Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, Epiciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Skip to Main content Skip to Navigation

inria-00145049v2  Conference papers
Guillaume HanrotDamien Stehlé. Improved Analysis of Kannan's Shortest Lattice Vector Algorithm
Advances in Cryptology - Crypto'07, Aug 2007, Santa Barbara, United States. pp.170-186, ⟨10.1007/978-3-540-74143-5_10⟩
tel-00011927v1  Theses
Marion Videau. Critères de sécurité des algorithmes de chiffrement à clé secrète
Autre [cs.OH]. Université Pierre et Marie Curie - Paris VI, 2005. Français
hal-00863370v1  Conference papers
Ben SmythDavid Bernhard. Ballot secrecy and ballot independence coincide
ESORICS'13: 18th European Symposium on Research in Computer Security, 2013, Egham, United Kingdom. pp.463-480
hal-00863377v1  Conference papers
Vincent ChevalBruno Blanchet. Proving More Observational Equivalences with ProVerif
POST 2013 - 2nd Conference on Principles of Security and Trust, Mar 2013, Rome, Italy. pp.226-246, ⟨10.1007/978-3-642-36830-1_12⟩
hal-00863382v1  Conference papers
David CadéBruno Blanchet. From Computationally-proved Protocol Specifications to Implementations
7th International Conference on Availability, Reliability and Security (AReS 2012), 2012, Prague, Czech Republic. pp.65--74
hal-00863388v1  Conference papers
Bruno Blanchet. Security Protocol Verification: Symbolic and Computational Models
First Conference on Principles of Security and Trust (POST'12), 2012, Tallinn, Estonia. pp.3--29
hal-00861078v1  Conference papers
Florent FourcotLaurent ToutainFrédéric CuppensNora Cuppens-BouhlahiaStefan Köpsell. IPv6 address obfuscation by intermediate middlebox in coordination with connected devices
EUNICE 2013 : 19th EUNICE/IFIP WG 6.6 International Workshop, Aug 2013, Chemnitz, Germany. pp.148 - 160
inria-00001262v1  Conference papers
Dominique MéryStephan Merz. Event Systems and Access Control
Sixth International IFIP WG 1.7 Workshop on Issues in the Theory of Security, Mar 2006, Vienna/Austria, pp.40-54
hal-00870943v1  Conference papers
Paulo S. L. M. BarretoRichard LindnerRafael Misoczki. Monoidic Codes in Cryptography
Post-Quantum Cryptography - PQCrypto 2011, Nov 2011, Taipei, Taiwan. pp.179-199
hal-00870932v1  Conference papers
Rafael MisoczkiBarreto Paulo S. L. M.. Compact McEliece Keys from Goppa Codes
16th Annual International Workshop Selected Areas in Cryptography SAC2009, Aug 2009, Calgary, Canada
hal-00864298v1  Conference papers
Leo DucasAlain DurmusTancrede LepointVadim Lyubashevsky. Lattice signatures and bimodal Gaussians
CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, United States. pp.40-56, ⟨10.1007/978-3-642-40041-4_3⟩
hal-00864284v1  Conference papers
Vadim LyubashevskyChris PeikertOded Regev. A toolkit for Ring-LWE cryptography
EUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. pp.35-54, ⟨10.1007/978-3-642-38348-9_3⟩
inria-00001247v1  Journal articles
Hebertt Sira-RamirezMichel Fliess. An algebraic state estimation approach for the recovery of chaotically encrypted messages
International journal of bifurcation and chaos in applied sciences and engineering , World Scientific Publishing, 2006, 16 (2), pp.295-309. ⟨10.1142/S0218127406014812⟩
hal-00864837v1  Conference papers
Nicolas Sendrier. Classical algorithm techniques for decoding generic linear codes
Dagstuhl Seminar 13371, Quantum Cryptanalysis, Sep 2013, Dagstuhl, Germany
hal-00870452v1  Conference papers
Jérémy JeanMaría Naya-PlasenciaThomas Peyrin. Multiple Limited-Birthday Distinguishers and Applications
Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada. pp.533--550
hal-00864359v1  Conference papers
Léo DucasPhong Q. Nguyen. Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, IACR, Dec 2012, Beijing, China. pp.433-450, ⟨10.1007/978-3-642-34961-4_27⟩
hal-00675339v1  Conference papers
Marion Videau. On some properties of symmetric Boolean functions
ISIT 2004 - IEEE International Symposium on Information Theory, Jun 2004, Chicago, IL, United States. pp.500, ⟨10.1109/ISIT.2004.1365536⟩
hal-00675349v1  Conference papers
Marion Videau. Symmetric Boolean functions with high nonlinearity
WEWoRC 2005 - Western European Workshop on Research in Cryptplogy, Jul 2005, Leuven, Belgium. pp.87-88
hal-00933429v1  Journal articles
David GalindoSrinivas Vivek. Limits of a conjecture on a leakage-resilient cryptosystem
Information Processing Letters, Elsevier, 2014, 114 (4), pp.192-196. ⟨10.1016/j.ipl.2013.11.014⟩
hal-00675316v1  Conference papers
Anne CanteautMarion Videau. Degree of composition of highly nonlinear functions and applications to higher order cryptanalysis
EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2002, Amsterdam, Netherlands. pp.518-533, ⟨10.1007/3-540-46035-7_34⟩
hal-00934054v1  Conference papers
Lubos GasparGaëtan LeurentFrançois-Xavier Standaert. Hardware Implementation and Side-Channel Analysis of Lapin
Topics in Cryptology - CT-RSA 2014, Feb 2014, San Francisco, United States. pp.206-226, ⟨10.1007/978-3-319-04852-9_11⟩
hal-00936032v1  Conference papers
Leibo LiKeting JiaXiaoyun Wang. Improved Single-Key Attacks on 9-Round AES-192/256
FSE 2014 (21st International Workshop on Fast Software Encryption), IACR, Mar 2014, Londres, United Kingdom
hal-00934336v1  Reports
Jean-Luc DangerSylvain GuilleyPhilippe HoogvorstCédric MurdicaDavid Naccache. Dynamic Countermeasure Against the Zero Power Analysis
[Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013