Skip to Main content Skip to Navigation

inria-00556688v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques Stern. Total Break of the l-IC Signature Scheme
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩
inria-00103433v1  Conference papers
Olivier ChevassutPierre-Alain FouquePierrick GaudryDavid Pointcheval. The Twist-AUgmented technique for key exchange
9th International Conference on Theory and Practice of Public Key Cryptology - PKC 2006, Apr 2006, New York, USA, pp.410-426
inria-00556684v1  Conference papers
Pierre-Alain FouqueGwenaëlle MartinetFrédéric ValetteSebastien Zimmer. On the Security of the CCM Encryption Mode and of a Slight Variant
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, 2008, New York, United States. pp.411-428, ⟨10.1007/978-3-540-68914-0_25⟩
hal-01094298v1  Conference papers
Pierre-Alain FouquePierre Karpman. Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Cryptography and Coding - 14th International Conference, Dec 2013, Oxford, United Kingdom. pp.18, ⟨10.1007/978-3-642-45239-0_15⟩
hal-01951676v1  Conference papers
Alban SifferPierre-Alain FouqueAlexandre TermierChristine Largouët. Are your data gathered? The Folding Test of Unimodality
KDD 2018 - 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Minin, Aug 2018, London, United Kingdom. pp.2210-2218, ⟨10.1145/3219819.3219994⟩
hal-01948722v1  Conference papers
Karthikeyan BhargavanIoana BoureanuAntoine Delignat-LavaudPierre-Alain FouqueCristina Onete. A Formal Treatment of Accountable Proxying over TLS
SP 2018 - IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
hal-01640325v1  Conference papers
Alban SifferPierre-Alain FouqueAlexandre TermierChristine Largouët. Anomaly Detection in Streams with Extreme Value Theory
KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug 2017, Halifax, Canada. ⟨10.1145/3097983.3098144⟩
inria-00419158v1  Conference papers
Pierre-Alain FouqueDavid PointchevalSébastien Zimmer. HMAC is a Randomness Extractor and Applications to TLS
Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32
inria-00556674v1  Conference papers
Charles BouillaguetOrr DunkelmanGaëtan LeurentPierre-Alain Fouque. Another Look at Complementation Properties
Fast Software Encryption, 17th International Workshop : FSE 2010, 2010, Seoul, South Korea. pp.347-364, ⟨10.1007/978-3-642-13858-4_20⟩
inria-00556690v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentPhong Q. Nguyen. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩
inria-00556681v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentDenis RéalFrédéric Valette. Practical Electromagnetic Template Attack on HMAC
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, 2009, Lausanne, Switzerland. pp.66-80, ⟨10.1007/978-3-642-04138-9_6⟩
inria-00556673v1  Conference papers
Jérémy JeanPierre-Alain Fouque. Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Fast Software Encryption, 18th International Workshop : FSE 2011, Feb 2011, Lyngby, Denmark. pp.107-127, ⟨10.1007/978-3-642-21702-9_7⟩
inria-00556691v1  Conference papers
Vivien DuboisPierre-Alain FouqueAdi ShamirJacques Stern. Practical Cryptanalysis of SFLASH
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.1-12, ⟨10.1007/978-3-540-74143-5_1⟩
inria-00556692v1  Conference papers
Vivien DuboisPierre-Alain FouqueJacques Stern. Cryptanalysis of SFLASH with Slightly Modified Parameters
Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2007, Barcelona, Spain. pp.264-275, ⟨10.1007/978-3-540-72540-4_15⟩
hal-01094309v1  Conference papers
Patrick DerbezPierre-Alain Fouque. Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
Fast Software Encryption - 20th International Workshop, 2013, Mar 2013, singapore, Singapore. pp.20, ⟨10.1007/978-3-662-43933-3_28⟩
hal-01093987v1  Conference papers
Sonia BelaidPierre-Alain FouqueBenoit Gérard. Side-Channel Analysis of Multiplications in GF(2 128 ) Application to AES-GCM
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.20
inria-00556682v1  Conference papers
Pierre-Alain FouqueJacques SternSebastien Zimmer. Cryptanalysis of Tweaked Versions of SMASH and Reparation
Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2009, Sackville, New Brunswick, Canada. pp.136-150, ⟨10.1007/978-3-642-04159-4_9⟩
inria-00556678v1  Conference papers
Pierre-Alain FouqueMehdi Tibouchi. Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, 2010, Yamanaka Hot Spring, Japan. pp.265-277, ⟨10.1007/978-3-642-17455-1_17⟩
inria-00556676v1  Conference papers
Pierre-Alain FouqueMehdi Tibouchi. Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, 2010, Puebla, Mexico. pp.81-91, ⟨10.1007/978-3-642-14712-8⟩
inria-00556679v1  Conference papers
Charles BouillaguetOrr DunkelmanPierre-Alain FouqueGaëtan Leurent. Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada
inria-00556680v1  Conference papers
Charles BouillaguetPierre-Alain FouqueGaëtan Leurent. Security Analysis of SIMD
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada
inria-00556689v1  Conference papers
Pierre-Alain FouqueGaëtan Leurent. Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 2008, San Francisco, United States. pp.19-35, ⟨10.1007/978-3-540-79263-5_2⟩
inria-00556685v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatJacques Stern. Key Recovery on Hidden Monomial Multivariate Schemes
Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2008, Istanbul, Turkey. pp.19-30, ⟨10.1007/978-3-540-78967-3_2⟩
hal-01094301v1  Conference papers
Pierre-Alain FouqueDamien VergnaudJean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem
Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. pp.651-662, ⟨10.1007/978-3-642-38768-5_57⟩