HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation

hal-01510791v1  Conference papers
Stéphanie AltPierre-Alain FouqueGilles Macario-RatCristina OneteBenjamin Richard. A Cryptographic Analysis of UMTS/LTE AKA
Applied Cryptography and Network Security (ACNS), Jun 2016, Guildford, United Kingdom. pp.18-35, ⟨10.1007/978-3-319-39555-5_2⟩
hal-01948722v1  Conference papers
Karthikeyan BhargavanIoana BoureanuAntoine Delignat-LavaudPierre-Alain FouqueCristina Onete. A Formal Treatment of Accountable Proxying over TLS
SP 2018 - IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
inria-00563959v1  Conference papers
Eric LevieilPierre-Alain Fouque. An Improved LPN Algorithm
Security and Cryptography for Networks, 5th International Conference, SCN 2006, 2006, Maiori, Italy. pp.348-359, ⟨10.1007/11832072_24⟩
inria-00417797v1  Conference papers
Charles BouillaguetPierre-Alain Fouque. Analysis of the Collision Resistance of RadioGatun using Algebraic Techniques
Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Aug 2008, Sackville, Canada. pp.245-261, ⟨10.1007/978-3-642-04159-4_16⟩
hal-01640325v1  Conference papers
Alban SifferPierre-Alain FouqueAlexandre TermierChristine Largouët. Anomaly Detection in Streams with Extreme Value Theory
KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug 2017, Halifax, Canada. ⟨10.1145/3097983.3098144⟩
inria-00556674v1  Conference papers
Charles BouillaguetOrr DunkelmanGaëtan LeurentPierre-Alain Fouque. Another Look at Complementation Properties
Fast Software Encryption, 17th International Workshop : FSE 2010, 2010, Seoul, South Korea. pp.347-364, ⟨10.1007/978-3-642-13858-4_20⟩
hal-01951676v1  Conference papers
Alban SifferPierre-Alain FouqueAlexandre TermierChristine Largouët. Are your data gathered? The Folding Test of Unimodality
KDD 2018 - 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Minin, Aug 2018, London, United Kingdom. pp.2210-2218, ⟨10.1145/3219819.3219994⟩
inria-00563969v1  Conference papers
Pierre-Alain FouqueGwenaëlle MartinetGuillaume Poupard. Attacking Unbalanced RSA-CRT Using SPA
Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, 2003, Cologne, Germany. pp.254-268, ⟨10.1007/978-3-540-45238-6_21⟩
inria-00556679v1  Conference papers
Charles BouillaguetOrr DunkelmanPierre-Alain FouqueGaëtan Leurent. Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada
inria-00563967v1  Conference papers
Pierre-Alain FouqueAntoine JouxGwenaëlle MartinetFrédéric Valette. Authenticated On-Line Encryption
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, 2004, Ottawa, Canada. pp.145-159, ⟨10.1007/978-3-540-24654-1_11⟩
hal-02404662v1  Conference papers
Gilles BartheSonia BelaïdGaëtan CassiersPierre-Alain FouqueBenjamin Grégoire et al.  Automated Verification of Higher-Order Masking in Presence of Physical Defaults
ESORICS 2019 - 24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318, ⟨10.1007/978-3-030-29959-0_15⟩
hal-01110414v1  Conference papers
Charles BouillaguetPatrick DerbezPierre-Alain Fouque. Automatic Search of Attacks on Round-Reduced AES and Applications
CRYPTO 2011 - 31st Annual Cryptology Conference, Aug 2011, Santa Barbara, CA, United States. pp.169-187, ⟨10.1007/978-3-642-22792-9_10⟩
hal-02472180v1  Conference papers
Patrick DerbezPierre-Alain Fouque. Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
CRYPTO 2016 36th Annual International Cryptology Conference,, Aug 2016, Santa Barbara, United States. pp.157-184
hal-01094083v1  Conference papers
Diego AranhaPierre-Alain FouqueChen QianMehdi TibouchiJean-Christophe Zapalowicz. Binary Elligator Squared
Selected Areas in Cryptography 2014, Aug 2014, Montreal, Canada. pp.17, ⟨10.1007/978-3-319-13051-4_2⟩
inria-00563962v1  Conference papers
Pierre-Alain FouqueAntoine JouxGuillaume Poupard. Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Selected Areas in Cryptography, 11th International Workshop, SAC 2004, 2004, Waterloo, Canada. pp.212-226, ⟨10.1007/978-3-540-30564-4_15⟩
hal-01110389v1  Conference papers
Thomas ChardinPierre-Alain FouqueDelphine Leresteux. Cache Timing Analysis of RC4
ACNS 2011 - 9th International Conference Applied Cryptography and Network Security, Jun 2011, Nerja, Spain. pp.110-129, ⟨10.1007/978-3-642-21554-4_7⟩
hal-02470839v1  Journal articles
Pierre-Alain FouqueMehdi Tibouchi. Close to Uniform Prime Number Generation With Fewer Random Bits.
