404
Nothing found, but this random article might interest you!
  • Speeding-up verification of digital signatures.
    portrait ofAbdul Rahman Taleb, Damien Vergnaud.
    In J. Comput. Syst. Sci., 2021.
  • Preface for the Number-Theoretic Methods in Cryptology conferences.
    portrait ofAntoine Joux, Jacek Pomykala.
    In J. Math. Cryptol., 2020.
  • Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
    Gilles Barthe, portrait ofSonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub.
    In J. Cryptogr. Eng., 2020.
  • Improving side-channel attacks against pairing-based cryptography.
    Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In J. Cryptogr. Eng., 2020.
  • How to reveal the secrets of an obscure white-box implementation.
    In J. Cryptogr. Eng., 2020.
  • Cryptanalysis of the Legendre PRF and Generalizations.
    Ward Beullens, Tim Beyne, portrait ofAleksei Udovenko, Giuseppe Vitto.
    In IACR Trans. Symmetric Cryptol., 2020.
  • Lightweight AEAD and Hashing using the Sparkle Permutation Family.
    Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, portrait ofAleksei Udovenko, Vesselin Velichkov, Qingju Wang.
    In IACR Trans. Symmetric Cryptol., 2020.
  • Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
    Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, portrait ofMatthieu Rivain, Yu Sasaki, Siang Meng Sim.
    In IACR Trans. Symmetric Cryptol., 2020.
  • Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020.
  • On degree-d zero-sum sets of full rank.
    Christof Beierle, Alex Biryukov, portrait ofAleksei Udovenko.
    In Cryptogr. Commun., 2020.
  • Age estimation from faces using deep learning: A comparative analysis.
    Alice Othmani, portrait ofAbdul Rahman Taleb, Hazem Abdelkawy, Abdenour Hadid.
    In Comput. Vis. Image Underst., 2020.
  • Certified lattice reduction.
    Thomas Espitau, portrait ofAntoine Joux.
    In Adv. Math. Commun., 2020.
  • On a Dual/Hybrid Approach to Small Secret LWE - A Dual/Enumeration Technique for Learning with Errors and Application to Security Estimates of FHE Schemes.
    Thomas Espitau, portrait ofAntoine Joux, Natalia Kharchenko.
    In INDOCRYPT 2020, pp. 440-462, 2020.
  • Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations.
    portrait ofSonia Belaïd, Pierre-Évariste Dagand, portrait ofDarius Mercadier, portrait ofMatthieu Rivain, Raphaël Wintersdorff.
    In EUROCRYPT (3) 2020, pp. 311-341, 2020.
  • Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
    Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, portrait ofAleksei Udovenko, Vesselin Velichkov, Qingju Wang.
    In CRYPTO (3) 2020, pp. 419-448, 2020.
  • Random Probing Security: Verification, Composition, Expansion and New Constructions.
    portrait ofSonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, portrait ofMatthieu Rivain, portrait ofAbdul Rahman Taleb.
    In CRYPTO (1) 2020, pp. 339-368, 2020.
  • Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks.
    Pantea Kiaei, portrait ofDarius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont.
    In COSADE 2020, pp. 221-253, 2020.
  • Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers
    portrait ofSonia Belaïd, Tim Güneysu.
    Lecture Notes in Computer Science, Springer, 2020. (ISBN: 978-3-030-42067-3.)
  • A simplified approach to rigorous degree 2 elimination in discrete logarithm algorithms.
    Faruk Göloglu, portrait ofAntoine Joux.
    In Math. Comput., 2019.
  • Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019.
  • Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition.
    Patrick Derbez, Virginie Lallemand, portrait ofAleksei Udovenko.
    In SAC 2019, pp. 124-145, 2019.
  • Usuba: high-throughput and constant-time ciphers, by construction.
    portrait ofDarius Mercadier, Pierre-Évariste Dagand.
    In PLDI 2019, pp. 157-173, 2019.
  • maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
    Gilles Barthe, portrait ofSonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert.
    In ESORICS (1) 2019, pp. 300-318, 2019.
  • Lightweight instruction-level encryption for embedded processors using stream ciphers.
    Thomas Hiscock, Olivier Savry, portrait ofLouis Goubin.
    In Microprocess. Microsystems, 2019.
  • Higher-Order DCA against Standard Side-Channel Countermeasures.
    Andrey Bogdanov, portrait ofMatthieu Rivain, Philip S. Vejre, portrait ofJunwei Wang.
    In COSADE 2019, pp. 118-141, 2019.
  • GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
    Gilles Barthe, portrait ofSonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi.
    In CCS 2019, pp. 2147-2164, 2019.
  • Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, portrait ofPascal Paillier, Renaud Sirdey.
    In J. Cryptol., 2018.
  • Preface to TCHES 2018.
    Daniel Page, portrait ofMatthieu Rivain.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018.
  • Usuba: Optimizing & Trustworthy Bitslicing Compiler.
    portrait ofDarius Mercadier, Pierre-Évariste Dagand, Lionel Lacassagne, Gilles Muller.
    In WPMVP@PPoPP 2018, pp. 4:1-4:8, 2018.
  • Excalibur Key-Generation Protocols for DAG Hierarchic Decryption.
    portrait ofLouis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado.
    In ICISC 2018, pp. 103-120, 2018.
  • Masking the GLP Lattice-Based Signature Scheme at Any Order.
    Gilles Barthe, portrait ofSonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi.
    In EUROCRYPT (2) 2018, pp. 354-384, 2018.
  • On the Design of a Processor Working Over Encrypted Data.
    Thomas Hiscock, Olivier Savry, portrait ofLouis Goubin.
    In DSD 2018, pp. 577-580, 2018.
  • Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    Florian Bourse, Michele Minelli, Matthias Minihold, portrait ofPascal Paillier.
    In CRYPTO (3) 2018, pp. 483-512, 2018.
  • A New Public-Key Cryptosystem via Mersenne Numbers.
    Divesh Aggarwal, portrait ofAntoine Joux, Anupam Prakash, Miklos Santha.
    In CRYPTO (3) 2018, pp. 459-482, 2018.
  • Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
    Dahmun Goudarzi, Anthony Journault, portrait ofMatthieu Rivain, François-Xavier Standaert.
    In COSADE 2018, pp. 3-22, 2018.
  • Attacks and Countermeasures for White-box Designs.
    Alex Biryukov, portrait ofAleksei Udovenko.
    In ASIACRYPT (2) 2018, pp. 373-402, 2018.
  • How to Securely Compute with Noisy Leakage in Quasilinear Complexity.
    Dahmun Goudarzi, portrait ofAntoine Joux, portrait ofMatthieu Rivain.
    In ASIACRYPT (2) 2018, pp. 547-574, 2018.
  • Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
    portrait ofSonia Belaïd, Dahmun Goudarzi, portrait ofMatthieu Rivain.
    In ASIACRYPT (2) 2018, pp. 343-372, 2018.
  • Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings
    portrait ofAntoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi.
    Lecture Notes in Computer Science, Springer, 2018. (ISBN: 978-3-319-89338-9.)
  • Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances (Invited Talk).
    In STACS 2017, pp. 3:1-3:1, 2017.
  • First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography.
    Damien Jauvart, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In SECRYPT 2017, pp. 104-115, 2017.
  • A Crossbred Algorithm for Solving Boolean Polynomial Systems.
    portrait ofAntoine Joux, Vanessa Vitse.
    In NuTMiC 2017, pp. 3-21, 2017.
  • Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack.
    Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In ICETE (Selected Papers) 2017, pp. 150-172, 2017.
  • How Fast Can Higher-Order Masking Be in Software?
    Dahmun Goudarzi, portrait ofMatthieu Rivain.
    In EUROCRYPT (1) 2017, pp. 567-597, 2017.
  • Lightweight Software Encryption for Embedded Processors.
    Thomas Hiscock, Olivier Savry, portrait ofLouis Goubin.
    In DSD 2017, pp. 213-220, 2017.
  • Private Multiplication over Finite Fields.
    portrait ofSonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud.
    In CRYPTO (3) 2017, pp. 397-426, 2017.
  • Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures.
    Dahmun Goudarzi, portrait ofMatthieu Rivain, Damien Vergnaud, Srinivas Vivek.
    In CHES 2017, pp. 154-171, 2017.
  • Optimal First-Order Boolean Masking for Embedded IoT Devices.
    Alex Biryukov, Daniel Dinu, Yann Le Corre, portrait ofAleksei Udovenko.
    In CARDIS 2017, pp. 22-41, 2017.
  • NFLlib: NTT-based Fast Lattice Library.
    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint.
    In CT-RSA 2016, 2016.
  • Technical history of discrete logarithms in small characteristic finite fields - The road from subexponential to quasi-polynomial complexity.
    portrait ofAntoine Joux, Cécile Pierrot.
    In Des. Codes Cryptogr., 2016.
  • Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog.
    Léo Perrin, portrait ofAleksei Udovenko.
    In IACR Trans. Symmetric Cryptol., 2016.
  • Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication
    Dahmun Goudarzi, portrait ofMatthieu Rivain, Damien Vergnaud.
    In Selected Areas in Cryptography 2016, 2016.
  • Defeating MBA-based Obfuscation.
    Ninon Eyrolles, portrait ofLouis Goubin, Marion Videau.
    In SPRO@CCS 2016, pp. 27-38, 2016.
  • Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.
    Dahmun Goudarzi, portrait ofMatthieu Rivain, Damien Vergnaud.
    In SAC 2016, pp. 120-139, 2016.
  • Blending FHE-NTRU Keys - The Excalibur Property.
    portrait ofLouis Goubin, Francisco José Vial Prado.
    In INDOCRYPT 2016, pp. 3-24, 2016.
  • Algebraic Insights into the Secret Feistel Network.
    Léo Perrin, portrait ofAleksei Udovenko.
    In FSE 2016, pp. 378-398, 2016.
  • Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, portrait ofPascal Paillier, Renaud Sirdey.
    In FSE 2016, pp. 313-333, 2016.
  • Randomness Complexity of Private Circuits for Multiplication.
    portrait ofSonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud.
    In EUROCRYPT (2) 2016, pp. 616-648, 2016.
  • Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
    Alex Biryukov, Léo Perrin, portrait ofAleksei Udovenko.
    In EUROCRYPT (1) 2016, pp. 372-402, 2016.
  • NFLlib: NTT-Based Fast Lattice Library.
    Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint.
    In CT-RSA 2016, pp. 341-356, 2016.
  • Improving Side-Channel Attacks Against Pairing-Based Cryptography.
    Damien Jauvart, Jacques J. A. Fournier, Nadia El Mrabet, portrait ofLouis Goubin.
    In CRiSIS 2016, pp. 199-213, 2016.
  • Cryptanalysis of GGH15 Multilinear Maps.
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (2) 2016, pp. 607-628, 2016.
  • Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
    Léo Perrin, portrait ofAleksei Udovenko, Alex Biryukov.
    In CRYPTO (2) 2016, pp. 93-122, 2016.
  • On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking.
    Dahmun Goudarzi, portrait ofMatthieu Rivain.
    In CHES 2016, pp. 457-478, 2016.
  • Strong Non-Interference and Type-Directed Higher-Order Masking.
    Gilles Barthe, portrait ofSonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini.
    In CCS 2016, pp. 116-129, 2016.
  • Design Strategies for ARX with Provable Bounds: Sparx and LAX.
    Daniel Dinu, Léo Perrin, portrait ofAleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov.
    In ASIACRYPT (1) 2016, pp. 484-513, 2016.
  • Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance.
    Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld.
    In ASIACRYPT (1) 2015, 2015. Best Paper Award
  • Trap Me If You Can - Million Dollar Curve
    Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, portrait ofLouis Goubin, Tancrède Lepoint, portrait ofMatthieu Rivain.
    In Cryptology ePrint Archive, 2015.
  • Cryptanalysis of SHA-0 and Reduced SHA-1.
    Eli Biham, Rafi Chen, portrait ofAntoine Joux.
    In J. Cryptol., 2015.
  • Masking and leakage-resilient primitives: One, the other(s) or both?
    portrait ofSonia Belaïd, Vincent Grosso, François-Xavier Standaert.
    In Cryptogr. Commun., 2015.
  • A survey of fault attacks in pairing based cryptography.
    Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin, Ronan Lashermes.
    In Cryptogr. Commun., 2015.
  • 🇫🇷 Quatre millions d'échanges de clés par seconde.
    Carlos Aguilar-Melchor, Serge Guelton, Adrien Guinet, Tancrède Lepoint.
    In SSTIC 2015, 2015.
  • Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR.
    Tancrède Lepoint, Mehdi Tibouchi.
    In Financial Cryptography Workshops 2015, pp. 184-193, 2015.
  • Verified Proofs of Higher-Order Masking.
    Gilles Barthe, portrait ofSonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub.
    In EUROCRYPT (1) 2015, pp. 457-485, 2015.
  • Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
    portrait ofJunwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu.
    In CT-RSA 2015, pp. 181-198, 2015.
  • Cryptanalysis of the Co-ACD Assumption.
    Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (1) 2015, pp. 561-580, 2015.
  • New Multilinear Maps Over the Integers.
    Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (1) 2015, pp. 267-286, 2015.
  • Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
    Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi.
