Publications équipe CRYPTO 2009

Articles

  • David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert and Jacques Patarin. QUAD: a Multivariate Stream Cipher with Provable Security. Journal of Symbolic Computation 44(12), 2009.
  • Olivier Ly and Louis Goubin. Sûreté de fonctionnement et sécurité des algorithmes cryptographiques. Multi-system & Internet Security Cookbook (MISC) 42:6, 2009. (hal)
  • Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro and Kazuo Ohta. A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search. IEICE Transactions 92-A(1):87-95, 2009.
  • Côme Berbain, Henri Gilbert and Jacques Patarin. QUAD: A multivariate stream cipher with provable security. J. Symb. Comput. 44(12):1703-1723, 2009. (doi)

Books

  • Antoine Joux. Algorithmic Cryptanalysis. Première edition, Chapman & Hall/CRC, 2009.

Inbook

  • Mercè Serra, Bert Greevenbosch, Anja Becker and Harald Fuchs. Overview of OMA Digital Rights Management, in Handbook of Research on Secure Multimedia Distribution. pages 55-70, 2009.

Inproceedings

  • Joana Treger and Jacques Patarin. Generic Attacks on Feistel Networks with Internal Permutations. In Progress in Cryptology – AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings. 2009, 41-59.
  • Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S Thomsen, Meltem Sönmez Turan and Bart Preneel. Cryptanalysis of the ESSENCE Family of Hash Functions. In Information Security and Cryptology – 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. 2009, 15-34.
  • Florian Mendel, Thomas Peyrin, Christian Rechberger and Martin Schläffer. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. In Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers. 2009, 16-35.
  • Antoine Joux and Stefan Lucks. Improved Generic Algorithms for 3-Collisions. In Advances in Cryptology – ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. 2009, 347-363.
  • Antoine Joux, Reynald Lercier, David Naccache and Emmanuel Thomé. Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. In Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings. 2009, 351-367.
    (hal)The original publication is available at www.springerlink.com. (doi)
  • Thomas Fuhr and Thomas Peyrin. Cryptanalysis of RadioGatún. In Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. 2009, 122-138.
  • Luca De Feo and Éric Schost. Fast arithmetics in artin-schreier towers over finite fields. In Symbolic and Algebraic Computation, International Symposium, ISSAC 2009, Seoul, Republic of Korea, July 29-31, 2009, Proceedings. 2009, 127-134.
  • Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache and Pascal Paillier. Fault Attacks on RSA Signatures with Partially Unknown Messages. In Cryptographic Hardware and Embedded Systems – CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings. 2009, 444-456.
  • Guilhem Castagnos and Fabien Laguillaumie. On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. In Advances in Cryptology – EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. 2009, 260-277.
  • Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie and Phong Q Nguyen. Factoring ıt pq$^2$ with Quadratic Forms: Nice Cryptanalyses. In Advances in Cryptology – ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. 2009, 469-486.
  • Guilhem Castagnos, Alexandre Berzati, Cécile Canovas, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier and Stephanie Salgado. Fault Analysis of Grain-128. In IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings. 2009, 7-14.
  • Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré and Damien Vergnaud. Fair E-Cash: Be Compact, Spend Faster. In Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings. 2009, 294-309.
  • Eric Brier and Thomas Peyrin. Cryptanalysis of CubeHash. In Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. 2009, 354-368.
  • Eric Brier, Shahram Khazaei, Willi Meier and Thomas Peyrin. Linearization Framework for Collision Attacks: Application to CubeHash and MD6. In Advances in Cryptology – ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. 2009, 560-577.
  • Alexandre Berzati, Cécile Canovas-Dumas and Louis Goubin. Fault Analysis of Rabbit: Toward a Secret Key Leakage. In Progress in Cryptology – INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings. 2009, 72-87.
  • Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas and Louis Goubin. Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. In Topics in Cryptology – CT-RSA 2009, The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. 2009, 414-428.
  • Côme Berbain, Olivier Billet, Jonathan Etrog and Henri Gilbert. An efficient forward private RFID protocol. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. 2009, 43-53.
  • Jean-Philippe Aumasson, Eric Brier, Willi Meier, Mar’ıa Naya-Plasencia and Thomas Peyrin. Inside the Hypercube. In Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. 2009, 202-213.

