Articles
- Luca De Feo. Fast algorithms for computing isogenies between ordinary elliptic curves in small characteristic. Journal of Number Theory 131(5):873–893, 2011.
Inbooks
- Antoine Joux and Reynald Lercier. Number Field Sieve for the DLP, in Encyclopedia of Cryptography and Security (2nd Ed.). pages 867-873, 2011.
- Louis Goubin, Jacques Patarin and Bo-Yin Yang. Multivariate Cryptography, in Encyclopedia of Cryptography and Security (2nd Ed.). pages 824-828, 2011. (doi)
Inproceedings
- Jérôme Plût. On Various Families of Twisted Jacobi Quartics. In Selected Areas in Cryptography – 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. 2011, 373-383.
- Jacques Patarin. Some Transfinite Generalisations of Gödel’s Incompleteness Theorem. In HyperNet2011, June 6-10, 2011, Turku, Finland, TUCS Lecture Notes N.14. 2011, 113-122.
- Mar’ıa Naya-Plasencia, Deniz Toz and Kerem Varici. Rebound Attack on JH42. In Advances in Cryptology – ASIACRYPT 2011 – 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 252-269.
- Mar’ıa Naya-Plasencia, Andrea Röck and Willi Meier. Practical Analysis of Reduced-Round Keccak. In Progress in Cryptology – INDOCRYPT 2011 – 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. 2011, 236-254.
- Marine Minier and Mar’ıa Naya-Plasencia. Some Preliminary Studies on the Differential Behavior of the Lightweight Block Cipher LBlock. In ECRYPT II Workshop on Lightweight Cryptography, November 28-29, 2011, Louvain-la-Neuve, Belgium. 2011.
- Antoine Joux and Vanessa Vitse. A Variant of the F4 Algorithm. In Topics in Cryptology – CT-RSA 2011 – The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. 2011, 356-375.
- David Jao and Luca De Feo. Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. In Post-Quantum Cryptography – 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings. 2011, 19-34.
- Malika Izabachène, Benoît Libert and Damien Vergnaud. Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes. In Cryptography and Coding – 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. 2011, 431-450.
- Louis Goubin and Ange Martinelli. Protecting AES with Shamir’s Secret Sharing Scheme. In Cryptographic Hardware and Embedded Systems – CHES 2011 – 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings. 2011, 79-94.
- Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. In Cryptographic Hardware and Embedded Systems – CHES 2011 – 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings. 2011, 240-255.
Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Montgomery’s Trick and Fast Implementation of Masked AES. In Progress in Cryptology – AFRICACRYPT 2011 – 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings. 2011, 153-169.
- Thomas Fuhr, Henri Gilbert, Jean-René Reinhard and Marion Videau. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. In Selected Areas in Cryptography – 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. 2011, 230-242.
- Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache and Mehdi Tibouchi. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. In Public Key Cryptography – PKC 2011 – 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. 2011, 147-155.
- Serge Chaumette, Olivier Ly and Renaud Tabary. Automated extraction of polymorphic virus signatures using abstract interpretation. In 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011. 2011, 41-48.
- Charles Bouillaguet, Pierre-Alain Fouque and Gilles Macario-Rat. Practical Key-Recovery for All Possible Parameters of SFLASH. In Advances in Cryptology – ASIACRYPT 2011 – 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 667-685.
- Charles Bouillaguet, Patrick Derbez and Pierre-Alain Fouque. Automatic Search of Attacks on Round-Reduced AES and Applications. In Advances in Cryptology – CRYPTO 2011 – 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings. 2011, 169-187.
- Anja Becker, Jean-Sébastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. In Advances in Cryptology – EUROCRYPT 2011 – 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. 2011, 364-385.
- Sébastien Bardin, Philippe Herrmann, Jérôme Leroux, Olivier Ly, Renaud Tabary and Aymeric Vincent. The BINCOA Framework for Binary Code Analysis. In Computer Aided Verification – 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings. 2011, 165-170.
- Jean-Philippe Aumasson, Mar’ıa Naya-Plasencia and Markku-Juhani O Saarinen. Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. In Progress in Cryptology – INDOCRYPT 2011 – 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. 2011, 134-145.
- Mohamed Ahmed Abdelraheem, Céline Blondeau, Mar’ıa Naya-Plasencia, Marion Videau and Erik Zenner. Cryptanalysis of ARMADILLO2. In Advances in Cryptology – ASIACRYPT 2011 – 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. 2011, 308-326.
Misc
- Aline Gouget, Louis Goubin, Pascal Paillier and Karine Villegas. Method for establishing a secured communication without preliminary information share. Patent EP 2389742 A1. novembre 2011.
- Louis Goubin and Nicolas Courtois. Method and apparatus for generating cryptographic sets of instructions automatically and code generator. Patent 8000473. août 2011.
- Vanessa Vitse. Cover and Decomposition Attacks. ECC Invited Talk (joint work with Antoine Joux), 2011.
- Naomi Benger. Efficient Finite Field Arithmetic for Pairing-Based Cryptography (joint work with Selcuk Baktir). In 10th International Conference on Finite Fields and their Applications, 2011.
PhdThesis
- Vanessa Vitse. Attaques algébriques du problème du logarithme discret sur courbes elliptiques. Thèse, Université de Versailles-St Quentin, 2011. (tel)
- Jean-René Reinhard. Etude de Primitives Cryptographiques Symétriques : Chiffrements par Flot et Fonctions de Hachage. Thèse, Université de Versailles-St Quentin, 2011.
- Ange Martinelli. Protection d’algorithmes de chiffrement par blocs contre les attaques par canaux auxiliaires d’ordre supérieur. Thèse, Université de Versailles-St Quentin, 2011.
- Pascal Delaunay. Attaques physiques sur des algorithmes de chiffrement par flot. Thèse, Université de Versailles-St Quentin, 2011.
Proceedings
- Antoine Joux (ed.). Fast Software Encryption – 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers . Lecture Notes in Computer Science. Springer, 2011, vol 6733. (doi)
Techreport
- Jérôme Plût. p-adic analytic Banach spaces and the fundamental lemma of Colmez and Fontaine. 2011.
- Valérie Nachef, Emmanuel Volte and Jacques Patarin. Differential Attacks on Generalized Feistel Schemes. IACR Cryptology ePrint Archive, 2011/705. (pdf)
- Avradip Mandal, Jacques Patarin and Yannick Seurin. On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. IACR Cryptology ePrint Archive, 2011/496. (pdf)
- Rodolphe Lampe and Jacques Patarin. Analysis of some natural variants of the PKP Algorithm. IACR Cryptology ePrint Archive, 2011/686. (pdf)
- Antoine Joux and Vanessa Vitse. Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over F$p^6$. IACR Cryptology ePrint Archive, 2011/020. (pdf)
- Louis Goubin and Ange Martinelli. Protecting AES with Shamir’s Secret Sharing Scheme. IACR Cryptology ePrint Archive, 2011/516. (pdf)
- Laurie Genelle, Emmanuel Prouff and Michaël Quisquater. Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. IACR Cryptology ePrint Archive, 2011/425. (pdf)
- Luca De Feo, David Jao and Jérôme Plût. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. IACR Cryptology ePrint Archive, 2011/506. (pdf)
- Anja Becker, Jean-Sébastien Coron and Antoine Joux. Improved Generic Algorithms for Hard Knapsacks. IACR Cryptology ePrint Archive, 2011/474. (pdf)
Publications équipe CRYPTO 2011