Pierre-Alain Fouque

From MaRDI portal
Person:315552

Available identifiers

zbMath Open fouque.pierre-alainWikidataQ27996477 ScholiaQ27996477MaRDI QIDQ315552

List of research outcomes

PublicationDate of PublicationType
Masking the GLP lattice-based signature scheme at any order2024-01-23Paper
A generic transform from multi-round interactive proof to NIZK2023-11-16Paper
Revisiting related-key boomerang attacks on AES using computer-aided tool2023-08-25Paper
Computing $e$-th roots in number fields2023-05-27Paper
Fast reduction of algebraic lattices over cyclotomic fields2022-11-09Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)2022-11-09Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}2022-08-30Paper
Towards faster polynomial-time lattice reduction2022-04-22Paper
SSE and SSD: page-efficient searchable symmetric encryption2022-04-22Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices2021-12-01Paper
Multi-device for Signal2021-02-23Paper
Linearly equivalent s-boxes and the division property2020-10-07Paper
Masking Dilithium. Efficient implementation and side-channel evaluation2020-01-30Paper
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond2019-12-10Paper
Variants of the AES key schedule for better truncated differential bounds2019-02-20Paper
Close to Uniform Prime Number Generation With Fewer Random Bits2019-01-28Paper
Pattern matching on encrypted streams2018-12-20Paper
LWE without modular reduction and improved side-channel attacks against BLISS2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols2018-12-04Paper
Key-recovery attacks on \(\mathsf{ASASA}\)2018-09-14Paper
Fast lattice-based encryption: stretching SPRING2018-09-12Paper
Masking the GLP lattice-based signature scheme at any order2018-07-09Paper
Practical implementation of Ring-SIS/LWE based signature and IBE2018-06-22Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures2018-02-16Paper
Improved side-channel analysis of finite-field multiplication2018-02-14Paper
Revisiting Lattice Attacks on Overstretched NTRU Parameters2017-06-13Paper
Computing Generator in Cyclotomic Integer Rings2017-06-13Paper
Low-Data Complexity Attacks on AES2017-06-08Paper
Efficient and Provable White-Box Primitives2017-02-01Paper
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks2016-10-27Paper
New second-preimage attacks on hash functions2016-10-13Paper
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing2016-10-04Paper
Tightly secure signatures from lossy identification schemes2016-09-21Paper
Cryptanalysis of the New CLT Multilinear Map over the Integers2016-09-09Paper
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes2016-09-02Paper
Safe-Errors on SPA Protected Implementations with the Atomicity Technique2016-05-02Paper
Binary Elligator Squared2016-04-13Paper
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation2016-04-13Paper
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones2016-04-08Paper
Key-Recovery Attacks on ASASA2016-03-23Paper
Practical multi-candidate election system2016-03-04Paper
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices2015-12-10Paper
Cryptanalysis of the Co-ACD Assumption2015-12-10Paper
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE2015-12-10Paper
Verified Proofs of Higher-Order Masking2015-09-30Paper
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks2015-09-18Paper
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES2015-09-18Paper
Making RSA–PSS Provably Secure against Non-random Faults2015-07-21Paper
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias2015-01-16Paper
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE2015-01-16Paper
Side-Channel Analysis of Multiplications in GF(2128)2015-01-06Paper
Statistical Properties of Short RSA Distribution and Their Cryptographic Applications2014-09-26Paper
Faster Chosen-Key Distinguishers on Reduced-Round AES2014-08-20Paper
Close to Uniform Prime Number Generation with Fewer Random Bits2014-07-01Paper
Recovering Private Keys Generated with Weak PRNGs2014-01-17Paper
Security Amplification against Meet-in-the-Middle Attacks Using Whitening2014-01-17Paper
Leakage-Resilient Symmetric Encryption via Re-keying2013-10-10Paper
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-1282013-09-02Paper
Injective Encodings to Elliptic Curves2013-06-28Paper
Time/Memory/Data Tradeoffs for Variants of the RSA Problem2013-06-11Paper
Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” Problem2013-05-31Paper
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting2013-05-31Paper
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher2013-04-04Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves2013-03-20Paper
Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL2013-03-18Paper
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication2012-11-13Paper
Indifferentiable Hashing to Barreto–Naehrig Curves2012-09-21Paper
Tightly-Secure Signatures from Lossy Identification Schemes2012-06-29Paper
New Insights on Impossible Differential Cryptanalysis2012-06-08Paper
A family of weak keys in HFE and the corresponding practical key-recovery2012-03-22Paper
Practical Key-Recovery for All Possible Parameters of SFLASH2011-12-02Paper
Automatic Search of Attacks on Round-Reduced AES and Applications2011-08-12Paper
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function2011-07-07Paper
CryptoComputing with Rationals2011-04-20Paper
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 5122011-03-15Paper
Security Analysis of SIMD2011-03-15Paper
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem2011-03-15Paper
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves2010-11-26Paper
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves2010-08-31Paper
Another Look at Complementation Properties2010-07-13Paper
On Some Incompatible Properties of Voting Schemes2010-06-17Paper
Attacking Unbalanced RSA-CRT Using SPA2010-03-09Paper
The Doubling Attack – Why Upwards Is Better than Downwards2010-03-09Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Fast Software Encryption2010-01-05Paper
Cryptanalysis of Tweaked Versions of SMASH and Reparation2009-11-03Paper
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques2009-11-03Paper
Optimal Randomness Extraction from a Diffie-Hellman Element2009-05-12Paper
Practical Cryptanalysis of SFLASH2009-03-10Paper
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52009-03-10Paper
An Improved LPN Algorithm2008-11-27Paper
Power Attack on Small RSA Public Exponent2008-08-29Paper
Differential Cryptanalysis for Multivariate Schemes2008-05-06Paper
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes2008-04-24Paper
Key Recovery on Hidden Monomial Multivariate Schemes2008-04-15Paper
Second Preimage Attacks on Dithered Hash Functions2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets2008-03-18Paper
Total Break of the ℓ-IC Signature Scheme2008-03-05Paper
Cryptanalysis of SFLASH with Slightly Modified Parameters2007-11-29Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes2007-09-11Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Selected Areas in Cryptography2006-10-10Paper
Selected Areas in Cryptography2005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44741822004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741842004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44348932003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q45362892002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q27246032002-09-11Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Pierre-Alain Fouque