Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Antoine Joux
@article{DBLP:journals/iacr/BuiCCGJ24, author = {Dung Bui and Eliana Carozza and Geoffroy Couteau and Dahmun Goudarzi and Antoine Joux}, title = {Short Signatures from Regular Syndrome Decoding, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2024}, url = {https://eprint.iacr.org/2024/252}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuiCCGJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxLW24, author = {Antoine Joux and Julian Loss and Benedikt Wagner}, title = {Kleptographic Attacks against Implicit Rejection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2024}, url = {https://eprint.iacr.org/2024/260}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JouxLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxKL24, author = {Antoine Joux and Hunter Kippen and Julian Loss}, title = {A Concrete Analysis of Wagner's k-List Algorithm over {\(\mathbb{Z}\)}\({}_{\mbox{p}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2024}, url = {https://eprint.iacr.org/2024/282}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JouxKL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasJ24, author = {Dipayan Das and Antoine Joux}, title = {Key Recovery Attack on the Partial Vandermonde Knapsack Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2024}, url = {https://eprint.iacr.org/2024/366}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DasJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FeneuilJR23, author = {Thibauld Feneuil and Antoine Joux and Matthieu Rivain}, title = {Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {563--608}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01116-1}, doi = {10.1007/S10623-022-01116-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FeneuilJR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DasJ23, author = {Dipayan Das and Antoine Joux}, editor = {Carmit Hazay and Martijn Stam}, title = {On the Hardness of the Finite Field Isomorphism Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {343--359}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_12}, doi = {10.1007/978-3-031-30589-4\_12}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DasJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CarozzaCJ23, author = {Eliana Carozza and Geoffroy Couteau and Antoine Joux}, editor = {Carmit Hazay and Martijn Stam}, title = {Short Signatures from Regular Syndrome Decoding in the Head}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {532--563}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_19}, doi = {10.1007/978-3-031-30589-4\_19}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CarozzaCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-08726, author = {Lo{\"{\i}}c Bidoux and Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and Thibauld Feneuil and Philippe Gaborit and Antoine Joux and Matthieu Rivain and Adrien Vin{\c{c}}otte}, title = {{RYDE:} {A} Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm}, journal = {CoRR}, volume = {abs/2307.08726}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.08726}, doi = {10.48550/ARXIV.2307.08726}, eprinttype = {arXiv}, eprint = {2307.08726}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-08726.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joux23, author = {Antoine Joux}, title = {{MPC} in the head for isomorphisms and group actions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2023}, url = {https://eprint.iacr.org/2023/664}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joux23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarozzaCJ23, author = {Eliana Carozza and Geoffroy Couteau and Antoine Joux}, title = {Short Signatures from Regular Syndrome Decoding in the Head}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1035}, year = {2023}, url = {https://eprint.iacr.org/2023/1035}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarozzaCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuthJ23, author = {Janik Huth and Antoine Joux}, title = {{MPC} in the head using the subfield bilinear collision problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1685}, year = {2023}, url = {https://eprint.iacr.org/2023/1685}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuthJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FeneuilJR22, author = {Thibauld Feneuil and Antoine Joux and Matthieu Rivain}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {541--572}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_19}, doi = {10.1007/978-3-031-15979-4\_19}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FeneuilJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esa/AllcockHJKS22, author = {Jonathan Allcock and Yassine Hamoudi and Antoine Joux and Felix Klingelh{\"{o}}fer and Miklos Santha}, editor = {Shiri Chechik and Gonzalo Navarro and Eva Rotenberg and Grzegorz Herman}, title = {Classical and Quantum Algorithms for Variants of Subset-Sum via Dynamic Programming}, booktitle = {30th Annual European Symposium on Algorithms, {ESA} 2022, September 5-9, 2022, Berlin/Potsdam, Germany}, series = {LIPIcs}, volume = {244}, pages = {6:1--6:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ESA.2022.6}, doi = {10.4230/LIPICS.ESA.2022.6}, timestamp = {Wed, 28 Feb 2024 00:16:41 +0100}, biburl = {https://dblp.org/rec/conf/esa/AllcockHJKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TangDJPQS22, author = {Gang Tang and Dung Hoang Duong and Antoine Joux and Thomas Plantard and Youming Qiao and Willy Susilo}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {582--612}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_21}, doi = {10.1007/978-3-031-07082-2\_21}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TangDJPQS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeneuilJR22, author = {Thibauld Feneuil and Antoine Joux and Matthieu Rivain}, title = {Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2022}, url = {https://eprint.iacr.org/2022/188}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FeneuilJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasJN22, author = {Dipayan Das and Antoine Joux and Anand Kumar Narayanan}, title = {Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2022}, url = {https://eprint.iacr.org/2022/205}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DasJN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangDJPQS22, author = {Gang Tang and Dung Hoang Duong and Antoine Joux and Thomas Plantard and Youming Qiao and Willy Susilo}, title = {Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2022}, url = {https://eprint.iacr.org/2022/267}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangDJPQS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001J22, author = {Dipayan Das and Antoine Joux}, title = {On the Hardness of the Finite Field Isomorphism Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {998}, year = {2022}, url = {https://eprint.iacr.org/2022/998}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001J22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-07059, author = {Jonathan Allcock and Yassine Hamoudi and Antoine Joux and Felix Klingelh{\"{o}}fer and Miklos Santha}, title = {Classical and quantum dynamic programming for Subset-Sum and variants}, journal = {CoRR}, volume = {abs/2111.07059}, year = {2021}, url = {https://arxiv.org/abs/2111.07059}, eprinttype = {arXiv}, eprint = {2111.07059}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-07059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrangerJ21, author = {Robert Granger and Antoine Joux}, title = {Computing Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1140}, year = {2021}, url = {https://eprint.iacr.org/2021/1140}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrangerJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeneuilJR21, author = {Thibauld Feneuil and Antoine Joux and Matthieu Rivain}, title = {Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1576}, year = {2021}, url = {https://eprint.iacr.org/2021/1576}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FeneuilJR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/EspitauJ20, author = {Thomas Espitau and Antoine Joux}, title = {Certified lattice reduction}, journal = {Adv. Math. Commun.}, volume = {14}, number = {1}, pages = {137--159}, year = {2020}, url = {https://doi.org/10.3934/amc.2020011}, doi = {10.3934/AMC.2020011}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/EspitauJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JouxP20, author = {Antoine Joux and Jacek Pomykala}, title = {Preface for the Number-Theoretic Methods in Cryptology conferences}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {393--396}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0111}, doi = {10.1515/JMC-2019-0111}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/JouxP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/EspitauJK20, author = {Thomas Espitau and Antoine Joux and Natalia Kharchenko}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {On a Dual/Hybrid Approach to Small Secret {LWE} - {A} Dual/Enumeration Technique for Learning with Errors and Application to Security Estimates of {FHE} Schemes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {440--462}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_20}, doi = {10.1007/978-3-030-65277-7\_20}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/EspitauJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauJK20, author = {Thomas Espitau and Antoine Joux and Natalia Kharchenko}, title = {On a hybrid approach to solve binary-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2020}, url = {https://eprint.iacr.org/2020/515}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/GololuJ19, author = {Faruk G{\"{o}}loglu and Antoine Joux}, title = {A simplified approach to rigorous degree 2 elimination in discrete logarithm algorithms}, journal = {Math. Comput.}, volume = {88}, number = {319}, pages = {2485--2496}, year = {2019}, url = {https://doi.org/10.1090/mcom/3404}, doi = {10.1090/MCOM/3404}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/GololuJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-11743, author = {Thomas Espitau and Antoine Joux}, title = {Certified lattice reduction}, journal = {CoRR}, volume = {abs/1905.11743}, year = {2019}, url = {http://arxiv.org/abs/1905.11743}, eprinttype = {arXiv}, eprint = {1905.11743}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-11743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-02689, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms}, journal = {CoRR}, volume = {abs/1907.02689}, year = {2019}, url = {http://arxiv.org/abs/1907.02689}, eprinttype = {arXiv}, eprint = {1907.02689}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-02689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-01662, author = {G{\'{a}}bor Ivanyos and Antoine Joux and Miklos Santha}, title = {Discrete logarithm and Diffie-Hellman problems in identity black-box groups}, journal = {CoRR}, volume = {abs/1911.01662}, year = {2019}, url = {http://arxiv.org/abs/1911.01662}, eprinttype = {arXiv}, eprint = {1911.01662}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-01662.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joux19, author = {Antoine Joux}, title = {Fully homomorphic encryption modulo Fermat numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2019}, url = {https://eprint.iacr.org/2019/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joux19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxP19, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {782}, year = {2019}, url = {https://eprint.iacr.org/2019/782}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxN19, author = {Antoine Joux and Anand Kumar Narayanan}, title = {Drinfeld modules are not for isogeny based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1329}, year = {2019}, url = {https://eprint.iacr.org/2019/1329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoudarziJR18, author = {Dahmun Goudarzi and Antoine Joux and Matthieu Rivain}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {How