Antoine Joux

From MaRDI portal
(Redirected from Person:1903504)
Person:775986


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
MPC in the head using the subfield bilinear collision problem
 
2024-12-04Paper
Key recovery attack on the partial Vandermonde knapsack problem
 
2024-11-13Paper
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
Advances in Mathematics of Communications
2024-08-06Paper
On the hardness of the finite field isomorphism problem
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Short signatures from regular syndrome decoding in the head
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
scientific article; zbMATH DE number 7716603 (Why is no real title available?)
 
2023-07-25Paper
Syndrome decoding in the head: shorter signatures from zero-knowledge proofs
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
Designs, Codes and Cryptography
2023-04-21Paper
Practical post-quantum signature schemes from isomorphism problems of trilinear forms
 
2022-08-30Paper
On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes
 
2022-07-06Paper
Computing discrete logarithms
 
2022-02-25Paper
A new public-key cryptosystem via Mersenne numbers
 
2020-06-30Paper
Certified lattice reduction
Advances in Mathematics of Communications
2019-11-26Paper
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
 
2019-07-05Paper
A simplified approach to rigorous degree 2 elimination in discrete logarithm algorithms
Mathematics of Computation
2019-06-14Paper
How to securely compute with noisy leakage in quasilinear complexity
 
2019-01-23Paper
A crossbred algorithm for solving Boolean polynomial systems
 
2018-06-05Paper
The action of a few random permutations on r-tuples and an application to cryptography
STACS 96
2017-11-16Paper
On the Security of Blockwise Secure Modes of Operation Beyond the Birthday Bound
IEEE Transactions on Information Theory
2017-07-27Paper
Reducing number field defining polynomials: an application to class group computations
LMS Journal of Computation and Mathematics
2017-04-04Paper
scientific article; zbMATH DE number 6696740 (Why is no real title available?)
 
2017-03-23Paper
Nearly sparse linear algebra and application to discrete logarithms computations
Contemporary Developments in Finite Fields and Applications
2016-11-08Paper
Technical history of discrete logarithms in small characteristic finite fields. The road from subexponential to quasi-polynomial complexity
Designs, Codes and Cryptography
2016-02-02Paper
A new index calculus algorithm with complexity \(L(1/4+o(1))\) in small characteristic
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
The past, evolving present, and future of the discrete logarithm
Open Problems in Mathematics and Computational Science
2015-06-22Paper
Cryptanalysis of SHA-0 and reduced SHA-1
Journal of Cryptology
2015-03-25Paper
Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE
Lecture Notes in Computer Science
2015-01-16Paper
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms
Lecture Notes in Computer Science
2015-01-16Paper
A sieve algorithm based on overlattices
LMS Journal of Computation and Mathematics
2014-09-05Paper
A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Symmetrized summation polynomials: using small order torsion points to speed up elliptic curve index calculus
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Recovering a sum of two squares decomposition
Journal of Symbolic Computation
2014-03-03Paper
The Special Number Field Sieve in $\mathbb{F}_{p^{n}}$
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Injective encodings to elliptic curves
Information Security and Privacy
2013-06-28Paper
A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
 
2013-06-18Paper
Faster index calculus for the medium prime case application to 1175-bit and 1425-bit finite fields
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Elliptic curve discrete logarithm problem over small degree extension fields
Journal of Cryptology
2013-04-15Paper
Pairing the volcano
Mathematics of Computation
2013-03-20Paper
Towards super-exponential side-channel security with efficient leakage-resilient PRFs
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Cover and decomposition index calculus on elliptic curves made practical. Application to a previously unreachable curve over \(\mathbb{F}_{p^6}\)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A tutorial on high performance computing applied to cryptanalysis. (Invited talk abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A family of weak keys in HFE and the corresponding practical key-recovery
Journal of Mathematical Cryptology
2012-03-22Paper
Improved Generic Algorithms for Hard Knapsacks
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Algorithms to solve the finite field discrete logarithm problem
 
2011-05-18Paper
Cryptanalysis of the RSA subgroup assumption from TCC 2005
Public Key Cryptography – PKC 2011
2011-03-15Paper
A Variant of the F4 Algorithm
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
scientific article; zbMATH DE number 5821921 (Why is no real title available?)
 