    In CRYPTO (1) 2015, pp. 247-266, 2015.
  • Algebraic Decomposition for Probing Security.
    Claude Carlet, Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche.
    In CRYPTO (1) 2015, pp. 742-763, 2015.
  • Improved Side-Channel Analysis of Finite-Field Multiplication.
    portrait ofSonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff.
    In CHES 2015, pp. 395-415, 2015.
  • Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
    Michel Abdalla, portrait ofSonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud.
    In ACNS 2015, pp. 635-654, 2015.
  • Recovering a sum of two squares decomposition.
    Jaime Gutierrez, Álvar Ibeas, portrait ofAntoine Joux.
    In J. Symb. Comput., 2014.
  • Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
    portrait ofSonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich.
    In J. Cryptogr. Eng., 2014.
  • Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
    portrait ofAntoine Joux, Amr M. Youssef.
    Lecture Notes in Computer Science, Springer, 2014. (ISBN: 978-3-319-13050-7.)
  • Scale-Invariant Fully Homomorphic Encryption over the Integers.
    Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
    In Public Key Cryptography 2014, pp. 311-328, 2014.
  • Toward efficient, privacy-aware media classification on public databases.
    Giulia C. Fanti, Matthieu Finiasz, Gerald Friedland, Kannan Ramchandran.
    In ICMR 2014, pp. 49, 2014.
  • Design and Implementation of Lattice-Based Cryptography.
    Tancrède Lepoint.
    Phd Thesis, 2014.
  • Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
    portrait ofSonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre.
    In ICETE (Selected Papers) 2014, pp. 363-379, 2014.
  • Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes.
    Daniel Augot, Matthieu Finiasz.
    In FSE 2014, pp. 3-17, 2014. Best Paper Award
  • Practical Validation of Several Fault Attacks against the Miller Algorithm.
    Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In FDTC 2014, pp. 115-122, 2014.
  • Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
    Jean-Charles Faugère, Louise Huot, portrait ofAntoine Joux, Guénaël Renault, Vanessa Vitse.
    In EUROCRYPT 2014, pp. 40-57, 2014.
  • A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Razvan Barbulescu, Pierrick Gaudry, portrait ofAntoine Joux, Emmanuel Thomé.
    In EUROCRYPT 2014, pp. 1-16, 2014. Best Paper Award
  • On Double Exponentiation for Securing RSA against Fault Analysis.
    Duc-Phong Le, portrait ofMatthieu Rivain, Chik How Tan.
    In CT-RSA 2014, pp. 152-168, 2014.
  • On the Practical Security of a Leakage Resilient Masking Scheme.
    Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche.
    In CT-RSA 2014, pp. 169-182, 2014.
  • How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
    Victor Lomné, Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche, Adrian Thillard.
    In CHES 2014, pp. 35-54, 2014.
  • Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
    portrait ofSonia Belaïd, Pierre-Alain Fouque, Benoît Gérard.
    In ASIACRYPT (2) 2014, pp. 306-325, 2014.
  • Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
    Pierre-Alain Fouque, portrait ofAntoine Joux, Chrysanthi Mavromati.
    In ASIACRYPT (1) 2014, pp. 420-438, 2014.
  • Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields.
    portrait ofAntoine Joux, Cécile Pierrot.
    In ASIACRYPT (1) 2014, pp. 378-397, 2014.
  • A Comparison of the Homomorphic Encryption Schemes FV and YASHE.
    Tancrède Lepoint, Michael Naehrig.
    In AFRICACRYPT 2014, pp. 318-335, 2014.
  • Pairing the volcano.
    Sorina Ionica, portrait ofAntoine Joux.
    In Math. Comput., 2013.
  • Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on \(E(\mathbb{F}_{q^{5}})\).
    portrait ofAntoine Joux, Vanessa Vitse.
    In J. Cryptol., 2013.
  • Formal verification of a CRT-RSA implementation against fault attacks.
    Maria Christofi, Boutheina Chetali, portrait ofLouis Goubin, David Vigilant.
    In J. Cryptogr. Eng., 2013.
  • One-Way Private Media Search on Public Databases: The Role of Signal Processing.
    Giulia C. Fanti, Matthieu Finiasz, Kannan Ramchandran.
    In IEEE Signal Process. Mag., 2013.
  • White-Box Security Notions for Symmetric Encryption Schemes.
    Cécile Delerablée, Tancrède Lepoint, portrait ofPascal Paillier, portrait ofMatthieu Rivain.
    In Selected Areas in Cryptography 2013, pp. 247-264, 2013.
  • Two Attacks on a White-Box AES Implementation.
    Tancrède Lepoint, portrait ofMatthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel.
    In Selected Areas in Cryptography 2013, pp. 265-285, 2013.
  • A New Index Calculus Algorithm with Complexity \(L(1/4+o(1))\) in Small Characteristic.
    In Selected Areas in Cryptography 2013, pp. 355-379, 2013.
  • Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
    portrait ofSonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre.
    In SECRYPT 2013, pp. 230-241, 2013.
  • The Special Number Field Sieve in 𝔽pn - Application to Pairing-Friendly Constructions.
    portrait ofAntoine Joux, Cécile Pierrot.
    In Pairing 2013, pp. 45-61, 2013.
  • Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions.
    Daniel Augot, Matthieu Finiasz.
    In ISIT 2013, pp. 1551-1555, 2013.
  • Security Ranking Among Assumptions Within the Uber Assumption Framework.
    portrait ofAntoine Joux, Antoine Rojat.
    In ISC 2013, pp. 391-406, 2013.
  • On the Minimal Number of Bootstrappings in Homomorphic Circuits.
    Tancrède Lepoint, portrait ofPascal Paillier.
    In Financial Cryptography Workshops 2013, pp. 189-200, 2013.
  • Higher-Order Side Channel Security and Mask Refreshing.
    Jean-Sébastien Coron, Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche.
    In FSE 2013, pp. 410-424, 2013.
  • Batch Fully Homomorphic Encryption over the Integers.
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun.
    In EUROCRYPT 2013, pp. 315-335, 2013.
  • Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields.
    In EUROCRYPT 2013, pp. 177-193, 2013.
  • Masking against Side-Channel Attacks: A Formal Security Proof.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In EUROCRYPT 2013, pp. 142-159, 2013.
  • Practical Multilinear Maps over the Integers.
    Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (1) 2013, pp. 476-493, 2013.
  • Lattice Signatures and Bimodal Gaussians.
    Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky.
    In CRYPTO (1) 2013, pp. 40-56, 2013.
  • Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults.
    Ronan Lashermes, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In CHES 2013, pp. 365-382, 2013.
  • Leakage-Resilient Symmetric Encryption via Re-keying.
