Skip to Main content Skip to Navigation

hal-02162293v1  Conference papers
Patrick DerbezPierre-Alain FouqueJérémy JeanBaptiste Lambin. Variants of the AES Key Schedule for Better Truncated Differential Bounds
25th Conference on Selected Areas in Cryptography (SAC 2018), Aug 2018, Calgary, Canada. pp.27-49, ⟨10.1007/978-3-030-10970-7_2⟩
inria-00556688v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques Stern. Total Break of the l-IC Signature Scheme
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩
hal-02953167v1  Conference papers
Sonia BelaïdPierre-Evariste DagandDarius MercadierMatthieu RivainRaphaël Wintersdorff. Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Eurocrypt 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.311-341, ⟨10.1007/978-3-030-45727-3_11⟩
hal-01094301v1  Conference papers
Pierre-Alain FouqueDamien VergnaudJean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem
Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. pp.651-662, ⟨10.1007/978-3-642-38768-5_57⟩
inria-00103433v1  Conference papers
Olivier ChevassutPierre-Alain FouquePierrick GaudryDavid Pointcheval. The Twist-AUgmented technique for key exchange
9th International Conference on Theory and Practice of Public Key Cryptology - PKC 2006, Apr 2006, New York, USA, pp.410-426
hal-02482253v1  Journal articles
Ghada ArfaouiXavier BultelPierre-Alain FouqueAdina NedelcuCristina Onete. The privacy of the TLS 1.3 protocol
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2019, 2019, pp.190 - 210. ⟨10.2478/popets-2019-0065⟩
hal-02865304v1  Journal articles
Daniel de Almeida BragaPierre-Alain FouqueMohamed Sabt. The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR, 2020, 2020 (3), pp.196-218
hal-00538489v1  Conference papers
Pierre-Alain FouqueDenis RealF. ValetteM'Hamed Drissi. The carry leakage on the randomized exponent countermeasure
Cryptographic hardware and embedded systems (CHES 2008), Aug 2008, Washington, United States. pp.198-213, ⟨10.1007/978-3-540-85053-3_13⟩
hal-01410216v1  Conference papers
Gilles BartheSonia BelaïdFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire et al.  Strong Non-Interference and Type-Directed Higher-Order Masking
CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩
hal-01648080v1  Conference papers
Thomas EspitauPierre-Alain FouqueBenoît GérardMehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures
2017 ACM Conference on Computer and Communications Security (CCS 2017), Oct 2017, Dallas, TX, United States. pp.1857-1874, ⟨10.1145/3133956.3134028⟩
hal-01093987v1  Conference papers
Sonia BelaidPierre-Alain FouqueBenoit Gérard. Side-Channel Analysis of Multiplications in GF(2 128 ) Application to AES-GCM
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.20
tel-01235207v1  Theses
Sonia Belaïd. Security of Cryptosystems Against Power-Analysis Attacks
Cryptography and Security [cs.CR]. ENS, 2015. English
tel-01767298v1  Theses
Sonia Belaïd. Security of cryptosystems against power-analysis attacks
Cryptography and Security [cs.CR]. Ecole normale supérieure - ENS PARIS, 2015. English. ⟨NNT : 2015ENSU0032⟩
inria-00556680v1  Conference papers
Charles BouillaguetPierre-Alain FouqueGaëtan Leurent. Security Analysis of SIMD
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada
hal-01094298v1  Conference papers
Pierre-Alain FouquePierre Karpman. Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Cryptography and Coding - 14th International Conference, Dec 2013, Oxford, United Kingdom. pp.18, ⟨10.1007/978-3-642-45239-0_15⟩
hal-02307142v1  Conference papers
Olivier BlazyAngèle BossuatXavier BultelPierre-Alain FouqueCristina Onete et al.  SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, 2019, Stockholm, Sweden. pp.294--309, ⟨10.1109/EuroSP.2019.00030⟩
hal-02471084v1  Conference papers
Paul KirchnerPierre-Alain Fouque. Revisiting Lattice Attacks on Overstretched NTRU Parameters.
EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2017, Paris, France. pp.3-26