Publications équipe CRYPTO 2010

Articles

  • Helene Le Cadre. Stability of Alliances between Service Providers. In Incentives, Overlays, and Economic Traffic Control, Third International WorkshopIncentives, Overlays, and Economic Traffic Control, Third International Workshop, ETM 6236. 2010, 85–92.
  • Helene Le Cadre and Mustapha Bouhtou. An interconnection game between mobile network operators: Hidden information forecasting using expert advice fusion. Computer Networks 54(17):2913-2942, 2010.
  • Jean-Charles Faugere, Antoine Joux, Ludovic Perret and Joana Treger. New Generic Algorithms for Hard Knapsacks. In EUROCRYPT2010. 2010, 235-256.

Books

  • Jacques Patarin and Valérie Nachef. « I Shall Love You Until Death » (Marie-Antoinette to Axel von Fersen). Cryptologia 34(2):104-114, 2010. (doi)
  • Ayoub Otmani, Jean-Pierre Tillich and Léonard Dallot. Cryptanalysis of Two McEliece Cryptosystems Based on Quasi- Cyclic Codes. Mathematics in Computer Science 3(2):129-140, 2010.
  • Antoine Joux. On the security of blockwise secure modes of operation beyond the birthday bound. IEEE Transactions on Information Theory 56(3):1239-1246, 2010. (doi)
  • Luca De Feo and Éric Schost. transalpyne: a language for automatic transposition. ACM Commun. Comput. Algebra 44(1/2):59–71, 2010. (doi)

Inproceedings

  • Emmanuel Volte, Valérie Nachef and Jacques Patarin. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. In Advances in Cryptology – ASIACRYPT 2010 – 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. 2010, 94-111.
  • Jacques Patarin. Transfinite Cryptography. In HyperNet2010, June 2010, Tokyo, Japan. 2010.
  • Valérie Nachef, Jacques Patarin and Joana Treger. Generic Attacks on Misty Schemes. In Progress in Cryptology – LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. 2010, 222-240.
  • Avradip Mandal, Jacques Patarin and Valérie Nachef. Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations. In Progress in Cryptology – INDOCRYPT 2010 – 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings. 2010, 69-81.
  • Malika Izabachène, David Pointcheval and Damien Vergnaud. Mediated Traceable Anonymous Encryption. In Progress in Cryptology – LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. 2010, 40-60.
  • Sorina Ionica and Antoine Joux. Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree. In Pairing-Based Cryptography – Pairing 2010 – 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings. 2010, 435-449.
  • Sorina Ionica and Antoine Joux. Pairing the Volcano. In Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings. 2010, 201-218.
  • Nick Howgrave-Graham and Antoine Joux. New Generic Algorithms for Hard Knapsacks. In Advances in Cryptology – EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings. 2010, 235-256.
  • Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Secure Multiplicative Masking of Power Functions. In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings. 2010, 200-217.
  • Nicolas Gama, Phong Q Nguyen and Oded Regev. Lattice Enumeration Using Extreme Pruning. In Advances in Cryptology – EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings. 2010, 257-278.
  • Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff and Matthieu Rivain. Affine Masking against Higher-Order Side Channel Analysis. In Selected Areas in Cryptography – 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. 2010, 262-280.
  • Jean-Charles Faugère, Antoine Joux, Ludovic Perret and Joana Treger. Cryptanalysis of the Hidden Matrix Cryptosystem. In Progress in Cryptology – LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. 2010, 241-254.
  • Jonathan Etrog and Matthew J B Robshaw. On Unbiased Linear Approximations. In Information Security and Privacy – 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings. 2010, 74-86.
  • Vivien Dubois and Nicolas Gama. The Degree of Regularity of HFE Systems. In Advances in Cryptology – ASIACRYPT 2010 – 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. 2010, 557-576.
  • Serge Chaumette, Olivier Ly and Renaud Tabary. Automated Software Protection through Program Externalization on Memory-Limited Secure Devices. In IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010, Hong Kong, China, 11-13 December 2010. 2010, 777-784.
  • Sébastien Canard, Iwen Coisel and Jonathan Etrog. Lighten Encryption Schemes for Secure and Private RFID Systems. In Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. 2010, 19-33.
  • Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert and Damien Vergnaud. Batch Groth-Sahai. In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings. 2010, 218-235.
  • Olivier Billet, Jonathan Etrog and Henri Gilbert. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. In Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. 2010, 55-74.
  • Alexandre Berzati, Cécile Canovas-Dumas and Louis Goubin. Public Key Perturbation of Randomized RSA Implementations. In Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings. 2010, 306-319.
  • Daniel J Bernstein, Peter Birkner and Tanja Lange. Starfish on Strike. In Progress in Cryptology – LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. 2010, 61-80.
  • Aurore Bernard and Nicolas Gama. Smallest Reduction Matrix of Binary Quadratic Forms. In Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings. 2010, 32-49.
  • Naomi Benger and Michael Scott. Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography. In Arithmetic of Finite Fields, Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings. 2010, 180-195.