    Michel Abdalla, portrait ofSonia Belaïd, Pierre-Alain Fouque.
    In CHES 2013, pp. 471-488, 2013.
  • SCARE of Secret Ciphers with SPN Structures.
    portrait ofMatthieu Rivain, Thomas Roche.
    In ASIACRYPT (1) 2013, pp. 526-544, 2013.
  • Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design.
    portrait ofLouis Goubin, Ange Martinelli, Matthieu Walle.
    In AFRICACRYPT 2013, pp. 240-259, 2013.
  • Injective Encodings to Elliptic Curves.
    Pierre-Alain Fouque, portrait ofAntoine Joux, Mehdi Tibouchi.
    In ACISP 2013, pp. 203-218, 2013.
  • A family of weak keys in HFE and the corresponding practical key-recovery.
    Charles Bouillaguet, Pierre-Alain Fouque, portrait ofAntoine Joux, Joana Treger.
    In J. Math. Cryptol., 2012.
  • Private Stream Search at Almost the Same Communication Cost as a Regular Search.
    Matthieu Finiasz, Kannan Ramchandran.
    In Selected Areas in Cryptography 2012, pp. 372-389, 2012.
  • Generating Provable Primes Efficiently on Embedded Devices.
    Christophe Clavier, Benoit Feix, Loïc Thierry, portrait ofPascal Paillier.
    In Public Key Cryptography 2012, pp. 372-389, 2012.
  • Private Stream Search at the same communication cost as a regular search: Role of LDPC codes.
    Matthieu Finiasz, Kannan Ramchandran.
    In ISIT 2012, pp. 2556-2560, 2012.
  • Higher-Order Masking Schemes for S-Boxes.
    Claude Carlet, portrait ofLouis Goubin, Emmanuel Prouff, Michaël Quisquater, portrait ofMatthieu Rivain.
    In FSE 2012, pp. 366-384, 2012.
  • Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding.
    Anja Becker, portrait ofAntoine Joux, Alexander May, Alexander Meurer.
    In EUROCRYPT 2012, pp. 520-536, 2012.
  • A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract).
    In EUROCRYPT 2012, pp. 1-7, 2012.
  • Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over \(\mathbb{F}_{p^6}\).
    portrait ofAntoine Joux, Vanessa Vitse.
    In EUROCRYPT 2012, pp. 9-26, 2012. Best Paper Award
  • Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems.
    Alexandre Berzati, Cécile Canovas-Dumas, portrait ofLouis Goubin.
    In Cryptography and Security 2012, pp. 233-247, 2012.
  • Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.
    Jean-Sébastien Coron, Aline Gouget, Thomas Icart, portrait ofPascal Paillier.
    In Cryptography and Security 2012, pp. 207-232, 2012.
  • Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
    Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, portrait ofMatthieu Rivain, Praveen Kumar Vadnala.
    In COSADE 2012, pp. 69-81, 2012.
  • Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
    Marcel Medwed, François-Xavier Standaert, portrait ofAntoine Joux.
    In CHES 2012, pp. 193-212, 2012.
  • Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.
    Ronny Bjones, Ioannis Krontiris, portrait ofPascal Paillier, Kai Rannenberg.
    In APF 2012, pp. 111-124, 2012.
  • Mutual Information Analysis: a Comprehensive Study.
    Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, portrait ofMatthieu Rivain, François-Xavier Standaert, Nicolas Veyrat-Charvillon.
    In J. Cryptol., 2011.
  • Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic.
    Raveen R. Goundar, Marc Joye, Atsuko Miyaji, portrait ofMatthieu Rivain, Alexandre Venelli.
    In J. Cryptogr. Eng., 2011.
  • Univariate side channel attacks and leakage modeling.
    Julien Doget, Emmanuel Prouff, portrait ofMatthieu Rivain, François-Xavier Standaert.
    In J. Cryptogr. Eng., 2011.
  • Cryptanalysis of the RSA Subgroup Assumption from TCC 2005.
    Jean-Sébastien Coron, portrait ofAntoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi.
    In Public Key Cryptography 2011, pp. 147-155, 2011.
  • Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
    Lecture Notes in Computer Science, Springer, 2011. (ISBN: 978-3-642-21701-2.)
  • Improved Generic Algorithms for Hard Knapsacks.
    Anja Becker, Jean-Sébastien Coron, portrait ofAntoine Joux.
    In EUROCRYPT 2011, pp. 364-385, 2011.
  • A Variant of the F4 Algorithm.
    portrait ofAntoine Joux, Vanessa Vitse.
    In CT-RSA 2011, pp. 356-375, 2011.
  • Protecting AES with Shamir's Secret Sharing Scheme.
    portrait ofLouis Goubin, Ange Martinelli.
    In CHES 2011, pp. 79-94, 2011.
  • Theoretical and practical aspects of mutual information-based side channel analysis.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In Int. J. Appl. Cryptogr., 2010.
  • On the security of blockwise secure modes of operation beyond the birthday bound.
    In IEEE Trans. Inf. Theory, 2010.
  • Affine Masking against Higher-Order Side Channel Analysis.
    Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, portrait ofMatthieu Rivain.
    In Selected Areas in Cryptography 2010, pp. 262-280, 2010.
  • Distinguishing Distributions Using Chernoff Information.
    Thomas Baignères, Pouyan Sepehrdad, Serge Vaudenay.
    In ProvSec 2010, pp. 144-165, 2010.
  • Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree.
    Sorina Ionica, portrait ofAntoine Joux.
    In Pairing 2010, pp. 435-449, 2010.
  • Cryptanalysis of the Hidden Matrix Cryptosystem.
    Jean-Charles Faugère, portrait ofAntoine Joux, Ludovic Perret, Joana Treger.
    In LATINCRYPT 2010, pp. 241-254, 2010.
  • SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.
    Jean-Sébastien Coron, Aline Gouget, portrait ofPascal Paillier, Karine Villegas.
    In Financial Cryptography Workshops 2010, pp. 107-122, 2010.
  • New Generic Algorithms for Hard Knapsacks.
    Nick Howgrave-Graham, portrait ofAntoine Joux.
    In EUROCRYPT 2010, pp. 235-256, 2010.
  • Public Key Perturbation of Randomized RSA Implementations.
    Alexandre Berzati, Cécile Canovas-Dumas, portrait ofLouis Goubin.
    In CHES 2010, pp. 306-319, 2010. Best Paper Award
  • Provably Secure Higher-Order Masking of AES.
    portrait ofMatthieu Rivain, Emmanuel Prouff.
    In CHES 2010, pp. 413-427, 2010.
  • Pairing the Volcano.
    Sorina Ionica, portrait ofAntoine Joux.
    In ANTS 2010, pp. 201-218, 2010.
