|
||
---|---|---|
hal-02470995v1
Journal articles
Key-Recovery Attacks on ASASA. Journal of Cryptology, Springer Verlag, 2018, 31 (3), pp.845-884 |
||
inria-00556688v1
Conference papers
Total Break of the l-IC Signature Scheme Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩ |
||
hal-01410216v1
Conference papers
Strong Non-Interference and Type-Directed Higher-Order Masking CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩ |
||
hal-03011699v1
Conference papers
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor $$k^{1/(2k)}$$ Time $$k^{k/8+o(k)}$$ Crypto, 2020, Santa Barbara, United States. pp.186-212, ⟨10.1007/978-3-030-56880-1_7⟩ |
||
hal-02471031v1
Conference papers
Pattern Matching on Encrypted Streams. ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.121-148 |
||
hal-01878516v1
Conference papers
Practical Implementation of Ring-SIS/LWE Based Signature and IBE PQCrypto2018, Apr 2018, Fort Lauderdale, United States. pp.271 - 291, ⟨10.1007/978-3-319-79063-3_13⟩ |
||
inria-00556684v1
Conference papers
On the Security of the CCM Encryption Mode and of a Slight Variant Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, 2008, New York, United States. pp.411-428, ⟨10.1007/978-3-540-68914-0_25⟩ |
||
hal-02391472v1
Conference papers
Password-Based Authenticated Key Exchange in the Three-Party Setting Public Key Cryptography - PKC 2005, Jan 2005, Les Diablerets, Switzerland. pp.65-84, ⟨10.1007/978-3-540-30580-4_6⟩ ![]() |
||
|
||
hal-01110403v1
Conference papers
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES CHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. pp.274-291, ⟨10.1007/978-3-642-23951-9_19⟩ ![]() |
||
hal-01111659v1
Journal articles
Low-Data Complexity Attacks on AES IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2012, 58 (11), pp.7002-7017. ⟨10.1109/TIT.2012.2207880⟩ ![]() |
||
hal-01110389v1
Conference papers
Cache Timing Analysis of RC4 ACNS 2011 - 9th International Conference Applied Cryptography and Network Security, Jun 2011, Nerja, Spain. pp.110-129, ⟨10.1007/978-3-642-21554-4_7⟩ ![]() |
||
hal-01094298v1
Conference papers
Security Amplification against Meet-in-the-Middle Attacks Using Whitening Cryptography and Coding - 14th International Conference, Dec 2013, Oxford, United Kingdom. pp.18, ⟨10.1007/978-3-642-45239-0_15⟩ |
||
hal-01951676v1
Conference papers
Are your data gathered? The Folding Test of Unimodality KDD 2018 - 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Minin, Aug 2018, London, United Kingdom. pp.2210-2218, ⟨10.1145/3219819.3219994⟩ |
||
hal-01948722v1
Conference papers
A Formal Treatment of Accountable Proxying over TLS SP 2018 - IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States |
||
hal-02470965v1
Conference papers
MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. ESORICS 2019 The European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318 |
||
hal-02471084v1
Conference papers
Revisiting Lattice Attacks on Overstretched NTRU Parameters. EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2017, Paris, France. pp.3-26 |
||
hal-02472180v1
Conference papers
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. CRYPTO 2016 36th Annual International Cryptology Conference,, Aug 2016, Santa Barbara, United States. pp.157-184 |
||
hal-02472202v1
Conference papers
Cryptanalysis of the New CLT Multilinear Map over the Integers. Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques,, May 2016, Vienne, Austria. pp.509-536 |
||
hal-01640325v1
Conference papers
Anomaly Detection in Streams with Extreme Value Theory KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug 2017, Halifax, Canada. ⟨10.1145/3097983.3098144⟩ |
||
hal-02307143v1
Journal articles
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting Cryptology ePrint Archive, IACR, 2019, 2019, pp.367 |
||
hal-02307142v1
Conference papers
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, 2019, Stockholm, Sweden. pp.294--309, ⟨10.1109/EuroSP.2019.00030⟩ |
||
hal-00825503v2
Conference papers
Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” Problem Advances in Cryptology - 2013, May 2013, Athenes, Greece. pp.17, ⟨10.1007/978-3-642-38348-9_13⟩ |
||
hal-01094304v1
Conference papers
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting Advances in Cryptology - 2013, May 2013, Athenes, Greece. pp.17, ⟨10.1007/978-3-642-38348-9_23⟩ |
||
hal-00870453v1
Conference papers
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128 CRYPTO 2013, Aug 2013, Santa Barbara, United States |
||
inria-00419158v1
Conference papers
HMAC is a Randomness Extractor and Applications to TLS Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32 |
||
inria-00539538v1
Directions of work or proceedings
Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09) Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩ |
||
inria-00556674v1
Conference papers
Another Look at Complementation Properties Fast Software Encryption, 17th International Workshop : FSE 2010, 2010, Seoul, South Korea. pp.347-364, ⟨10.1007/978-3-642-13858-4_20⟩ |
||
hal-01093865v1
Conference papers
Side-Channel Analysis of Multiplications in GF$(2^{128})$ Asiacrypt 2014, Dec 2014, Kaohsiung, Taiwan. ⟨10.1007/978-3-662-45608-8_17⟩ |
||
inria-00556690v1
Conference papers
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩ |
||
|