2010-12-01Paper
Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree
Lecture Notes in Computer Science
2010-11-26Paper
Pairing the volcano
Lecture Notes in Computer Science
2010-09-29Paper
Cryptanalysis of the hidden matrix cryptosystem
Lecture Notes in Computer Science
2010-08-31Paper
New generic algorithms for hard knapsacks
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Oracle-assisted static Diffie-Hellman is easier than discrete logarithms
Cryptography and Coding
2010-01-07Paper
Loosening the KNOT.
Lecture Notes in Computer Science
2010-01-05Paper
New attacks against standardized MACs.
Lecture Notes in Computer Science
2010-01-05Paper
Improved Generic Algorithms for 3-Collisions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Factoring \(pq ^{2}\) with quadratic forms: Nice cryptanalyses
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Fault Attacks on RSA Signatures with Partially Unknown Messages
Lecture Notes in Computer Science
2009-11-10Paper
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
Selected Areas in Cryptography
2009-11-03Paper
Algorithmic Cryptanalysis
 
2009-08-06Paper
Chosen-Ciphertext Attacks Against MOSQUITO
Fast Software Encryption
2009-04-02Paper
Introduction to identity-based cryptography
 
2009-03-24Paper
Hash Functions and the (Amplified) Boomerang Attack
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Another Approach to Pairing Computation in Edwards Coordinates
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Overtaking VEST
Fast Software Encryption
2008-09-16Paper
Yet Another Attack on Vest
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
When e-th Roots Become Easier Than Factoring
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Collisions of SHA-0 and Reduced SHA-1
Lecture Notes in Computer Science
2008-05-06Paper
Galois LFSR, Embedded Devices and Side Channel Weaknesses
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Toward a Rigorous Variation of Coppersmith’s Algorithm on Three Variables
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
The Function Field Sieve in the Medium Prime Case
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Inverting HFE Is Quasipolynomial
Lecture Notes in Computer Science
2007-09-04Paper
The Number Field Sieve in the Medium Prime Case
Lecture Notes in Computer Science
2007-09-04Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
A NICE cryptanalysis
 
2006-03-01Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
A one round protocol for tripartite Diffie-Hellman
Journal of Cryptology
2005-04-15Paper
scientific article; zbMATH DE number 2089141 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2086708 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2086872 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2086903 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2009945 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1942410 (Why is no real title available?)
 
2003-06-30Paper
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method
Mathematics of Computation
2003-02-19Paper
scientific article; zbMATH DE number 1759769 (Why is no real title available?)
 
2002-10-07Paper
scientific article; zbMATH DE number 1618047 (Why is no real title available?)
 
2002-07-10Paper
scientific article; zbMATH DE number 1759262 (Why is no real title available?)
 
2002-06-25Paper
scientific article; zbMATH DE number 1643939 (Why is no real title available?)
 
2001-09-09Paper
scientific article; zbMATH DE number 1583767 (Why is no real title available?)
 
2001-07-03Paper
``Chinese \& Match, an alternative to Atkin's ``Match and Sort method used in the SEA algorithm
Mathematics of Computation
2001-02-19Paper
The action of a few permutations onr-tuples is quickly transitive
 
1999-12-19Paper
scientific article; zbMATH DE number 1346512 (Why is no real title available?)
 
1999-10-03Paper
Lattice reduction: a toolbox for the cryptoanalyst
Journal of Cryptology
1999-08-26Paper
scientific article; zbMATH DE number 1302838 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1088903 (Why is no real title available?)
 
1997-12-14Paper
On character sums related to elliptic curves with complex multiplication
Journal of Number Theory
1996-07-16Paper
scientific article; zbMATH DE number 697835 (Why is no real title available?)
 
1994-11-30Paper
scientific article; zbMATH DE number 176550 (Why is no real title available?)
 
1993-05-18Paper
Improved low-density subset sum algorithms
Computational Complexity
1993-04-01Paper


Research outcomes over time


This page was built for person: Antoine Joux