  • Statistical Analysis of Second Order Differential Power Analysis.
    Emmanuel Prouff, portrait ofMatthieu Rivain, Régis Bevan.
    In IEEE Trans. Computers, 2009.
  • On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
    Emmanuelle Dottax, Christophe Giraud, portrait ofMatthieu Rivain, Yannick Sierra.
    In WISTP 2009, pp. 68-83, 2009.
  • Fault Analysis of Rabbit: Toward a Secret Key Leakage.
    Alexandre Berzati, Cécile Canovas-Dumas, portrait ofLouis Goubin.
    In INDOCRYPT 2009, pp. 72-87, 2009.
  • Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms.
    portrait ofAntoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé.
    In IMACC 2009, pp. 351-367, 2009.
  • Fault Analysis of Grain-128.
    Guilhem Castagnos, Alexandre Berzati, Cécile Canovas, Blandine Debraize, portrait ofLouis Goubin, Aline Gouget, portrait ofPascal Paillier, Stephanie Salgado.
    In HOST 2009, pp. 7-14, 2009.
  • Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
    Lecture Notes in Computer Science, Springer, 2009. (ISBN: 978-3-642-01000-2.)
  • Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.
    Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, portrait ofLouis Goubin.
    In CT-RSA 2009, pp. 414-428, 2009.
  • Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
    In CT-RSA 2009, pp. 459-480, 2009.
  • Fault Attacks on RSA Signatures with Partially Unknown Messages.
    Jean-Sébastien Coron, portrait ofAntoine Joux, Ilya Kizhvatov, David Naccache, portrait ofPascal Paillier.
    In CHES 2009, pp. 444-456, 2009.
  • Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers.
    portrait ofMatthieu Rivain, Emmanuel Prouff, Julien Doget.
    In CHES 2009, pp. 171-188, 2009.
  • Differential Fault Analysis on DES Middle Rounds.
    In CHES 2009, pp. 457-469, 2009.
  • Improved Generic Algorithms for 3-Collisions.
    portrait ofAntoine Joux, Stefan Lucks.
    In ASIACRYPT 2009, pp. 347-363, 2009. Best Paper Award
  • Factoring pq2 with Quadratic Forms: Nice Cryptanalyses.
    Guilhem Castagnos, portrait ofAntoine Joux, Fabien Laguillaumie, Phong Q. Nguyen.
    In ASIACRYPT 2009, pp. 469-486, 2009.
  • Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In ACNS 2009, pp. 499-518, 2009.
  • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, portrait ofPascal Paillier, Haixia Shi.
    In J. Cryptol., 2008.
  • Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers.
    Côme Berbain, Henri Gilbert, portrait ofAntoine Joux.
    In Selected Areas in Cryptography 2008, pp. 184-198, 2008.
  • On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.
    In Selected Areas in Cryptography 2008, pp. 165-183, 2008.
  • How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
    Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, portrait ofPascal Paillier, Thomas Peyrin.
    In ProvSec 2008, pp. 241-253, 2008.
  • Another Approach to Pairing Computation in Edwards Coordinates.
    Sorina Ionica, portrait ofAntoine Joux.
    In INDOCRYPT 2008, pp. 400-413, 2008.
  • Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
    portrait ofMatthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff.
    In FSE 2008, pp. 127-143, 2008.
  • Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator.
    Blandine Debraize, portrait ofLouis Goubin.
    In FSE 2008, pp. 235-252, 2008.
  • In(security) Against Fault Injection Attacks for CRT-RSA Implementations.
    Alexandre Berzati, Cécile Canovas, portrait ofLouis Goubin.
    In FDTC 2008, pp. 101-107, 2008.
  • Dynamic Threshold Public-Key Encryption.
    Cécile Delerablée, David Pointcheval.
    In CRYPTO 2008, pp. 317-334, 2008.
  • Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
    Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, portrait ofMatthieu Rivain.
    In CHES 2008, pp. 1-14, 2008. Best Paper Award
  • Perturbating RSA Public Keys: An Improved Attack.
    Alexandre Berzati, Cécile Canovas, portrait ofLouis Goubin.
    In CHES 2008, pp. 380-395, 2008.
  • Yet Another Attack on Vest.
    Pascal Delaunay, portrait ofAntoine Joux.
    In AFRICACRYPT 2008, pp. 221-235, 2008.
  • A Generic Method for Secure SBox Implementation.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In WISA 2007, pp. 227-244, 2007.
  • Cryptanalysis of White Box DES Implementations.
    portrait ofLouis Goubin, Jean-Michel Masereel, Michaël Quisquater.
    In Selected Areas in Cryptography 2007, pp. 278-295, 2007.
  • Decryptable Searchable Encryption.
    Thomas Fuhr, portrait ofPascal Paillier.
    In ProvSec 2007, pp. 228-236, 2007.
  • Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys.
    Cécile Delerablée, portrait ofPascal Paillier, David Pointcheval.
    In Pairing 2007, pp. 39-59, 2007.
  • Overtaking VEST.
    portrait ofAntoine Joux, Jean-René Reinhard.
    In FSE 2007, pp. 58-72, 2007.
  • Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables.
    Aurélie Bauer, portrait ofAntoine Joux.
    In EUROCRYPT 2007, pp. 361-378, 2007.
  • Impossibility Proofs for RSA Signatures in the Standard Model.
    portrait ofPascal Paillier.
    In CT-RSA 2007, pp. 31-48, 2007.
  • Hash Functions and the (Amplified) Boomerang Attack.
    portrait ofAntoine Joux, Thomas Peyrin.
    In CRYPTO 2007, pp. 244-263, 2007.
  • Side Channel Cryptanalysis of a Higher Order Masking Scheme.
    Jean-Sébastien Coron, Emmanuel Prouff, portrait ofMatthieu Rivain.
    In CHES 2007, pp. 28-44, 2007. Best Paper Award
  • Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings
    portrait ofPascal Paillier, Ingrid Verbauwhede.
    Lecture Notes in Computer Science, Springer, 2007. (ISBN: 978-3-540-74734-5.)
  • When e-th Roots Become Easier Than Factoring.
    portrait ofAntoine Joux, David Naccache, Emmanuel Thomé.
    In ASIACRYPT 2007, pp. 13-28, 2007.
  • Encoding-Free ElGamal Encryption Without Random Oracles.
    Benoît Chevallier-Mames, portrait ofPascal Paillier, David Pointcheval.
    In Public Key Cryptography 2006, pp. 91-104, 2006.
  • Galois LFSR, Embedded Devices and Side Channel Weaknesses.
    portrait ofAntoine Joux, Pascal Delaunay.
    In INDOCRYPT 2006, pp. 436-451, 2006.