to Securely Compute with Noisy Leakage in Quasilinear Complexity}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {547--574}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_19}, doi = {10.1007/978-3-030-03329-3\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoudarziJR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalJPS18, author = {Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {A New Public-Key Cryptosystem via Mersenne Numbers}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {459--482}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_16}, doi = {10.1007/978-3-319-96878-0\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalJPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2018, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6}, doi = {10.1007/978-3-319-89339-6}, isbn = {978-3-319-89338-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GologluJ18, author = {Faruk G{\"{o}}loglu and Antoine Joux}, title = {A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2018}, url = {https://eprint.iacr.org/2018/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GologluJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nutmic/JouxV17, author = {Antoine Joux and Vanessa Vitse}, editor = {Jerzy Kaczorowski and Josef Pieprzyk and Jacek Pomykala}, title = {A Crossbred Algorithm for Solving Boolean Polynomial Systems}, booktitle = {Number-Theoretic Methods in Cryptology - First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10737}, pages = {3--21}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-76620-1\_1}, doi = {10.1007/978-3-319-76620-1\_1}, timestamp = {Sun, 02 Jun 2019 21:19:28 +0200}, biburl = {https://dblp.org/rec/conf/nutmic/JouxV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/Joux17, author = {Antoine Joux}, editor = {Heribert Vollmer and Brigitte Vall{\'{e}}e}, title = {Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances (Invited Talk)}, booktitle = {34th Symposium on Theoretical Aspects of Computer Science, {STACS} 2017, March 8-11, 2017, Hannover, Germany}, series = {LIPIcs}, volume = {66}, pages = {3:1--3:1}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.STACS.2017.3}, doi = {10.4230/LIPICS.STACS.2017.3}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/stacs/Joux17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV17, author = {Antoine Joux and Vanessa Vitse}, title = {A crossbred algorithm for solving Boolean polynomial systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2017}, url = {http://eprint.iacr.org/2017/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalJPS17, author = {Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha}, title = {A New Public-Key Cryptosystem via Mersenne Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2017}, url = {http://eprint.iacr.org/2017/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalJPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoudarziJR17, author = {Dahmun Goudarzi and Antoine Joux and Matthieu Rivain}, title = {How to Securely Compute with Noisy Leakage in Quasilinear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2017}, url = {http://eprint.iacr.org/2017/929}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoudarziJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JouxP16, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {Technical history of discrete logarithms in small characteristic finite fields - The road from subexponential to quasi-polynomial complexity}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {73--85}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0147-6}, doi = {10.1007/S10623-015-0147-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JouxP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/GelinJ16, author = {Alexandre G{\'{e}}lin and Antoine Joux}, title = {Reducing number field defining polynomials: an application to class group computations}, journal = {{LMS} J. Comput. Math.}, volume = {19}, number = {A}, pages = {315--331}, year = {2016}, url = {https://doi.org/10.1112/s1461157016000255}, doi = {10.1112/S1461157016000255}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmsjcm/GelinJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauJ16, author = {Thomas Espitau and Antoine Joux}, title = {Adaptive precision {LLL} and Potential-LLL reductions with Interval arithmetic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2016}, url = {http://eprint.iacr.org/2016/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GelinJ16, author = {Alexandre G{\'{e}}lin and Antoine Joux}, title = {Reducing number field defining polynomials: An application to class group computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2016}, url = {http://eprint.iacr.org/2016/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GelinJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamCJ15, author = {Eli Biham and Rafi Chen and Antoine Joux}, title = {Cryptanalysis of {SHA-0} and Reduced {SHA-1}}, journal = {J. Cryptol.}, volume = {28}, number = {1}, pages = {110--160}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9179-8}, doi = {10.1007/S00145-014-9179-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerGJ15, author = {Anja Becker and Nicolas Gama and Antoine Joux}, title = {Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2015}, url = {http://eprint.iacr.org/2015/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerGJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxP15, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {Nearly Sparse Linear Algebra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2015}, url = {http://eprint.iacr.org/2015/930}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/GutierrezIJ14, author = {Jaime Gutierrez and {\'{A}}lvar Ibeas and Antoine Joux}, title = {Recovering a sum of two squares decomposition}, journal = {J. Symb. Comput.