Pierre-Alain Fouque

From MaRDI portal
(Redirected from Person:315552)
Pierre-Alain Fouque Q315552


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
We are on the same side. Alternative sieving strategies for the number field sieve
 
2024-09-13Paper
Computing \(e\)-th roots in number fields
 
2024-05-29Paper
Masking the GLP lattice-based signature scheme at any order
Journal of Cryptology
2024-01-23Paper
A generic transform from multi-round interactive proof to NIZK
Lecture Notes in Computer Science
2023-11-16Paper
Revisiting related-key boomerang attacks on AES using computer-aided tool
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Computing $e$-th roots in number fields
 
2023-05-27Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)
 
2022-11-09Paper
Fast reduction of algebraic lattices over cyclotomic fields
 
2022-11-09Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}
 
2022-08-30Paper
Towards faster polynomial-time lattice reduction
 
2022-04-22Paper
SSE and SSD: page-efficient searchable symmetric encryption
 
2022-04-22Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices
 
2021-12-01Paper
Multi-device for Signal
 
2021-02-23Paper
Linearly equivalent s-boxes and the division property
Designs, Codes and Cryptography
2020-10-07Paper
Masking Dilithium. Efficient implementation and side-channel evaluation
 
2020-01-30Paper
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond
 
2019-12-10Paper
Variants of the AES key schedule for better truncated differential bounds
 
2019-02-20Paper
Close to Uniform Prime Number Generation With Fewer Random Bits
IEEE Transactions on Information Theory
2019-01-28Paper
Pattern matching on encrypted streams
 
2018-12-20Paper
LWE without modular reduction and improved side-channel attacks against BLISS
 
2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols
IEEE Transactions on Computers
2018-12-04Paper
Key-recovery attacks on \(\mathsf{ASASA}\)
Journal of Cryptology
2018-09-14Paper
Fast lattice-based encryption: stretching SPRING
 