  • Chosen-Ciphertext Attacks Against MOSQUITO.
    portrait ofAntoine Joux, Frédéric Muller.
    In FSE 2006, pp. 390-404, 2006.
  • The Function Field Sieve in the Medium Prime Case.
    portrait ofAntoine Joux, Reynald Lercier.
    In EUROCRYPT 2006, pp. 254-270, 2006.
  • The Number Field Sieve in the Medium Prime Case.
    portrait ofAntoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren.
    In CRYPTO 2006, pp. 326-344, 2006.
  • Inverting HFE Is Quasipolynomial.
    Louis Granboulan, portrait ofAntoine Joux, Jacques Stern.
    In CRYPTO 2006, pp. 345-356, 2006.
  • Fast Generation of Prime Numbers on Portable Devices: An Update.
    Marc Joye, portrait ofPascal Paillier.
    In CHES 2006, pp. 160-173, 2006.
  • Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings
    portrait ofLouis Goubin, Mitsuru Matsui.
    Lecture Notes in Computer Science, Springer, 2006. (ISBN: 3-540-46559-6.)
  • Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.
    portrait ofPascal Paillier, Jorge Luis Villar.
    In ASIACRYPT 2006, pp. 252-266, 2006.
  • An Algebraic Masking Method to Protect AES Against Power Attacks.
    Nicolas T. Courtois, portrait ofLouis Goubin.
    In ICISC 2005, pp. 199-209, 2005.
  • Cryptanalysis of the Tractable Rational Map Cryptosystem.
    portrait ofAntoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel.
    In Public Key Cryptography 2005, pp. 258-274, 2005.
  • Two Attacks Against the HBB Stream Cipher.
    portrait ofAntoine Joux, Frédéric Muller.
    In FSE 2005, pp. 330-341, 2005.
  • Collisions of SHA-0 and Reduced SHA-1.
    Eli Biham, Rafi Chen, portrait ofAntoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby.
    In EUROCRYPT 2005, pp. 36-57, 2005.
  • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, portrait ofPascal Paillier, Haixia Shi.
    In CRYPTO 2005, pp. 205-222, 2005.
  • On Second-Order Differential Power Analysis.
    Marc Joye, portrait ofPascal Paillier, Berry Schoenmakers.
    In CHES 2005, pp. 293-308, 2005.
  • Universally Convertible Directed Signatures.
    Fabien Laguillaumie, portrait ofPascal Paillier, Damien Vergnaud.
    In ASIACRYPT 2005, pp. 682-701, 2005.
  • Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.
    portrait ofPascal Paillier, Damien Vergnaud.
    In ASIACRYPT 2005, pp. 1-20, 2005. Best Paper Award
  • A One Round Protocol for Tripartite Diffie-Hellman.
    In J. Cryptol., 2004.
  • Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
    Pierre-Alain Fouque, portrait ofAntoine Joux, Guillaume Poupard.
    In Selected Areas in Cryptography 2004, pp. 212-226, 2004.
  • Two Power Analysis Attacks against One-Mask Methods.
    Mehdi-Laurent Akkar, Régis Bevan, portrait ofLouis Goubin.
    In FSE 2004, pp. 332-347, 2004.
  • Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
    In CRYPTO 2004, pp. 306-316, 2004.
  • How to Disembed a Program?
    Benoît Chevallier-Mames, David Naccache, portrait ofPascal Paillier, David Pointcheval.
    In CHES 2004, pp. 441-454, 2004.
  • Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups.
    portrait ofAntoine Joux, Kim Nguyen.
    In J. Cryptol., 2003.
  • Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method.
    portrait ofAntoine Joux, Reynald Lercier.
    In Math. Comput., 2003.
  • A Chosen IV Attack Against Turing.
    portrait ofAntoine Joux, Frédéric Muller.
    In Selected Areas in Cryptography 2003, pp. 194-207, 2003.
  • Authenticated On-Line Encryption.
    Pierre-Alain Fouque, portrait ofAntoine Joux, Gwenaëlle Martinet, Frédéric Valette.
    In Selected Areas in Cryptography 2003, pp. 145-159, 2003.
  • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.
    In Public Key Cryptography 2003, pp. 199-210, 2003.
  • A Fast and Secure Implementation of Sflash.
    Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, portrait ofLouis Goubin.
    In Public Key Cryptography 2003, pp. 267-278, 2003.
  • A Generic Protection against High-Order Differential Power Analysis.
    Mehdi-Laurent Akkar, portrait ofLouis Goubin.
    In FSE 2003, pp. 192-205, 2003.
  • New Attacks against Standardized MACs.
    portrait ofAntoine Joux, Guillaume Poupard, Jacques Stern.
    In FSE 2003, pp. 170-181, 2003.
  • Loosening the KNOT.
    portrait ofAntoine Joux, Frédéric Muller.
    In FSE 2003, pp. 87-99, 2003.
  • Cryptanalysis of the EMD Mode of Operation.
    In EUROCRYPT 2003, pp. 1-16, 2003.
  • Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.
    Jean-Charles Faugère, portrait ofAntoine Joux.
    In CRYPTO 2003, pp. 44-60, 2003.
  • GCD-Free Algorithms for Computing Modular Inverses.
    Marc Joye, portrait ofPascal Paillier.
    In CHES 2003, pp. 243-253, 2003.
  • Faster Double-Size Modular Multiplication from Euclidean Multipliers.
    Benoît Chevallier-Mames, Marc Joye, portrait ofPascal Paillier.
    In CHES 2003, pp. 214-227, 2003.
  • Solving Underdefined Systems of Multivariate Quadratic Equations.
    Nicolas T. Courtois, portrait ofLouis Goubin, Willi Meier, Jean-Daniel Tacier.
    In Public Key Cryptography 2002, pp. 211-227, 2002.
  • Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings
    David Naccache, portrait ofPascal Paillier.
    Lecture Notes in Computer Science, Springer, 2002. (ISBN: 3-540-43168-3.)
  • Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
    Jean-Sébastien Coron, Helena Handschuh, Marc Joye, portrait ofPascal Paillier, David Pointcheval, Christophe Tymen.
    In Public Key Cryptography 2002, pp. 17-33, 2002.
  • On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction.
    Éliane Jaulmes, portrait ofAntoine Joux, Frédéric Valette.
    In FSE 2002, pp. 237-251, 2002.
  • Fast Correlation Attacks: An Algorithmic Point of View.
    Philippe Chose, portrait ofAntoine Joux, Michel Mitton.
    In EUROCRYPT 2002, pp. 209-221, 2002.
  • GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
    Jean-Sébastien Coron, Helena Handschuh, Marc Joye, portrait ofPascal Paillier, David Pointcheval, Christophe Tymen.