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2019, 65 (2), pp.1307-1317
hal-01518438v1  Conference papers
Jean-François BiasseThomas EspitauPierre-Alain FouqueAlexandre GélinPaul Kirchner. Computing generator in cyclotomic integer rings
36th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2017), Apr 2017, Paris, France. pp.60-88, ⟨10.1007/978-3-319-56620-7_3⟩
hal-01673853v2  Documents associated with scientific events
Karthikeyan BhargavanIoana BoureanuPierre-Alain FouqueCristina OneteBenjamin Richard. Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL
EuroS&P 2017 - 2nd IEEE European Symposium on Security and Privacy, Apr 2017, Paris, France. IEEE, pp.600-615, 2017, ⟨10.1109/EuroSP.2017.52⟩
inria-00556689v1  Conference papers
Pierre-Alain FouqueGaëtan Leurent. Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 2008, San Francisco, United States. pp.19-35, ⟨10.1007/978-3-540-79263-5_2⟩
inria-00556692v1  Conference papers
Vivien DuboisPierre-Alain FouqueJacques Stern. Cryptanalysis of SFLASH with Slightly Modified Parameters
Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2007, Barcelona, Spain. pp.264-275, ⟨10.1007/978-3-540-72540-4_15⟩
hal-02472202v1  Conference papers
Jung Hee CheonPierre-Alain Fouque. Cryptanalysis of the New CLT Multilinear Map over the Integers.
Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques,, May 2016, Vienne, Austria. pp.509-536
inria-00556682v1  Conference papers
Pierre-Alain FouqueJacques SternSebastien Zimmer. Cryptanalysis of Tweaked Versions of SMASH and Reparation
Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2009, Sackville, New Brunswick, Canada. pp.136-150, ⟨10.1007/978-3-642-04159-4_9⟩
inria-00565270v1  Conference papers
Pierre-Alain FouqueJacques SternJan-Geert Wackers. CryptoComputing with Rationals
Financial Cryptography, 6th International Conference, FC 2002, 2002, Southampton, United Kingdom. pp.136-146, ⟨10.1007/3-540-36504-4_10⟩
inria-00563963v1  Conference papers
Pierre-Alain FouqueFrédéric MullerGuillaume PoupardFrédéric Valette. Defeating Countermeasures Based on Randomized BSD Representations
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop, 2004, Cambridge, MA, United States. pp.312-327, ⟨10.1007/978-3-540-28632-5_23⟩
inria-00556678v1  Conference papers
Pierre-Alain FouqueMehdi Tibouchi. Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, 2010, Yamanaka Hot Spring, Japan. pp.265-277, ⟨10.1007/978-3-642-17455-1_17⟩
inria-00563961v1  Conference papers
Pierre-Alain FouqueLouis GranboulanJacques Stern. Differential Cryptanalysis for Multivariate Schemes
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2005, Aarhus, Denmark. pp.341-353, ⟨10.1007/11426639_20⟩
hal-03058482v1  Conference papers
Daniel de Almeida BragaPierre-Alain FouqueMohamed Sabt. Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
ACSAC 2020 - Annual Computer Security Applications Conference, Dec 2020, Austin / Virtual, United States. pp.291-303, ⟨10.1145/3427228.3427295⟩
hal-01427810v1  Conference papers
Pierre-Alain FouquePierre KarpmanPaul KirchnerBrice Minaud. Efficient and Provable White-Box Primitives
ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Dec 2016, Hanoï, Vietnam. pp.159 - 188, ⟨10.1007/978-3-662-53887-6_6⟩
inria-00556676v1  Conference papers
Pierre-Alain FouqueMehdi Tibouchi. Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, 2010, Puebla, Mexico. pp.81-91, ⟨10.1007/978-3-642-14712-8⟩
hal-01094309v1  Conference papers
Patrick DerbezPierre-Alain Fouque. Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
Fast Software Encryption - 20th International Workshop, 2013, Mar 2013, singapore, Singapore. pp.20, ⟨10.1007/978-3-662-43933-3_28⟩
hal-03631377v1  Directions of work or proceedings
Gwendal PatatMohamed SabtPierre-Alain Fouque. Exploring Widevine for Fun and Profit
16th IEEE Workshop on Offensive Technologies, WOOT 2022, San Francisco, CA, United States. 2022
hal-01654408v1  Conference papers
Charles BouillaguetClaire DelaplacePierre-Alain FouquePaul Kirchner. Fast Lattice-Based Encryption: Stretching Spring
International Workshop on Post-Quantum Cryptography, Jun 2017, Utrecht, Netherlands
hal-00373562v1  Conference papers
Pierre-Alain FouqueReynald LercierDenis RéalFrédéric Valette. Fault Attack on elliptic curve with Montgomery ladder implementation
5th Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2008, Aug 2008, Washington DC, United States. pp.92-98, ⟨10.1109/FDTC.2008.15⟩
hal-01959554v1  Conference papers
Cécile Baritel-RuetFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire. Formal Security Proof of CMAC and Its Variants
CSF 2018 - 31st EEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom
inria-00556690v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentPhong Q. Nguyen. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩
inria-00565271v1  Conference papers
Pierre-Alain FouqueJacques Stern. Fully Distributed Threshold RSA under Standard Assumptions
Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, 2001, Gold Coast, Australia. pp.310-330, ⟨10.1007/3-540-45682-1_19⟩
hal-01094323v1  Conference papers
Marion DaubignardPierre-Alain FouqueYassine Lakhnech. Generic Indifferentiability Proofs of Hash Designs
25th Computer Security Foundations Symposium, 2012, Jun 2012, Cambridge, United States. pp.14, ⟨10.1109/CSF.2012.13⟩
hal-01094002v1  Conference papers
Diego AranhaPierre-Alain FouqueBenoit GérardJean-Gabriel KammererMehdi Tibouchi et al.  GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2014, Kaoshiung, Taiwan. pp.262-281, ⟨10.1007/978-3-662-45611-8_14⟩