|
||
---|---|---|
inria-00556688v1
Conference papers
Total Break of the l-IC Signature Scheme Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩ |
||
inria-00103433v1
Conference papers
The Twist-AUgmented technique for key exchange 9th International Conference on Theory and Practice of Public Key Cryptology - PKC 2006, Apr 2006, New York, USA, pp.410-426 |
||
inria-00556684v1
Conference papers
On the Security of the CCM Encryption Mode and of a Slight Variant Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, 2008, New York, United States. pp.411-428, ⟨10.1007/978-3-540-68914-0_25⟩ |
||
|
||
hal-01094298v1
Conference papers
Security Amplification against Meet-in-the-Middle Attacks Using Whitening Cryptography and Coding - 14th International Conference, Dec 2013, Oxford, United Kingdom. pp.18, ⟨10.1007/978-3-642-45239-0_15⟩ |
||
hal-01951676v1
Conference papers
Are your data gathered? The Folding Test of Unimodality KDD 2018 - 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Minin, Aug 2018, London, United Kingdom. pp.2210-2218, ⟨10.1145/3219819.3219994⟩ |
||
hal-01948722v1
Conference papers
A Formal Treatment of Accountable Proxying over TLS SP 2018 - IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States |
||
hal-01640325v1
Conference papers
Anomaly Detection in Streams with Extreme Value Theory KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug 2017, Halifax, Canada. ⟨10.1145/3097983.3098144⟩ |
||
hal-00825503v2
Conference papers
Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” Problem Advances in Cryptology - 2013, May 2013, Athenes, Greece. pp.17, ⟨10.1007/978-3-642-38348-9_13⟩ |
||
hal-01094304v1
Conference papers
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting Advances in Cryptology - 2013, May 2013, Athenes, Greece. pp.17, ⟨10.1007/978-3-642-38348-9_23⟩ |
||
hal-00870453v1
Conference papers
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128 CRYPTO 2013, Aug 2013, Santa Barbara, United States |
||
inria-00419158v1
Conference papers
HMAC is a Randomness Extractor and Applications to TLS Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32 |
||
inria-00556674v1
Conference papers
Another Look at Complementation Properties Fast Software Encryption, 17th International Workshop : FSE 2010, 2010, Seoul, South Korea. pp.347-364, ⟨10.1007/978-3-642-13858-4_20⟩ |
||
inria-00556690v1
Conference papers
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩ |
||
inria-00556681v1
Conference papers
Practical Electromagnetic Template Attack on HMAC Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, 2009, Lausanne, Switzerland. pp.66-80, ⟨10.1007/978-3-642-04138-9_6⟩ |
||
inria-00556673v1
Conference papers
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function Fast Software Encryption, 18th International Workshop : FSE 2011, Feb 2011, Lyngby, Denmark. pp.107-127, ⟨10.1007/978-3-642-21702-9_7⟩ |
||
inria-00556691v1
Conference papers
Practical Cryptanalysis of SFLASH Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.1-12, ⟨10.1007/978-3-540-74143-5_1⟩ |
||
inria-00556692v1
Conference papers
Cryptanalysis of SFLASH with Slightly Modified Parameters Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2007, Barcelona, Spain. pp.264-275, ⟨10.1007/978-3-540-72540-4_15⟩ |
||
hal-01094335v1
Conference papers
Faster Chosen-Key Distinguishers on Reduced-Round AES Progress in Cryptology - 2012, Dec 2012, Kolkata, India. pp.19, ⟨10.1007/978-3-642-34931-7_14⟩ |
||
hal-01094309v1
Conference papers
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES Fast Software Encryption - 20th International Workshop, 2013, Mar 2013, singapore, Singapore. pp.20, ⟨10.1007/978-3-662-43933-3_28⟩ |
||
hal-01093987v1
Conference papers
Side-Channel Analysis of Multiplications in GF(2 128 ) Application to AES-GCM Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.20 |
||
inria-00556682v1
Conference papers
Cryptanalysis of Tweaked Versions of SMASH and Reparation Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2009, Sackville, New Brunswick, Canada. pp.136-150, ⟨10.1007/978-3-642-04159-4_9⟩ |
||
inria-00556678v1
Conference papers
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, 2010, Yamanaka Hot Spring, Japan. pp.265-277, ⟨10.1007/978-3-642-17455-1_17⟩ |
||
inria-00556676v1
Conference papers
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, 2010, Puebla, Mexico. pp.81-91, ⟨10.1007/978-3-642-14712-8⟩ |
||
inria-00556679v1
Conference papers
Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512 Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada |
||
inria-00556680v1
Conference papers
Security Analysis of SIMD Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada |
||
inria-00556689v1
Conference papers
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 2008, San Francisco, United States. pp.19-35, ⟨10.1007/978-3-540-79263-5_2⟩ |
||
inria-00556685v1
Conference papers
Key Recovery on Hidden Monomial Multivariate Schemes Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2008, Istanbul, Turkey. pp.19-30, ⟨10.1007/978-3-540-78967-3_2⟩ |
||
hal-01094318v1
Conference papers
Tightly-Secure Signatures from Lossy Identification Schemes Advances in Cryptology - 2012, Apr 2012, Cambridge, United Kingdom. pp.19, ⟨10.1007/978-3-642-29011-4_34⟩ |
||
hal-01094301v1
Conference papers
Time/Memory/Data Tradeoffs for Variants of the RSA Problem Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. pp.651-662, ⟨10.1007/978-3-642-38768-5_57⟩ |
||
|