Skip to Main content Skip to Navigation


...
hal-01377339v2  Conference papers
Simon PerdrixLuc Sanselme. Determinism and Computational Power of Real Measurement-based Quantum Computation
FCT'17- 21st International Symposium on Fundamentals of Computation Theory, Sep 2017, Bordeaux, France. ⟨10.1007/978-3-662-55751-8_31⟩
hal-02944663v1  Conference papers
Sandra RasoamiaramananaGilles Macario-RatMarine Minier. White-Box Traitor-Tracing from Tardos Probabilistic Codes
SecITC 2019: Innovative Security Solutions for Information Technology and Communications, Nov 2019, Bucharest, Romania. pp.125-141, ⟨10.1007/978-3-030-41025-4_9⟩
...
hal-02871839v1  Conference papers
Gabrielle de MicheliPierrick GaudryCécile Pierrot. Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
CRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.32-61
...
hal-02928953v1  Conference papers
Véronique CortierPierrick GaudryQuentin Yang. How to fake zero-knowledge proofs, again
E-Vote-Id 2020 - The International Conference for Electronic Voting, 2020, Bregenz / virtual, Austria
...
hal-01624662v1  Conference papers
Laurent GrémyAurore GuillevicFrançois MorainEmmanuel Thomé. Computing discrete logarithms in $GF(p^6)$
Selected Areas in Cryptography – SAC 2017, Aug 2017, Ottawa, Canada. pp.85-105, ⟨10.1007/978-3-319-72565-9_5⟩
...
hal-02962800v1  Conference papers
Youssef El HousniAurore Guillevic. Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
CANS 2020 - 19th International Conference on Cryptology and Network Security, Dec 2020, Vienna / Virtual, Austria. pp.259-279
...
hal-01266041v3  Conference papers
Jean-Guillaume DumasErich KaltofenEmmanuel ThoméGilles Villard. Linear Time Interactive Certificates for the Minimal Polynomial and the Determinant of a Sparse Matrix
ISSAC’2016, Proceedings of the 2016 ACM International Symposium on Symbolic and Algebraic Computation, Jul 2016, Waterloo, Canada. pp.199-206, ⟨10.1145/2930889.2930908⟩
...
hal-03446801v1  Reports
Véronique CortierAlexandre DebantPierrick Gaudry. A privacy attack on the Swiss Post e-voting system
[Research Report] Université de Lorraine, CNRS, Inria, LORIA. 2021
...
hal-01388109v1  Conference papers
Ninon EyrollesLouis GoubinMarion Videau. Defeating MBA-based Obfuscation
2nd International Workshop on Software PROtection, Oct 2016, Vienna, Austria. ⟨10.1145/2995306.2995308⟩
...
hal-01485412v1  Conference papers
Mohammad AlagganMathieu CuncheMarine Minier. Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors
3rd International Workshop on Security and Privacy Analytics (IWSPA 2017), Mar 2017, Scottsdale, United States
...
tel-01403849v2  Theses
Hugo Labrande. Explicit computation of the Abel-Jacobi map and its inverse
Computational Geometry [cs.CG]. Université de Lorraine, 2016. English. ⟨NNT : 2016LORR0142⟩
...
hal-01528272v1  Conference papers
David GeraultMarine MinierChristine Solnon. Using Constraint Programming to solve a Cryptanalytic Problem
IJCAI 2017 - International Joint Conference on Artificial Intelligence (Sister Conference Best Paper Track), Aug 2017, Melbourne, Australia. pp.4844-4848
...
hal-03220739v1  Conference papers
Cyrius NugierDiane Leblanc-AlbarelAgathe BlaiseSimon MassonPaul Huynh et al.  An Upcycling Tokenization Method for Credit Card Numbers
18th International Conference on Security and Cryptography (SECRYPT 2021), Jul 2021, Online, France
...
hal-00967742v5  Journal articles
Sorina IonicaEmmanuel Thomé. Isogeny graphs with maximal real multiplication
Journal of Number Theory, Elsevier, 2020, 207, pp.385-422. ⟨10.1016/j.jnt.2019.06.019⟩
...
hal-01593382v1  Conference papers
Marine MinierRaphael Phan. Tuple Cryptanalysis: Slicing and Fusing Multisets
Paradigms in Cryptology – Mycrypt 2016, Dec 2016, Kuala Lumpur, Malaysia. pp.294-320, ⟨10.1007/978-3-319-61273-7⟩
...
hal-03292416v1  Conference papers
Hamid BoukerrouGilles MillériouxMarine Minier. Hybrid architecture of LPV dynamical systems in the context of cybersecurity
4th IFAC Workshop on Linear Parameter Varying Systems, LPVS 2021, Jul 2021, Milano, Italy
...
hal-01299697v2  Journal articles
Masahiro IshiiJérémie DetreyPierrick GaudryAtsuo InomataKazutoshi Fujikawa. Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2017, 66 (12), pp.2019-2030. ⟨10.1109/TC.2017.2704082⟩
...
hal-01320496v2  Conference papers
Aurore GuillevicFrançois MorainEmmanuel Thomé. Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
Selected Areas in Cryptography -- SAC 2016, Aug 2016, St. Johns, Newfoundland, Canada. pp.559-578, ⟨10.1007/978-3-319-69453-5_30⟩
...
hal-03040548v2  Conference papers
Stéphanie DelaunePatrick DerbezPaul HuynhMarine MinierVictor Mollimard et al.  Efficient Methods to Search for Best Differential Characteristics on SKINNY
19th International Conference on Applied Cryptography and Network Security, Jun 2021, Kamakura, Japan. pp.184--207
...
hal-03408015v1  Book sections
Nigel SmartEmmanuel Thomé. History of Cryptographic Key Sizes
Computational Cryptography, In press