Misc

  • Mehdi-Laurent Akkar, Louis Goubin and Olivier Ly. Method to secure an electronic assembly executing any algorithm against attacks by error introduction. Patent 7774653. août 2010.
  • Aline Gouget, Louis Goubin, Pascal Paillier and Karine Villegas. Secure communication establishment process, without sharing prior information. Patent EP 2211497 A1. juillet 2010.
  • Louis Goubin and Jacques Patarin. Method for protecting an electronic cryptographic set with secret key against cryptanalytical attack. Patent EP 1068695 B1. avril 2010.
  • Vanessa Vitse. F4 traces and index calculus on elliptic curves over extension fields. Workshop on Elliptic Curves and Computation (ECC 2010, Microsoft Research in Redmond, Washington, USA, October 2010). Invited Talk (joint work with Antoine Joux), 2010. p 1-7.
  • Louis Goubin. Provable Security against Physical Attacks. Lorentz Center, Leiden, Pays-Bas.

PhdThesis

  • Joana Treger. Étude de la sécurité de schémas de chiffrement par bloc et de schémas multivariés. Thèse, Université de Versailles-St Quentin, 2010.
  • Jean-Michel Masereel. Analyse de la sécurité de protocoles cryptographiques de chiffrement et de signature à base de polynômes multivariables. Thèse, Université de Versailles-St Quentin, 2010.
  • Sorina Ionica. Algorithmique des couplages et cryptographie. Thèse, Université de Versailles-St Quentin, 2010.
  • Jonathan Etrog. Linear cryptanalysis and design of privacy preserving authentication protocols with proven security. Thèse, Université de Versailles-St Quentin, 2010.
  • Alexandre Berzati. Analyse cryptographique des altérations d’algorithmes. Thèse, Université de Versailles-St Quentin, 2010. (tel)

Techreport

  • Jacques Patarin. Transfinite Cryptography. IACR Cryptology ePrint Archive, 2010/001. (pdf)
  • Jacques Patarin. Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography. IACR Cryptology ePrint Archive, 2010/287. (pdf)
  • Jacques Patarin. Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities. IACR Cryptology ePrint Archive, 2010/293. (pdf)
  • Antoine Joux and Vanessa Vitse. Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on E(F$q^5$). IACR Cryptology ePrint Archive, 2010/157. (pdf)
  • Antoine Joux and Vanessa Vitse. A variant of the F4 algorithm. IACR Cryptology ePrint Archive, 2010/158. (pdf)
  • Sorina Ionica and Antoine Joux. Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree. IACR Cryptology ePrint Archive, 2010/379. (pdf)
  • Nick Howgrave-Graham and Antoine Joux. New generic algorithms for hard knapsacks. IACR Cryptology ePrint Archive, 2010/189. (pdf)
  • Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff and Matthieu Rivain. Affine Masking against Higher-Order Side Channel Analysis. IACR Cryptology ePrint Archive, 2010/523. (pdf)
  • Thomas Fuhr, Henri Gilbert, Jean-René Reinhard and Marion Videau. A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3. IACR Cryptology ePrint Archive, 2010/618. (pdf)
  • Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache and Mehdi Tibouchi. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. IACR Cryptology ePrint Archive, 2010/650. (pdf)
  • Sébastien Canard, Iwen Coisel, Jonathan Etrog and Marc Girault. Privacy-Preserving RFID Systems: Model and Constructions. IACR Cryptology ePrint Archive, 2010/405. (pdf)
  • Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert and Damien Vergnaud. Batch Groth-Sahai. IACR Cryptology ePrint Archive, 2010/040. (pdf)
  • Alexandre Berzati, Cécile Canovas-Dumas and Louis Goubin. Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems. IACR Cryptology ePrint Archive, 2010/582. (pdf)
  • Daniel J Bernstein, Peter Birkner and Tanja Lange. Starfish on Strike. IACR Cryptology ePrint Archive, 2010/367. (pdf)
Publications équipe CRYPTO 2010