HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation


hal-00921494v1  Conference papers
Ayoub Otmani. On the Design of Code-Based Signatures
Code-based Cryptography Workshop - CBC 2012, May 2012, Lyngby, Denmark
hal-01288931v1  Conference papers
Jean-Charles FaugèreAyoub OtmaniLudovic PerretJean-Pierre Tillich. Algebraic Cryptanalysis of McEliece Variants with Compact Keys -- Toward a Complexity Analysis
Yet Another Conference on Cryptography, YACC 2010, Oct 2010, Porquerolles, France. pp.1-4
hal-01288929v1  Conference papers
Jean-Charles FaugèreAyoub OtmaniLudovic PerretJean-Pierre Tillich. A Distinguisher for High Rate McEliece Cryptosystem -- Extended Abstract
Yet Another Conference on Cryptography, YACC 2010, Oct 2010, Porquerolles, France. pp.1-4
hal-01288888v1  Conference papers
Jean-Charles FaugèreAyoub OtmaniLudovic PerretJean-Pierre Tillich. Algebraic Cryptanalysis of McEliece Variants with Compact Keys -- Toward a Complexity Analysis
SCC '10: the 2nd International Conference on Symbolic Computation and Cryptography, Jun 2010, London, United Kingdom. pp.45-55
...
inria-00596632v1  Conference papers
Jean-Charles FaugèreAyoub OtmaniLudovic PerretJean-Pierre Tillich. Algebraic Cryptanalysis of McEliece Variants with Compact Keys
Eurocrypt 2010 - 29th International Conference on Cryptology, May 2010, Monaco, Monaco. pp.279-298, ⟨10.1007/978-3-642-13190-5_14⟩
...
hal-00776068v1  Journal articles
Jean-Charles FaugèreValérie Gauthier-UmanaAyoub OtmaniLudovic PerretJean-Pierre Tillich. A Distinguisher for High Rate McEliece Cryptosystems
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2013, 59 (10), pp.6830-6844. ⟨10.1109/TIT.2013.2272036⟩
...
hal-00913500v1  Conference papers
Ayoub OtmaniJean-Pierre Tillich. An Efficient Attack on All Concrete KKS Proposals
Post-Quantum Cryptography - PQCrypto 2011, Nov 2011, Taipei, Taiwan. pp.98-116, ⟨10.1007/978-3-642-25405-5_7⟩
hal-01108324v1  Conference papers
María Naya-Plasencia. On impossible differential attacks
Early Symmetric Crypto - ESC 2015, Jan 2015, Clervaux, Luxembourg
hal-01092301v1  Conference papers
Virginie LallemandMaría Naya-Plasencia. Cryptanalysis of KLEIN
Fast Software Encryption - FSE 2014, 2014, London, United Kingdom
hal-01243392v1  Conference papers
Irene Márquez-CorbellaRuud Pellikaan. A characterization of MDS codes that have an error correcting pair
Applications of Computer Algebra ACA 2015, Jul 2015, Kalamata, Greece
inria-00509213v1  Directions of work or proceedings
Daniel AugotJean-Charles FaugèreLudovic Perret. Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics
Augot, Daniel; Faugère, Jean-Charles; Perret, Ludovic. France. 44 (12), Elsevier, pp.1605-1724, 2009, Journal of Symbolic Computation, ⟨10.1016/j.jsc.2008.11.004⟩
hal-01244619v1  Conference papers
Adrien HautevilleJean-Pierre Tillich. New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem
IEEE International Symposium on Information Theory - ISIT 2015, Jun 2015, Hong Kong, China. pp.2747-2751, ⟨10.1109/ISIT.2015.7282956⟩
...
hal-01241013v1  Conference papers
Nicky Mouha. The Design Space of Lightweight Cryptography
NIST Lightweight Cryptography Workshop 2015, Jul 2015, Gaithersburg, United States
hal-00859027v1  Conference papers
Anne Canteaut. Extended differential properties of cryptographic functions
The 11th International Conference on Finite Fields and their Applications - Fq11, Jul 2013, Magdeburg, Germany
...
hal-01081582v1  Conference papers
Mathieu CluzeauJean-Pierre Tillich. On the code reverse engineering problem
IEEE International Symposium on Information Theory ISIT 2008, Jul 2008, Toronto, Canada. pp.634 - 638, ⟨10.1109/ISIT.2008.4595063⟩
hal-01093333v1  Conference papers
Anne Canteaut. Cryptographic S-Boxes
Summer School on design and security of cryptographic algorithms and devices for real-world applications, Jun 2014, Sibenik, Croatia
hal-01108331v1  Conference papers
Achiya Bar-OnItai DinurOrr DunkelmanNathan KellerVirginie Lallemand et al.  Cryptanalysis of SP Networks with Partial Non-Linear Layers
Advances in Cryptology - Eurocrypt 2015, Eurocrypt 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2015, Sofia, Bulgaria. pp.315-342, ⟨10.1007/978-3-662-46800-5_13⟩
hal-01092270v1  Journal articles
Jérémy JeanMaría Naya-PlasenciaThomas Peyrin. Improved Cryptanalysis of AES-like Permutations
Journal of Cryptology, Springer Verlag, 2014, pp.772--798
hal-01237297v1  Reports
Anne CanteautSergiu CarpovCaroline FontaineTancrède LepointMaria Naya-Plasencia et al.  How to Compress Homomorphic Ciphertexts
[Research Report] 2015/113, IACR Cryptology ePrint Archive. 2015, pp.21
...
hal-01094201v1  Poster communications
Anthony LeverrierRaul Garcia-Patron. Does Boson Sampling need Fault-Tolerance?
Quantum Information Processing - QIP 2014, Feb 2014, Barcelone, Spain
...
hal-00927544v1  Conference papers
André ChaillouxGiannicola Scarpa. Parallel Repetition of Entangled Games with Exponential Decay via the Superposed Information Cost
QIP 2014 - Quantum Information Processing, Feb 2014, Barcelona, Spain
...
hal-01241075v1  Reports
Ritam BhaumikAvijit DuttaJian GuoJérémy JeanNicky Mouha et al.  More Rounds, Less Security?
[Research Report] Inria Paris Rocquencourt. 2015
...
hal-00870943v1  Conference papers
Paulo S. L. M. BarretoRichard LindnerRafael Misoczki. Monoidic Codes in Cryptography
Post-Quantum Cryptography - PQCrypto 2011, Nov 2011, Taipei, Taiwan. pp.179-199