Pierre-Alain Fouque

From MaRDI portal
Person:315552

Available identifiers

zbMath Open fouque.pierre-alainDBLP76/6163WikidataQ27996477 ScholiaQ27996477MaRDI QIDQ315552

List of research outcomes





PublicationDate of PublicationType
We are on the same side. Alternative sieving strategies for the number field sieve2024-09-13Paper
Computing \(e\)-th roots in number fields2024-05-29Paper
Masking the GLP lattice-based signature scheme at any order2024-01-23Paper
A generic transform from multi-round interactive proof to NIZK2023-11-16Paper
Revisiting related-key boomerang attacks on AES using computer-aided tool2023-08-25Paper
Computing $e$-th roots in number fields2023-05-27Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)2022-11-09Paper
Fast reduction of algebraic lattices over cyclotomic fields2022-11-09Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}2022-08-30Paper
Towards faster polynomial-time lattice reduction2022-04-22Paper
SSE and SSD: page-efficient searchable symmetric encryption2022-04-22Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices2021-12-01Paper
Multi-device for Signal2021-02-23Paper
Linearly equivalent s-boxes and the division property2020-10-07Paper
Masking Dilithium. Efficient implementation and side-channel evaluation2020-01-30Paper
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond2019-12-10Paper
Variants of the AES key schedule for better truncated differential bounds2019-02-20Paper
Close to Uniform Prime Number Generation With Fewer Random Bits2019-01-28Paper
Pattern matching on encrypted streams2018-12-20Paper
LWE without modular reduction and improved side-channel attacks against BLISS2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols2018-12-04Paper
Key-recovery attacks on \(\mathsf{ASASA}\)2018-09-14Paper
Fast lattice-based encryption: stretching SPRING2018-09-12Paper
Masking the GLP lattice-based signature scheme at any order2018-07-09Paper
Practical implementation of Ring-SIS/LWE based signature and IBE2018-06-22Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures2018-02-16Paper
Improved side-channel analysis of finite-field multiplication2018-02-14Paper
Revisiting Lattice Attacks on Overstretched NTRU Parameters2017-06-13Paper
Computing generator in cyclotomic integer rings. A subfield algorithm for the principal ideal problem in \(L_{|\varDelta_\mathbb {K}|}\left(\frac{1}{2}\right)\) and application to the cryptanalysis of a FHE scheme2017-06-13Paper
Low-Data Complexity Attacks on AES2017-06-08Paper
Efficient and Provable White-Box Primitives2017-02-01Paper
Automatic search of meet-in-the-middle and impossible differential attacks2016-10-27Paper
New second-preimage attacks on hash functions2016-10-13Paper
Assisted identification of mode of operation in binary code with dynamic data flow slicing2016-10-04Paper
Tightly secure signatures from lossy identification schemes2016-09-21Paper
Cryptanalysis of the new CLT multilinear map over the integers2016-09-09Paper
Homomorphic evaluation of lattice-based symmetric encryption schemes2016-09-02Paper
Safe-errors on SPA protected implementations with the atomicity technique2016-05-02Paper
Binary elligator squared2016-04-13Paper
Diffusion matrices from algebraic-geometry codes with efficient SIMD implementation2016-04-13Paper
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones2016-04-08Paper
Key-recovery attacks on \(\mathsf {ASASA}\)2016-03-23Paper
Practical multi-candidate election system2016-03-04Paper
An improved BKW algorithm for LWE with applications to cryptography and lattices2015-12-10Paper
Cryptanalysis of the co-ACD assumption2015-12-10Paper
Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE2015-12-10Paper
Verified Proofs of Higher-Order Masking2015-09-30Paper
Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks2015-09-18Paper
Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES2015-09-18Paper
Making RSA–PSS Provably Secure against Non-random Faults2015-07-21Paper
Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE2015-01-16Paper
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias2015-01-16Paper
Side-Channel Analysis of Multiplications in GF(2128)2015-01-06Paper
Statistical properties of short RSA distribution and their cryptographic applications2014-09-26Paper
Faster chosen-key distinguishers on reduced-round AES2014-08-20Paper
Close to uniform prime number generation with fewer random bits2014-07-01Paper
Recovering private keys generated with weak PRNGs2014-01-17Paper
Security amplification against meet-in-the-middle attacks using whitening2014-01-17Paper
Leakage-resilient symmetric encryption via re-keying2013-10-10Paper
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-1282013-09-02Paper
Injective encodings to elliptic curves2013-06-28Paper
Time/memory/data tradeoffs for variants of the RSA problem2013-06-11Paper
Graph-theoretic algorithms for the ``isomorphism of polynomials problem2013-05-31Paper
Improved key recovery attacks on reduced-round AES in the single-key setting2013-05-31Paper
Meet-in-the-middle attack on reduced versions of the Camellia block cipher2013-04-04Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves2013-03-20Paper
Timing attack against protected RSA-CRT implementation used in PolarSSL2013-03-18Paper
Attacking RSA-CRT signatures with faults on Montgomery multiplication2012-11-13Paper
Indifferentiable hashing to Barreto-Naehrig curves2012-09-21Paper
Tightly-secure signatures from lossy identification schemes2012-06-29Paper
New insights on impossible differential cryptanalysis2012-06-08Paper
A family of weak keys in HFE and the corresponding practical key-recovery2012-03-22Paper
Practical Key-Recovery for All Possible Parameters of SFLASH2011-12-02Paper
Automatic search of attacks on round-reduced AES and applications2011-08-12Paper
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function2011-07-07Paper
Cryptocomputing with rationals2011-04-20Paper
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem2011-03-15Paper
Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\)2011-03-15Paper
Security analysis of SIMD2011-03-15Paper
Deterministic encoding and hashing to odd hyperelliptic curves2010-11-26Paper
Estimating the size of the image of deterministic hash functions to elliptic curves2010-08-31Paper
Another look at complementation properties2010-07-13Paper
On some incompatible properties of voting schemes2010-06-17Paper
The doubling attack -- why upwards is better than downwards.2010-03-09Paper
Attacking unbalanced RSA-CRT using SPA.2010-03-09Paper
The insecurity of Esign in practical implementations2010-01-05Paper
Practical symmetric on-line encryption.2010-01-05Paper
Cryptanalysis of Tweaked Versions of SMASH and Reparation2009-11-03Paper
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques2009-11-03Paper
Optimal Randomness Extraction from a Diffie-Hellman Element2009-05-12Paper
Practical Cryptanalysis of SFLASH2009-03-10Paper
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52009-03-10Paper
An Improved LPN Algorithm2008-11-27Paper
Power Attack on Small RSA Public Exponent2008-08-29Paper
Differential Cryptanalysis for Multivariate Schemes2008-05-06Paper
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes2008-04-24Paper
Second Preimage Attacks on Dithered Hash Functions2008-04-15Paper
Key Recovery on Hidden Monomial Multivariate Schemes2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets2008-03-18Paper
Total Break of the ℓ-IC Signature Scheme2008-03-05Paper
Cryptanalysis of SFLASH with Slightly Modified Parameters2007-11-29Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes2007-09-11Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Selected Areas in Cryptography2006-10-10Paper
Selected Areas in Cryptography2005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44741822004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741842004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44348932003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q45362892002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q27246032002-09-11Paper

Research outcomes over time

This page was built for person: Pierre-Alain Fouque