Skip to Main content Skip to Navigation

inria-00556688v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques Stern. Total Break of the l-IC Signature Scheme
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩
hal-01094301v1  Conference papers
Pierre-Alain FouqueDamien VergnaudJean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem
Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. pp.651-662, ⟨10.1007/978-3-642-38768-5_57⟩
hal-00538489v1  Conference papers
Pierre-Alain FouqueDenis RealF. ValetteM'Hamed Drissi. The carry leakage on the randomized exponent countermeasure
Cryptographic hardware and embedded systems (CHES 2008), Aug 2008, Washington, United States. pp.198-213, ⟨10.1007/978-3-540-85053-3_13⟩
inria-00556680v1  Conference papers
Charles BouillaguetPierre-Alain FouqueGaëtan Leurent. Security Analysis of SIMD
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩
inria-00556673v1  Conference papers
Jérémy JeanPierre-Alain Fouque. Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Fast Software Encryption, 18th International Workshop : FSE 2011, Feb 2011, Lyngby, Denmark. pp.107-127, ⟨10.1007/978-3-642-21702-9_7⟩
inria-00556681v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentDenis RéalFrédéric Valette. Practical Electromagnetic Template Attack on HMAC
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, 2009, Lausanne, Switzerland. pp.66-80, ⟨10.1007/978-3-642-04138-9_6⟩
inria-00556671v1  Conference papers
Charles BouillaguetJean-Charles FaugèrePierre-Alain FouqueLudovic Perret. Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial With One Secret Problem
14th IACR International Conference on Practice and Theory of Public Key Cryptography - PKC 2011, Mar 2011, Taormina, Italy. pp.473-493, ⟨10.1007/978-3-642-19379-8_29⟩
inria-00556691v1  Conference papers
Vivien DuboisPierre-Alain FouqueAdi ShamirJacques Stern. Practical Cryptanalysis of SFLASH
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.1-12, ⟨10.1007/978-3-540-74143-5_1⟩
hal-00918401v1  Journal articles
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩
inria-00419148v1  Conference papers
Céline ChevalierPierre-Alain FouqueDavid PointchevalSébastien Zimmer. Optimal Randomness Extraction from a Diffie-Hellman Element
Advances in Cryptology -- Proceedings of EUROCRYPT '09, 2009, Cologne, Allemagne, Germany. pp.572--589
inria-00556684v1  Conference papers
Pierre-Alain FouqueGwenaëlle MartinetFrédéric ValetteSebastien Zimmer. On the Security of the CCM Encryption Mode and of a Slight Variant
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, 2008, New York, United States. pp.411-428, ⟨10.1007/978-3-540-68914-0_25⟩
inria-00539539v1  Book sections
Benoît Chevallier-MamesPierre-Alain FouqueDavid PointchevalJulien SternJacques Traoré. On Some Incompatible Properties of Voting Schemes
D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh. Towards Trustworthy Elections, 6000, springer, pp.191--199, 2010, lncs
hal-01110403v1  Conference papers
Patrick DerbezPierre-Alain FouqueDelphine Leresteux. Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
CHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. pp.274-291, ⟨10.1007/978-3-642-23951-9_19⟩
hal-01111659v1  Journal articles
Charles BouillaguetPatrick DerbezOrr DunkelmanPierre-Alain FouqueNathan Keller et al.  Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2012, 58 (11), pp.7002-7017. ⟨10.1109/TIT.2012.2207880⟩
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
hal-00870955v1  Conference papers
Michel AbdallaSonia BelaidPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. pp.471-488, ⟨10.1007/978-3-642-40349-1_27⟩
inria-00556685v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatJacques Stern. Key Recovery on Hidden Monomial Multivariate Schemes
Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2008, Istanbul, Turkey. pp.19-30, ⟨10.1007/978-3-540-78967-3_2⟩
inria-00419158v1  Conference papers
Pierre-Alain FouqueDavid PointchevalSébastien Zimmer. HMAC is a Randomness Extractor and Applications to TLS
Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32
inria-00556690v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentPhong Q. Nguyen. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩
hal-00373562v1  Conference papers
Pierre-Alain FouqueReynald LercierDenis RéalFrédéric Valette. Fault Attack on elliptic curve with Montgomery ladder implementation
5th Workshop on Fault Diagnosis and Tolerance in Cryptography : FDTC 2008, Aug 2008, Washington DC, United States. pp.92-98, ⟨10.1109/FDTC.2008.15⟩