    In CT-RSA 2002, pp. 263-276, 2002.
  • Universal Padding Schemes for RSA.
    Jean-Sébastien Coron, Marc Joye, David Naccache, portrait ofPascal Paillier.
    In CRYPTO 2002, pp. 226-241, 2002.
  • Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC.
    portrait ofAntoine Joux, Gwenaëlle Martinet, Frédéric Valette.
    In CRYPTO 2002, pp. 17-30, 2002.
  • Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.
    Helena Handschuh, David Naccache, portrait ofPascal Paillier, Christophe Tymen.
    In CARDIS 2002, 2002.
  • The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems.
    In ANTS 2002, pp. 20-32, 2002.
  • The Function Field Sieve Is Quite Special.
    portrait ofAntoine Joux, Reynald Lercier.
    In ANTS 2002, pp. 431-445, 2002.
  • "Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm.
    portrait ofAntoine Joux, Reynald Lercier.
    In Math. Comput., 2001.
  • Cryptanalysis of PKP: A New Approach.
    Éliane Jaulmes, portrait ofAntoine Joux.
    In Public Key Cryptography 2001, pp. 165-172, 2001.
  • FLASH, a Fast Multivariate Signature Algorithm.
    Jacques Patarin, Nicolas T. Courtois, portrait ofLouis Goubin.
    In CT-RSA 2001, pp. 298-307, 2001.
  • QUARTZ, 128-Bit Long Digital Signatures.
    Jacques Patarin, Nicolas T. Courtois, portrait ofLouis Goubin.
    In CT-RSA 2001, pp. 282-297, 2001.
  • A Sound Method for Switching between Boolean and Arithmetic Masking.
    In CHES 2001, pp. 3-15, 2001.
  • A Statistical Attack on RC6.
    Henri Gilbert, Helena Handschuh, portrait ofAntoine Joux, Serge Vaudenay.
    In FSE 2000, pp. 64-74, 2000.
  • New Attacks on PKCS#1 v1.5 Encryption.
    Jean-Sébastien Coron, Marc Joye, David Naccache, portrait ofPascal Paillier.
    In EUROCRYPT 2000, pp. 369-381, 2000.
  • A NICE Cryptanalysis.
    Éliane Jaulmes, portrait ofAntoine Joux.
    In EUROCRYPT 2000, pp. 382-391, 2000.
  • A Chosen-Ciphertext Attack against NTRU.
    Éliane Jaulmes, portrait ofAntoine Joux.
    In CRYPTO 2000, pp. 20-35, 2000.
  • On Boolean and Arithmetic Masking against Differential Power Analysis.
    Jean-Sébastien Coron, portrait ofLouis Goubin.
    In CHES 2000, pp. 231-237, 2000.
  • Efficient Generation of Prime Numbers.
    Marc Joye, portrait ofPascal Paillier, Serge Vaudenay.
    In CHES 2000, pp. 340-354, 2000.
  • Trapdooring Discrete Logarithms on Elliptic Curves over Rings.
    portrait ofPascal Paillier.
    In ASIACRYPT 2000, pp. 573-584, 2000.
  • Cryptanalysis of the TTM Cryptosystem.
    portrait ofLouis Goubin, Nicolas T. Courtois.
    In ASIACRYPT 2000, pp. 44-57, 2000.
  • Why Textbook ElGamal and RSA Encryption Are Insecure.
    Dan Boneh, portrait ofAntoine Joux, Phong Q. Nguyen.
    In ASIACRYPT 2000, pp. 30-43, 2000.
  • A One Round Protocol for Tripartite Diffie-Hellman.
    In ANTS 2000, pp. 385-394, 2000.
  • Evaluating Differential Fault Analysis of Unknown Cryptosystems.
    portrait ofPascal Paillier.
    In Public Key Cryptography 1999, pp. 235-244, 1999.
  • A Trapdoor Permutation Equivalent to Factoring.
    portrait ofPascal Paillier.
    In Public Key Cryptography 1999, pp. 219-222, 1999.
  • Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor.
    portrait ofPascal Paillier.
    In Public Key Cryptography 1999, pp. 223-234, 1999.
  • Self-Escrowed Public-Key Infrastructures.
    portrait ofPascal Paillier, Moti Yung.
    In ICISC 1999, pp. 257-268, 1999.
  • Unbalanced Oil and Vinegar Signature Schemes.
    Aviad Kipnis, Jacques Patarin, portrait ofLouis Goubin.
    In EUROCRYPT 1999, pp. 206-222, 1999.
  • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.
    portrait ofPascal Paillier.
    In EUROCRYPT 1999, pp. 223-238, 1999.
  • Probing Attacks on Tamper-Resistant Devices.
    Helena Handschuh, portrait ofPascal Paillier, Jacques Stern.
    In CHES 1999, pp. 303-315, 1999.
  • DES and Differential Power Analysis (The "Duplication" Method).
    portrait ofLouis Goubin, Jacques Patarin.
    In CHES 1999, pp. 158-172, 1999.
  • Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries.
    portrait ofPascal Paillier, David Pointcheval.
    In ASIACRYPT 1999, pp. 165-179, 1999.
  • Lattice Reduction: A Toolbox for the Cryptanalyst.
    portrait ofAntoine Joux, Jacques Stern.
    In J. Cryptol., 1998.
  • Improved Algorithms for Isomorphisms of Polynomials.
    Jacques Patarin, portrait ofLouis Goubin, Nicolas T. Courtois.
    In EUROCRYPT 1998, pp. 184-200, 1998.
  • Differential Collisions in SHA-0.
    Florent Chabaud, portrait ofAntoine Joux.
    In CRYPTO 1998, pp. 56-71, 1998.
  • Smart Card Crypto-Coprocessors for Public-Key Cryptography.
    Helena Handschuh, portrait ofPascal Paillier.
    In CARDIS 1998, pp. 372-379, 1998.
  • Reducing the Collision Probability of Alleged Comp128.
    Helena Handschuh, portrait ofPascal Paillier.
    In CARDIS 1998, pp. 366-371, 1998.
  • The action of a few permutations on r-tuples is quickly transitive.
    Joel Friedman, portrait ofAntoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich.
    In Random Struct. Algorithms, 1998.
  • C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.
    Jacques Patarin, portrait ofLouis Goubin, Nicolas T. Courtois.
    In ASIACRYPT 1998, pp. 35-49, 1998.
  • On Ideal Non-perfect Secret Sharing Schemes.
    portrait ofPascal Paillier.
    In Security Protocols Workshop 1997, pp. 207-216, 1997.
  • Asymmetric cryptography with S-Boxes.
    Jacques Patarin, portrait ofLouis Goubin.
    In ICICS 1997, pp. 369-380, 1997.
