|
||
---|---|---|
hal-02066930v1
Conference papers
Belenios: a simple private and verifiable electronic voting system Foundations of Security, Protocols, and Equational Reasoning, 2019, Fredericksburg, Virgina, United States. pp.214-238, ⟨10.1007/978-3-030-19052-1_14⟩ |
||
|
||
hal-03691141v1
Journal articles
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers, 2022, 20 (2), pp.80-86. ⟨10.1109/MSEC.2022.3141918⟩ |
||
inria-00512791v1
Journal articles
An extension of Satoh's algorithm and its implementation Journal of the Ramanujan Mathematical Society, Ramanujan Mathematical Society, 2000, 15, pp.281-318 |
||
inria-00512403v1
Conference papers
Counting points on hyperelliptic curves over finite fields ANTS-IV, 2000, Leiden, Netherlands. pp.313-332, ⟨10.1007/10722028_18⟩ |
||
inria-00514426v1
Conference papers
Finding secure curves with the Satoh-FGH algorithm and an early-abort strategy Eurocrypt, 2001, Innsbruck, Austria. pp.14-29, ⟨10.1007/3-540-44987-6_2⟩ |
||
inria-00498705v1
Conference papers
A low-area yet performant FPGA implementation of Shabal 17th International Workshop on Selected Areas in Cryptography, SAC 2010, Aug 2010, Waterloo, Canada. pp.99-113, ⟨10.1007/978-3-642-19574-7_7⟩ |
||
inria-00337631v1
Journal articles
Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem Journal of Symbolic Computation, Elsevier, 2009, 44 (12), pp.1690-1702. ⟨10.1016/j.jsc.2008.08.005⟩ |
||
inria-00103401v3
Journal articles
Linear recurrences with polynomial coefficients and application to integer factorization and Cartier-Manin operator SIAM Journal on Computing, Society for Industrial and Applied Mathematics, 2007, 36 (6), pp.1777-1806. ⟨10.1137/S0097539704443793⟩ |
||
inria-00000625v2
Journal articles
Fast genus 2 arithmetic based on Theta functions Journal of Mathematical Cryptology, De Gruyter, 2007, 1 (3), pp.243-265. ⟨10.1515/JMC.2007.012⟩ |
||
hal-00641592v1
Journal articles
RSA : la fin des clés de 768 bits Techniques de l'Ingenieur, Techniques de l'ingénieur, 2011 |
||
inria-00168429v1
Conference papers
The mpFq library and implementing curve-based key exchanges SPEED: Software Performance Enhancement for Encryption and Decryption, ECRYPT Network of Excellence in Cryptology, Jun 2007, Amsterdam, Netherlands. pp.49-64 |
||
inria-00612418v1
Conference papers
Ballot stuffing in a postal voting system 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011), 2011, Trento, Italy. pp.27 - 36, ⟨10.1109/REVOTE.2011.6045913⟩ |
||
hal-01215623v1
Journal articles
Recent progress on the elliptic curve discrete logarithm problem Designs, Codes and Cryptography, Springer Verlag, 2016, 78 (1), pp.51-72. ⟨10.1007/s10623-015-0146-7⟩ |
||
hal-01184171v2
Conference papers
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Oct 2015, Denver, Colorado, United States. pp.5-17, ⟨10.1145/2810103.2813707⟩ |
||
inria-00126462v2
Conference papers
A GMP-based implementation of Schönhage-Strassen's large integer multiplication algorithm ISSAC 2007, Jul 2007, Waterloo, Ontario, Canada. pp.167-174, ⟨10.1145/1277548.1277572⟩ |
||
inria-00001009v1
Conference papers
Fast algorithms for computing the eigenvalue in the Schoof-Elkies-Atkin algorithm ISSAC '06: Proceedings of the 2006 international symposium on symbolic and algebraic computation, Jul 2006, Genoa, Italy, pp.109 - 115, ⟨10.1145/1145768.1145791⟩ |
||
inria-00444693v2
Conference papers
Factorization of a 768-bit RSA modulus Advances in Cryptology – CRYPTO 2010, Aug 2010, Santa Barbara, United States. pp.333-350, ⟨10.1007/978-3-642-14623-7_18⟩ |
||
inria-00103433v1
Conference papers
The Twist-AUgmented technique for key exchange 9th International Conference on Theory and Practice of Public Key Cryptology - PKC 2006, Apr 2006, New York, USA, pp.410-426 |
||
inria-00000627v1
Journal articles
Modular equations for hyperelliptic curves Mathematics of Computation, American Mathematical Society, 2005, 74, pp.429-454 |
||
|
||
hal-02266264v2
Conference papers
Breaking the encryption scheme of the Moscow Internet voting system Financial Cryptography and Data Security, 2020, Kota Kinabalu, Malaysia. pp.32-49, ⟨10.1007/978-3-030-51280-4_3⟩ |
||
hal-01393625v1
Journal articles
An harmonious encoding of instrument values by a 19th century Parisian violin dealer Cryptologia, Taylor & Francis, 2017, 41 (5), pp.448-458. ⟨10.1080/01611194.2016.1257524⟩ |
||
hal-00818124v3
Conference papers
Discrete logarithm in GF($2^{809}$) with FFS Public-Key Cryptography – PKC 2014, 2014, Buenos Aires, Argentina. ⟨10.1007/978-3-642-54631-0_13⟩ |
||
hal-03629587v1
Preprints, Working Papers, ...
Is the JCJ voting system really coercion-resistant? 2022 |
||
|
||
hal-01215553v1
Preprints, Working Papers, ...
Integer factorization and discrete logarithm problems 2014 |
||
hal-02346420v1
Preprints, Working Papers, ...
A simple alternative to Benaloh challenge for the cast-as-intended property in Helios/Belenios 2019 |
||
inria-00000626v1
Book sections
Chapter 7: Hyperelliptic curves and the HCDLP I. Blake and G. Seroussi and N. Smart. Advances in Elliptic Curve Cryptography, 317 (317), Cambridge University Press, 2005, London Mathematical Society Lecture Note Series |
||
inria-00266565v2
Journal articles
The arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer lines Finite Fields and Their Applications, Elsevier, 2009, 15 (2), pp.246-260. ⟨10.1016/j.ffa.2008.12.006⟩ |
||
|