm on Three Variables. In Proceedings of EUROCRYPT. 2007, 361-378.
- Antoine Joux and Thomas Peyrin. Hash Functions and the (Amplified) Boomerang Attack. In Proceedings of CRYPTO. 2007, 244-263.
- Antoine Joux, David Naccache and Emmanuel Thome. When e-th Roots Become Easier Than Factoring. In Proceedings of ASIACRYPT 4833. 2007, 13-28.
- Louis Goubin, Jean-Michel Masereel and Michael Quisquater. Cryptanalysis of White Box DES Implementations. In Selected Areas in Cryptography 4876. 2007, 278-295.
- Jacques Patarin and Berbain Côme Nachef Valérie and. Generic attacks on unbalanced Feistel Schemes with expanding functions. In Proceedings of ASIACRYPT 4833. 2007, 325-341.
- Côme Berbain, Olivier Billet and Henri Gilbert. Efficient Implementations of Multivariate Quadratic Systems. In Proceedings of Selected Areas in Cryptography SAC 2006 4356. 2007. 13th International Workshop.
- Christophe Clavier. Attaques physiques sur cartes à microprocesseur par injection de fautes. UVSQ, 2007.
- Christophe Giraud. Attaques de cryptosystèmes embarqués et contre-mesures associées. UVSQ, 2007.
Publications équipe CRYPTO 2007