Misc

  • Michael Quisquater. La cryptographie, des Egyptiens à nos jours. août 2009. Exposé invité à l’école d’été de Saint-Flour.
  • Louis Goubin and Olivier Ly. Sûreté de fonctionnement et sécurité des algorithmes cryptographiques, in Multi-system & Internet Security Cookbook (MISC), vol. 42, pp. 77-82. 2009.
  • Antoine Joux. Blockwise-Adaptive modes of operation (a tutorial). AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia.
  • Louis Goubin. Cryptography for the Security of Embedded Systems. US France Young Engineering Scientists Symposium, Identity Management – Research issues between security and privacy, Washington D.C..
  • Luca De Feo. Isogeny computation in small characteristics. ECC, University of Calgary, Calgary, Canada.
  • Luca De Feo. Fast arithmetic in Artin-Schreier towers over finite fields. RAIM, ENS, Lyon, France.

PhdThesis

  • Yannick Seurin. Primitives et protocoles cryptographiques à sécurité prouvée. Thèse, Université de Versailles-St Quentin, 2009.

Proceedings

  • Antoine Joux (ed.). Advances in Cryptology – EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings 5479. Springer, 2009.

Techreport

  • Mar’ıa Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier and Thomas Peyrin. Cryptanalysis of ESSENCE. IACR Cryptology ePrint Archive, 2009/302. (pdf)

Valérie Nachef, Jacques Patarin and Joana Treger. Generic Attacks on Misty Schemes -5 rounds is not enough-. IACR Cryptology ePrint Archive, 2009/405. (pdf)

  • Valérie Nachef and Jacques Patarin. I shall love you up to the death. IACR Cryptology ePrint Archive, 2009/166. (pdf)
  • Antoine Joux and Stefan Lucks. Improved generic algorithms for 3-collisions. IACR Cryptology ePrint Archive, 2009/305. (pdf)
  • Henri Gilbert and Thomas Peyrin. Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations. IACR Cryptology ePrint Archive, 2009/531. (pdf)
  • Nadia El Mrabet, Nicolas Guillermin and Sorina Ionica. A study of pairing computation for elliptic curves with embedding degree 15. IACR Cryptology ePrint Archive, 2009/370. (pdf)
  • Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache and Pascal Paillier. Fault Attacks on RSA Signatures with Partially Unknown Messages. IACR Cryptology ePrint Archive, 2009/309. (pdf)
  • Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal and Yannick Seurin. A Domain Extender for the Ideal Cipher. IACR Cryptology ePrint Archive, 2009/356. (pdf)
  • Eric Brier, Shahram Khazaei, Willi Meier and Thomas Peyrin. Linearization Framework for Collision Attacks: Application to CubeHash and MD6. IACR Cryptology ePrint Archive, 2009/382. (pdf)
  • Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Mar’ıa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet and Marion Videau. Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers. IACR Cryptology ePrint Archive, 2009/199. (pdf)
  • Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux and Joana Treger. A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery). IACR Cryptology ePrint Archive, 2009/619. (pdf)
  • Olivier Billet, Jacques Patarin and Yannick Seurin. Analysis of Intermediate Field Systems. IACR Cryptology ePrint Archive, 2009/542. (pdf)
  • Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas and Louis Goubin. Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable. (arxiv)
  • Daniel V Bailey, Lejla Batina, Daniel J Bernstein, Peter Birkner, Joppe W Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo Meulenaer, Luis Dominguez J Perez, Junfeng Fan, Tim Güneysu, Frank K Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege and Bo-Yin Yang. Breaking ECC2K-130. IACR Cryptology ePrint Archive, 2009/541. (pdf)

Daniel V Bailey, Brian Baldwin, Lejla Batina, Daniel J Bernstein, Peter Birkner, Joppe W Bos, Gauthier Van Damme, Giacomo Meulenaer, Junfeng Fan, Tim Güneysu, Frank K Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe and Leif Uhsadel. The Certicom Challenges ECC2-X. IACR Cryptology ePrint Archive, 2009/466. (pdf)

Publications équipe CRYPTO 2009