2018-09-12Paper
Masking the GLP lattice-based signature scheme at any order
 
2018-07-09Paper
Practical implementation of Ring-SIS/LWE based signature and IBE
 
2018-06-22Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures
 
2018-02-16Paper
Improved side-channel analysis of finite-field multiplication
 
2018-02-14Paper
Revisiting Lattice Attacks on Overstretched NTRU Parameters
Lecture Notes in Computer Science
2017-06-13Paper
Computing generator in cyclotomic integer rings. A subfield algorithm for the principal ideal problem in \(L_{|\varDelta_\mathbb {K}|}\left(\frac{1}{2}\right)\) and application to the cryptanalysis of a FHE scheme
Lecture Notes in Computer Science
2017-06-13Paper
Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory
2017-06-08Paper
Efficient and Provable White-Box Primitives
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Automatic search of meet-in-the-middle and impossible differential attacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
New second-preimage attacks on hash functions
Journal of Cryptology
2016-10-13Paper
Assisted identification of mode of operation in binary code with dynamic data flow slicing
Applied Cryptography and Network Security
2016-10-04Paper
Tightly secure signatures from lossy identification schemes
Journal of Cryptology
2016-09-21Paper
Cryptanalysis of the new CLT multilinear map over the integers
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Homomorphic evaluation of lattice-based symmetric encryption schemes
Lecture Notes in Computer Science
2016-09-02Paper
Safe-errors on SPA protected implementations with the atomicity technique
The New Codebreakers
2016-05-02Paper
Binary elligator squared
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Diffusion matrices from algebraic-geometry codes with efficient SIMD implementation
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Key-recovery attacks on \(\mathsf {ASASA}\)
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
2016-03-04Paper
An improved BKW algorithm for LWE with applications to cryptography and lattices
Lecture Notes in Computer Science
2015-12-10Paper
Cryptanalysis of the co-ACD assumption
Lecture Notes in Computer Science
2015-12-10Paper
Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE
Lecture Notes in Computer Science
2015-12-10Paper
Verified Proofs of Higher-Order Masking
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
Fast Software Encryption
2015-09-18Paper
Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
Fast Software Encryption
2015-09-18Paper
Making RSA–PSS Provably Secure against Non-random Faults
Advanced Information Systems Engineering
2015-07-21Paper
Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE
Lecture Notes in Computer Science
2015-01-16Paper
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
Lecture Notes in Computer Science
2015-01-16Paper
Side-Channel Analysis of Multiplications in GF(2128)
Lecture Notes in Computer Science
2015-01-06Paper
Statistical properties of short RSA distribution and their cryptographic applications
Lecture Notes in Computer Science
2014-09-26Paper
Faster chosen-key distinguishers on reduced-round AES
Lecture Notes in Computer Science
2014-08-20Paper
Close to uniform prime number generation with fewer random bits
Automata, Languages, and Programming
2014-07-01Paper
Recovering private keys generated with weak PRNGs
Cryptography and Coding
2014-01-17Paper
Security amplification against meet-in-the-middle attacks using whitening
Cryptography and Coding
2014-01-17Paper
Leakage-resilient symmetric encryption via re-keying
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Injective encodings to elliptic curves
Information Security and Privacy
2013-06-28Paper
Time/memory/data tradeoffs for variants of the RSA problem
Lecture Notes in Computer Science
2013-06-11Paper
Graph-theoretic algorithms for the ``isomorphism of polynomials problem
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Improved key recovery attacks on reduced-round AES in the single-key setting
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Meet-in-the-middle attack on reduced versions of the Camellia block cipher
Advances in Information and Computer Security
2013-04-04Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
Mathematics of Computation
2013-03-20Paper
Timing attack against protected RSA-CRT implementation used in PolarSSL
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Attacking RSA-CRT signatures with faults on Montgomery multiplication
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Indifferentiable hashing to Barreto-Naehrig curves
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Tightly-secure signatures from lossy identification schemes
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
New insights on impossible differential cryptanalysis
Selected Areas in Cryptography
2012-06-08Paper
A family of weak keys in HFE and the corresponding practical key-recovery
Journal of Mathematical Cryptology
2012-03-22Paper
Practical Key-Recovery for All Possible Parameters of SFLASH
Lecture Notes in Computer Science
2011-12-02Paper
Automatic search of attacks on round-reduced AES and applications
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Fast Software Encryption
2011-07-07Paper
Cryptocomputing with rationals
Financial Cryptography
2011-04-20Paper
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem
Public Key Cryptography – PKC 2011
2011-03-15Paper
Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\)
Selected Areas in Cryptography
2011-03-15Paper
Security analysis of SIMD
Selected Areas in Cryptography
2011-03-15Paper
Deterministic encoding and hashing to odd hyperelliptic curves
Lecture Notes in Computer Science
2010-11-26Paper
Estimating the size of the image of deterministic hash functions to elliptic curves
Lecture Notes in Computer Science
2010-08-31Paper
Another look at complementation properties
Fast Software Encryption
2010-07-13Paper
On some incompatible properties of voting schemes
Towards Trustworthy Elections
2010-06-17Paper
The doubling attack -- why upwards is better than downwards.
Lecture Notes in Computer Science
2010-03-09Paper
Attacking unbalanced RSA-CRT using SPA.
Lecture Notes in Computer Science
2010-03-09Paper
The insecurity of Esign in practical implementations
Lecture Notes in Computer Science
2010-01-05Paper
Practical symmetric on-line encryption.
Lecture Notes in Computer Science
2010-01-05Paper
Cryptanalysis of Tweaked Versions of SMASH and Reparation
Selected Areas in Cryptography
2009-11-03Paper
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques
Selected Areas in Cryptography
2009-11-03Paper
Optimal Randomness Extraction from a Diffie-Hellman Element
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Practical Cryptanalysis of SFLASH
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
An Improved LPN Algorithm
Lecture Notes in Computer Science
2008-11-27Paper
Power Attack on Small RSA Public Exponent
Lecture Notes in Computer Science
2008-08-29Paper
Differential Cryptanalysis for Multivariate Schemes
Lecture Notes in Computer Science
2008-05-06Paper
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Second Preimage Attacks on Dithered Hash Functions
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Key Recovery on Hidden Monomial Multivariate Schemes
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets
Lecture Notes in Computer Science
2008-03-18Paper
Total Break of the ℓ-IC Signature Scheme
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Cryptanalysis of SFLASH with Slightly Modified Parameters
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes
Automata, Languages and Programming
2007-09-11Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2081073 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2081075 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2009974 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1759349 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1618057 (Why is no real title available?)
 
2002-09-11Paper


Research outcomes over time


This page was built for person: Pierre-Alain Fouque