Pierre-Alain Fouque

From MaRDI portal
Person:315552

Available identifiers

zbMath Open fouque.pierre-alainDBLP76/6163WikidataQ27996477 ScholiaQ27996477MaRDI QIDQ315552

List of research outcomes





PublicationDate of PublicationType
We are on the same side. Alternative sieving strategies for the number field sieve2024-09-13Paper
Computing \(e\)-th roots in number fields2024-05-29Paper
Masking the GLP lattice-based signature scheme at any order2024-01-23Paper
A generic transform from multi-round interactive proof to NIZK2023-11-16Paper
Revisiting related-key boomerang attacks on AES using computer-aided tool2023-08-25Paper
Computing $e$-th roots in number fields2023-05-27Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)2022-11-09Paper
Fast reduction of algebraic lattices over cyclotomic fields2022-11-09Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}2022-08-30Paper
Towards faster polynomial-time lattice reduction2022-04-22Paper
SSE and SSD: page-efficient searchable symmetric encryption2022-04-22Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices2021-12-01Paper
Multi-device for Signal2021-02-23Paper
Linearly equivalent s-boxes and the division property2020-10-07Paper
Masking Dilithium. Efficient implementation and side-channel evaluation2020-01-30Paper
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond2019-12-10Paper
Variants of the AES key schedule for better truncated differential bounds2019-02-20Paper
Close to Uniform Prime Number Generation With Fewer Random Bits2019-01-28Paper
Pattern matching on encrypted streams2018-12-20Paper
LWE without modular reduction and improved side-channel attacks against BLISS2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols2018-12-04Paper
Key-recovery attacks on \(\mathsf{ASASA}\)2018-09-14Paper
Fast lattice-based encryption: stretching SPRING2018-09-12Paper
Masking the GLP lattice-based signature scheme at any order2018-07-09Paper
Practical implementation of Ring-SIS/LWE based signature and IBE2018-06-22Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures2018-02-16Paper
Improved side-channel analysis of finite-field multiplication2018-02-14Paper
Revisiting Lattice Attacks on Overstretched NTRU Parameters2017-06-13Paper
Computing Generator in Cyclotomic Integer Rings2017-06-13Paper
Low-Data Complexity Attacks on AES2017-06-08Paper
Efficient and Provable White-Box Primitives2017-02-01Paper
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks2016-10-27Paper
New second-preimage attacks on hash functions2016-10-13Paper
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing2016-10-04Paper
Tightly secure signatures from lossy identification schemes2016-09-21Paper
Cryptanalysis of the New CLT Multilinear Map over the Integers2016-09-09Paper
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes2016-09-02Paper
Safe-Errors on SPA Protected Implementations with the Atomicity Technique2016-05-02Paper
Binary Elligator Squared2016-04-13Paper
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation2016-04-13Paper
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones2016-04-08Paper
Key-Recovery Attacks on ASASA2016-03-23Paper
Practical multi-candidate election system2016-03-04Paper
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices2015-12-10Paper
Cryptanalysis of the Co-ACD Assumption2015-12-10Paper
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE2015-12-10Paper
Verified Proofs of Higher-Order Masking2015-09-30Paper
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks2015-09-18Paper
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES2015-09-18Paper
Making RSA–PSS Provably Secure against Non-random Faults2015-07-21Paper
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE2015-01-16Paper
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias2015-01-16Paper
Side-Channel Analysis of Multiplications in GF(2128)2015-01-06Paper
Statistical Properties of Short RSA Distribution and Their Cryptographic Applications2014-09-26Paper
Faster Chosen-Key Distinguishers on Reduced-Round AES2014-08-20Paper
Close to Uniform Prime Number Generation with Fewer Random Bits2014-07-01Paper
Recovering Private Keys Generated with Weak PRNGs2014-01-17Paper
Security Amplification against Meet-in-the-Middle Attacks Using Whitening2014-01-17Paper
Leakage-Resilient Symmetric Encryption via Re-keying2013-10-10Paper
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-1282013-09-02Paper
Injective Encodings to Elliptic Curves2013-06-28Paper
Time/Memory/Data Tradeoffs for Variants of the RSA Problem2013-06-11Paper
Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” Problem2013-05-31Paper
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting2013-05-31Paper
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher2013-04-04Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves2013-03-20Paper
Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL2013-03-18Paper
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication2012-11-13Paper
Indifferentiable Hashing to Barreto–Naehrig Curves2012-09-21Paper
Tightly-Secure Signatures from Lossy Identification Schemes2012-06-29Paper
New Insights on Impossible Differential Cryptanalysis2012-06-08Paper
A family of weak keys in HFE and the corresponding practical key-recovery2012-03-22Paper
Practical Key-Recovery for All Possible Parameters of SFLASH2011-12-02Paper
Automatic Search of Attacks on Round-Reduced AES and Applications2011-08-12Paper
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function2011-07-07Paper
CryptoComputing with Rationals2011-04-20Paper
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem2011-03-15Paper
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 5122011-03-15Paper
Security Analysis of SIMD2011-03-15Paper
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves2010-11-26Paper
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves2010-08-31Paper
Another Look at Complementation Properties2010-07-13Paper
On Some Incompatible Properties of Voting Schemes2010-06-17Paper
The Doubling Attack – Why Upwards Is Better than Downwards2010-03-09Paper
Attacking Unbalanced RSA-CRT Using SPA2010-03-09Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Fast Software Encryption2010-01-05Paper
Cryptanalysis of Tweaked Versions of SMASH and Reparation2009-11-03Paper
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques2009-11-03Paper
Optimal Randomness Extraction from a Diffie-Hellman Element2009-05-12Paper
Practical Cryptanalysis of SFLASH2009-03-10Paper
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52009-03-10Paper
An Improved LPN Algorithm2008-11-27Paper
Power Attack on Small RSA Public Exponent2008-08-29Paper
Differential Cryptanalysis for Multivariate Schemes2008-05-06Paper
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes2008-04-24Paper
Second Preimage Attacks on Dithered Hash Functions2008-04-15Paper
Key Recovery on Hidden Monomial Multivariate Schemes2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets2008-03-18Paper
Total Break of the ℓ-IC Signature Scheme2008-03-05Paper
Cryptanalysis of SFLASH with Slightly Modified Parameters2007-11-29Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes2007-09-11Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Selected Areas in Cryptography2006-10-10Paper
Selected Areas in Cryptography2005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44741822004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741842004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44348932003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q45362892002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q27246032002-09-11Paper

Research outcomes over time

This page was built for person: Pierre-Alain Fouque