  • Trapdoor one-way permutations and multivariate polynominals.
    Jacques Patarin, portrait ofLouis Goubin.
    In ICICS 1997, pp. 356-368, 1997.
  • The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography.
    Joel Friedman, portrait ofAntoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich.
    In STACS 1996, pp. 375-386, 1996.
  • A Practical Attack against Knapsack based Hash Functions (Extended Abstract).
    portrait ofAntoine Joux, Louis Granboulan.
    In EUROCRYPT 1994, pp. 58-66, 1994.
  • Improved Low-Density Subset Sum Algorithms.
    Matthijs J. Coster, portrait ofAntoine Joux, Brian A. LaMacchia, Andrew M. Odlyzko, Claus-Peter Schnorr, Jacques Stern.
    In Comput. Complex., 1992.
  • Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems.
    portrait ofAntoine Joux, Jacques Stern.
    In FCT 1991, pp. 258-264, 1991.
  • The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
    Yeow Meng Chee, portrait ofAntoine Joux, Jacques Stern.
    In CRYPTO 1991, pp. 204-212, 1991.
  • Cryptanalysis of Another Knapsack Cryptosystem.
    portrait ofAntoine Joux, Jacques Stern.
    In ASIACRYPT 1991, pp. 470-476, 1991.

    Featured Presentations & Talks

  • Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
    CHES 2020, Virtual, September 16, 2020.
  • Random Probing Security: Verification, Composition, Expansion and New Constructions
    Virtual, August 13, 2020.
  • From tightPROVE to Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
    Threshold Schemes for NIST-approved Symmetric Block Ciphers in a Single-Device Setting (virtual), July 08, 2020.
  • Security of Masked Implementations (invited talk)
    LatinCrypt 2019, Santiago de Chile, Chile, October 02, 2019.
  • Side-Channel Attacks and Countermeasures (school)
    ASCrypto 2019, Santiago de Chile, Chile, October 01, 2019.
  • Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
    CHES 2019, Atlanta, August 26, 2019.
  • Higher-Order DCA against Standard Side-Channel Countermeasures
    COSADE 2019, Darmstadt, May 18, 2019.
  • Securing Cryptographic Modules: A Shades of Gray Story
    International Cryptographic Module Conference, ICMC'19, Vancouver, May 16, 2019.
  • Secure Masked Implementations with the Least Refreshing
    Journée GT Méthodes Formelles pour la Sécurité, CNRS, Paris, France., March 18, 2019.
  • Recent Progress on White-Box Attacks
    Journée Protection du Code et des Données 2018, Paris Saclay, December 13, 2018.
  • Secure Computation in the Presence of Noisy Leakage
    Journées C2, Aussois (France), October 10, 2018.
  • Formal Verification of Masked Implementations (tutorial)
    portrait ofSonia Belaïd, Benjamin Grégoire.
    CHES 2018, Amsterdam, Netherlands, September 09, 2018.
  • Formal Verification of Side-Channel Countermeasures.
    Ecole de cybersécurité, Sophia Antipolis, France, June 05, 2018.
  • Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
    Dahmun Goudarzi.
    COSADE 2018, Singapore., April 23, 2018.
  • Masking the GLP Lattice-Based Signature Scheme at Any Order.
    Quantum-Safe Cryptography Seminar, Sorbonne University, Paris, France, March 30, 2018.
  • On the Security of Composed Masked Implementations with Least Refreshing.
    Séminaire CCA (Codage, Cryptologie, Algorithmes), INRIA Paris, France, March 16, 2018.
  • How to Reveal the Secrets of an Obscure White-Box Implementation.
    Real World Crypto 2018, Zurich, Switzerland, January 12, 2018.
  • White-Box Cryptography
    CARDIS 2017, Lugano (Switzerland), November 14, 2017.
  • Reveal Secrets in Adoring Poitras: A generic attack on white-box cryptography.
    ECRYPT-NET School on Correct and Secure Implementation, Grete, Greece, October 11, 2017.
  • Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
    Dahmun Goudarzi.
    CHES 2017, Taipei, Taiwan., April 24, 2017.
  • How Fast Can Higher-Order Masking Be in Software?
    Dahmun Goudarzi.
    Eurocrypt 2017, Paris, France., April 24, 2017.
  • White-Box Cryptography
    PHISIC 2016, École des Mines de Saint-Étienne, Provence (France), October 04, 2016.
  • On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
    Dahmun Goudarzi.
    CHES 2016, Santa-Barbara, U.S.A., August 16, 2016.
  • From Obfuscation to White-Box Crypto: Relaxation and Security Notions
    WhibOx Ecrypt workshop, Santa Barbara, August 14, 2016.
  • Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication
    SAC 2016, St John's (Newfoundland, Canada), August 12, 2016.
  • The importance of rigidity in cryptographic standards
    Thomas Baignères.
    AWACS 2016, A Workshop About Cryptographic Standards. Vienna, Austria (co-located with Eurocrypt 2016), May 08, 2016.
  • CLT: Construction(s) and Attacks
    Tancrède Lepoint.
    Summer school on Fully Homomorphic Encryption and Multilinear Maps, Paris, France, October 14, 2015.
  • Zeroizing Attacks on Multilinear Maps.
    Tancrède Lepoint.
    Workshop on Tools for Asymmetric Cryptanalysis, Bochum, Germany, October 08, 2015.
  • Multilinear Maps over the Integers: From Design to Security.
    Tancrède Lepoint.
    The Mathematics of Modern Cryptography Workshop, Berkeley, U.S.A., July 10, 2015.
  • The ins and outs of programming cryptography in smart cards.
    portrait ofPascal Paillier.
    Real World Cryptography, London, U.K., January 08, 2015.
  • 🇫🇷 Chiffrement (complètement) homomorphe : de la théorie à la pratique.
    Tancrède Lepoint.
    Séminaire confiance numérique, Clermont-Ferrand, France, October 09, 2014.
  • Provable Security against Side-Channel Attacks
    MCrypt Seminar, Les Deux Alpes (France), August 11, 2014.
  • Homomorphic Encryption: From Theory to Practice.
    Tancrède Lepoint.
    CryptoBG International Summer School 2014, Bulgaria, July 23, 2014.
  • SCARE of Secret Ciphers with SPN Structures
    ASIACRYPT 2013, Bangalore, December 03, 2013.
  • Masking against Side-Channel Attacks: a Formal Security Proof.
    EUROCRYPT 2013, Athens, May 27, 2013.
  • Higher-Order Masking Schemes for S-boxes.
    FSE 2012, Washington DC, March 21, 2012.
  • Provably Secure Higher-Order Masking of AES.
    CHES 2010, Santa Barbara, August 20, 2010.