Skip to Main content Skip to Navigation

hal-02470995v1  Journal articles
Brice MinaudPatrick DerbezPierre-Alain FouquePierre Karpman. Key-Recovery Attacks on ASASA.
Journal of Cryptology, Springer Verlag, 2018, 31 (3), pp.845-884
inria-00556688v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques Stern. Total Break of the l-IC Signature Scheme
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩
hal-01410216v1  Conference papers
Gilles BartheSonia BelaïdFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire et al.  Strong Non-Interference and Type-Directed Higher-Order Masking
CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩
hal-02471031v1  Conference papers
Nicolas DesmoulinsPierre-Alain FouqueCristina OneteOlivier Sanders. Pattern Matching on Encrypted Streams.
ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.121-148
inria-00556684v1  Conference papers
Pierre-Alain FouqueGwenaëlle MartinetFrédéric ValetteSebastien Zimmer. On the Security of the CCM Encryption Mode and of a Slight Variant
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, 2008, New York, United States. pp.411-428, ⟨10.1007/978-3-540-68914-0_25⟩
hal-02391472v1  Conference papers
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
Public Key Cryptography - PKC 2005, Jan 2005, Les Diablerets, Switzerland. pp.65-84, ⟨10.1007/978-3-540-30580-4_6⟩
hal-01110403v1  Conference papers
Patrick DerbezPierre-Alain FouqueDelphine Leresteux. Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
CHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. pp.274-291, ⟨10.1007/978-3-642-23951-9_19⟩
hal-01111659v1  Journal articles
Charles BouillaguetPatrick DerbezOrr DunkelmanPierre-Alain FouqueNathan Keller et al.  Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2012, 58 (11), pp.7002-7017. ⟨10.1109/TIT.2012.2207880⟩
hal-01110389v1  Conference papers
Thomas ChardinPierre-Alain FouqueDelphine Leresteux. Cache Timing Analysis of RC4
ACNS 2011 - 9th International Conference Applied Cryptography and Network Security, Jun 2011, Nerja, Spain. pp.110-129, ⟨10.1007/978-3-642-21554-4_7⟩
hal-01094298v1  Conference papers
Pierre-Alain FouquePierre Karpman. Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Cryptography and Coding - 14th International Conference, Dec 2013, Oxford, United Kingdom. pp.18, ⟨10.1007/978-3-642-45239-0_15⟩
hal-01951676v1  Conference papers
Alban SifferPierre-Alain FouqueAlexandre TermierChristine Largouët. Are your data gathered? The Folding Test of Unimodality
KDD 2018 - 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Minin, Aug 2018, London, United Kingdom. pp.2210-2218, ⟨10.1145/3219819.3219994⟩
hal-01948722v1  Conference papers
Karthikeyan BhargavanIoana BoureanuAntoine Delignat-LavaudPierre-Alain FouqueCristina Onete. A Formal Treatment of Accountable Proxying over TLS
SP 2018 - IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
hal-02470965v1  Conference papers
Gilles BartheSonia BelaïdGaëtan CassiersPierre-Alain FouqueBenjamin Grégoire et al.  MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
ESORICS 2019 The European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318
hal-02471084v1  Conference papers
Paul KirchnerPierre-Alain Fouque. Revisiting Lattice Attacks on Overstretched NTRU Parameters.
EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2017, Paris, France. pp.3-26
hal-02472180v1  Conference papers
Patrick DerbezPierre-Alain Fouque. Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
CRYPTO 2016 36th Annual International Cryptology Conference,, Aug 2016, Santa Barbara, United States. pp.157-184
hal-02472202v1  Conference papers
Jung Hee CheonPierre-Alain Fouque. Cryptanalysis of the New CLT Multilinear Map over the Integers.
Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques,, May 2016, Vienne, Austria. pp.509-536
hal-01640325v1  Conference papers
Alban SifferPierre-Alain FouqueAlexandre TermierChristine Largouët. Anomaly Detection in Streams with Extreme Value Theory
KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug 2017, Halifax, Canada. ⟨10.1145/3097983.3098144⟩
hal-02307142v1  Conference papers
Olivier BlazyAngèle BossuatXavier BultelPierre-Alain FouqueCristina Onete et al.  SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, 2019, Stockholm, Sweden. pp.294--309, ⟨10.1109/EuroSP.2019.00030⟩
inria-00419158v1  Conference papers
Pierre-Alain FouqueDavid PointchevalSébastien Zimmer. HMAC is a Randomness Extractor and Applications to TLS
Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩
inria-00556674v1  Conference papers
Charles BouillaguetOrr DunkelmanGaëtan LeurentPierre-Alain Fouque. Another Look at Complementation Properties
Fast Software Encryption, 17th International Workshop : FSE 2010, 2010, Seoul, South Korea. pp.347-364, ⟨10.1007/978-3-642-13858-4_20⟩
inria-00556690v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentPhong Q. Nguyen. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