}, volume = {64}, pages = {16--21}, year = {2014}, url = {https://doi.org/10.1016/j.jsc.2013.12.003}, doi = {10.1016/J.JSC.2013.12.003}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/GutierrezIJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/0001GJ14, author = {Anja Becker and Nicolas Gama and Antoine Joux}, title = {A sieve algorithm based on overlattices}, journal = {{LMS} J. Comput. Math.}, volume = {17}, number = {Theory}, pages = {49--70}, year = {2014}, url = {https://doi.org/10.1112/s1461157014000229}, doi = {10.1112/S1461157014000229}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmsjcm/0001GJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JouxP14, author = {Antoine Joux and C{\'{e}}cile Pierrot}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {378--397}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_20}, doi = {10.1007/978-3-662-45611-8\_20}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/JouxP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FouqueJM14, author = {Pierre{-}Alain Fouque and Antoine Joux and Chrysanthi Mavromati}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and {PRINCE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {420--438}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_22}, doi = {10.1007/978-3-662-45611-8\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FouqueJM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarbulescuGJT14, author = {Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'{e}}}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_1}, doi = {10.1007/978-3-642-55220-5\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarbulescuGJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaugereHJRV14, author = {Jean{-}Charles Faug{\`{e}}re and Louise Huot and Antoine Joux and Gu{\'{e}}na{\"{e}}l Renault and Vanessa Vitse}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {40--57}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_3}, doi = {10.1007/978-3-642-55220-5\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaugereHJRV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/JouxOP14, author = {Antoine Joux and Andrew M. Odlyzko and C{\'{e}}cile Pierrot}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {The Past, Evolving Present, and Future of the Discrete Logarithm}, booktitle = {Open Problems in Mathematics and Computational Science}, pages = {5--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10683-0\_2}, doi = {10.1007/978-3-319-10683-0\_2}, timestamp = {Tue, 16 May 2017 14:01:44 +0200}, biburl = {https://dblp.org/rec/books/sp/14/JouxOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2014, editor = {Antoine Joux and Amr M. Youssef}, title = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4}, doi = {10.1007/978-3-319-13051-4}, isbn = {978-3-319-13050-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxP14, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {924}, year = {2014}, url = {http://eprint.iacr.org/2014/924}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JouxV13, author = {Antoine Joux and Vanessa Vitse}, title = {Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on {\textdollar}E({\textbackslash}mathbb\{F\}{\_}\{q{\^{}}\{5\}\}){\textdollar}}, journal = {J. Cryptol.}, volume = {26}, number = {1}, pages = {119--143}, year = {2013}, url = {https://doi.org/10.1007/s00145-011-9116-z}, doi = {10.1007/S00145-011-9116-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JouxV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/IonicaJ13, author = {Sorina Ionica and Antoine Joux}, title = {Pairing the volcano}, journal = {Math. Comput.}, volume = {82}, number = {281}, pages = {581--603}, year = {2013}, url = {https://doi.org/10.1090/S0025-5718-2012-02622-6}, doi = {10.1090/S0025-5718-2012-02622-6}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/IonicaJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FouqueJT13, author = {Pierre{-}Alain Fouque and Antoine Joux and Mehdi Tibouchi}, editor = {Colin Boyd and Leonie Simpson}, title = {Injective Encodings to Elliptic Curves}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {203--218}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_14}, doi = {10.1007/978-3-642-39059-3\_14}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FouqueJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Joux13, author = {Antoine Joux}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {177--193}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_11}, doi = {10.1007/978-3-642-38348-9\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Joux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JouxR13, author = {Antoine Joux and Antoine Rojat}, editor = {Yvo Desmedt}, title = {Security Ranking Among Assumptions Within the \emph{Uber Assumption} Framework}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {391--406}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_28}, doi = {10.1007/978-3-319-27659-5\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/JouxR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/JouxP13, author = {Antoine Joux and C{\'{e}}cile Pierrot}, editor = {Zhenfu Cao and Fangguo Zhang}, title = {The Special Number Field Sieve in {\(\mathbb{F}\)}\({}_{\mbox{p\({}^{\mbox{n}}\)}}\) - Application to Pairing-Friendly Constructions}, booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, pages = {45--61}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04873-4\_3}, doi = {10.1007/978-3-319-04873-4\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pairing/JouxP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Joux13, author = {Antoine Joux}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {A New Index Calculus Algorithm with Complexity {\textdollar}{\textdollar}L(1/4+o(1)){\textdollar}{\textdollar} in Small Characteristic}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {355--379}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_18}, doi = {10.1007/978-3-662-43414-7\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/Joux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BarbulescuGJT13, author = {Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'{e}}}, title = {A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic}, journal = {CoRR}, volume = {abs/1306.4244}, year = {2013}, url = {http://arxiv.org/abs/1306.4244}, eprinttype = {arXiv}, eprint = {1306.4244}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/BarbulescuGJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joux13, author = {Antoine Joux}, title = {A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2013}, url = {http://eprint.iacr.org/2013/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxR13, author = {Antoine Joux and Antoine Rojat}, title = {On Diffie-Hellman - like Security Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2013}, url = {http://eprint.iacr.org/2013/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueJT13, author = {Pierre{-}Alain Fouque and Antoine Joux and Mehdi Tibouchi}, title = {Injective Encoding to Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2013}, url = {http://eprint.iacr.org/2013/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuGJT13, author = {Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'{e}}}, title = {A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2013}, url = {http://eprint.iacr.org/2013/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuGJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxP13, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {The Special Number Field Sieve in F\({}_{\mbox{p\({}^{\mbox{n}}\)}}\), Application to Pairing-Friendly Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2013}, url = {http://eprint.iacr.org/2013/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerGJ13, author = {Anja Becker and Nicolas Gama and Antoine Joux}, title = {Solving shortest and closest vector problems: The decomposition approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2013}, url = {http://eprint.iacr.org/2013/685}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerGJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueJM13, author = {Pierre{-}Alain Fouque and Antoine Joux and Chrysanthi Mavromati}, title = {Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {761}, year = {2013}, url = {http://eprint.iacr.org/2013/761}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueJM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BouillaguetFJT12, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Antoine Joux and Joana Treger}, title = {A family of weak keys in {HFE} and the corresponding practical key-recovery}, journal = {J. Math. Cryptol.}, volume = {5}, number = {3-4}, pages = {247--275}, year = {2012}, url = {https://doi.org/10.1515/jmc.2011.012}, doi = {10.1515/JMC.2011.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BouillaguetFJT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MedwedSJ12, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert and Antoine Joux}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {193--212}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_12}, doi = {10.1007/978-3-642-33027-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MedwedSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Joux12, author = {Antoine Joux}, editor = {David Pointcheval and Thomas Johansson}, title = {A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {1--7}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_1}, doi = {10.1007/978-3-642-29011-4\_1}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Joux12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JouxV12, author = {Antoine Joux and Vanessa Vitse}, editor = {David Pointcheval and Thomas Johansson}, title = {Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over {\textdollar}{\textbackslash}mathbb\{F\}{\_}\{p{\^{}}6\}{\textdollar}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {9--26}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_3}, doi = {10.1007/978-3-642-29011-4\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JouxV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeckerJMM12, author = {Anja Becker and Antoine Joux and Alexander May and Alexander Meurer}, editor = {David Pointcheval and Thomas Johansson}, title = {Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {520--536}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_31}, doi = {10.1007/978-3-642-29011-4\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeckerJMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerJMM12, author = {Anja Becker and Antoine Joux and Alexander May and Alexander Meurer}, title = {Decoding Random Binary Linear Codes in 2\({}^{\mbox{n/20}}\): How 1+1=0 Improves Information Set Decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2012}, url = {http://eprint.iacr.org/2012/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerJMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joux12, author = {Antoine Joux}, title = {Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2012}, url = {http://eprint.iacr.org/2012/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joux12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JouxV11, author = {Antoine Joux and Vanessa Vitse}, editor = {Aggelos Kiayias}, title = {A Variant of the {F4} Algorithm}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {356--375}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_23}, doi = {10.1007/978-3-642-19074-2\_23}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/JouxV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeckerCJ11, author = {Anja Becker and Jean{-}S{\'{e}}bastien Coron and Antoine Joux}, editor = {Kenneth G. Paterson}, title = {Improved Generic Algorithms for Hard Knapsacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {364--385}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_21}, doi = {10.1007/978-3-642-20465-4\_21}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeckerCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronJMNT11, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {147--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_9}, doi = {10.1007/978-3-642-19379-8\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CoronJMNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2011, editor = {Antoine Joux}, title = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9}, doi = {10.1007/978-3-642-21702-9}, isbn = {978-3-642-21701-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/JouxL11, author = {Antoine Joux and Reynald Lercier}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Number Field Sieve for the {DLP}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {867--873}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_834}, doi = {10.1007/978-1-4419-5906-5\_834}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/JouxL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV11, author = {Antoine Joux and Vanessa Vitse}, title = {Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over F\({}_{\mbox{p\({}^{\mbox{6}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2011}, url = {http://eprint.iacr.org/2011/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerCJ11, author = {Anja Becker and Jean{-}S{\'{e}}bastien Coron and Antoine Joux}, title = {Improved Generic Algorithms for Hard Knapsacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2011}, url = {http://eprint.iacr.org/2011/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Joux10, author = {Antoine Joux}, title = {On the security of blockwise secure modes of operation beyond the birthday bound}, journal = {{IEEE} Trans. Inf. Theory}, volume = {56}, number = {3}, pages = {1239--1246}, year = {2010}, url = {https://doi.org/10.1109/TIT.2009.2039164}, doi = {10.1109/TIT.2009.2039164}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Joux10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/IonicaJ10, author = {Sorina Ionica and Antoine Joux}, editor = {Guillaume Hanrot and Fran{\c{c}}ois Morain and Emmanuel Thom{\'{e}}}, title = {Pairing the Volcano}, booktitle = {Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6197}, pages = {201--218}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14518-6\_18}, doi = {10.1007/978-3-642-14518-6\_18}, timestamp = {Thu, 14 Oct 2021 10:35:26 +0200}, biburl = {https://dblp.org/rec/conf/ants/IonicaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Howgrave-GrahamJ10, author = {Nick Howgrave{-}Graham and Antoine Joux}, editor = {Henri Gilbert}, title = {New Generic Algorithms for Hard Knapsacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {235--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_12}, doi = {10.1007/978-3-642-13190-5\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Howgrave-GrahamJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/FaugereJPT10, author = {Jean{-}Charles Faug{\`{e}}re and Antoine Joux and Ludovic Perret and Joana Treger}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Cryptanalysis of the Hidden Matrix Cryptosystem}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {241--254}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_15}, doi = {10.1007/978-3-642-14712-8\_15}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/FaugereJPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/IonicaJ10, author = {Sorina Ionica and Antoine Joux}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {435--449}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_27}, doi = {10.1007/978-3-642-17455-1\_27}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/IonicaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV10, author = {Antoine Joux and Vanessa Vitse}, title = {Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on E(F\({}_{\mbox{q\({}^{\mbox{5}}\)}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2010}, url = {http://eprint.iacr.org/2010/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV10a, author = {Antoine Joux and Vanessa Vitse}, title = {A variant of the {F4} algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2010}, url = {http://eprint.iacr.org/2010/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Howgrave-GrahamJ10, author = {Nick Howgrave{-}Graham and Antoine Joux}, title = {New generic algorithms for hard knapsacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2010}, url = {http://eprint.iacr.org/2010/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Howgrave-GrahamJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonicaJ10, author = {Sorina Ionica and Antoine Joux}, title = {Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2010}, url = {http://eprint.iacr.org/2010/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonicaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJMNT10, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi}, title = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2010}, url = {http://eprint.iacr.org/2010/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJMNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JouxL09, author = {Antoine Joux and Stefan Lucks}, editor = {Mitsuru Matsui}, title = {Improved Generic Algorithms for 3-Collisions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {347--363}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_21}, doi = {10.1007/978-3-642-10366-7\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JouxL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CastagnosJLN09, author = {Guilhem Castagnos and Antoine Joux and Fabien Laguillaumie and Phong Q. Nguyen}, editor = {Mitsuru Matsui}, title = {Factoring \emph{pq}\({}^{\mbox{2}}\) with Quadratic Forms: Nice Cryptanalyses}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {469--486}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_28}, doi = {10.1007/978-3-642-10366-7\_28}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CastagnosJLN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronJKNP09, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, editor = {Christophe Clavier and Kris Gaj}, title = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {444--456}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_31}, doi = {10.1007/978-3-642-04138-9\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/JouxLNT09, author = {Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom{\'{e}}}, editor = {Matthew Geoffrey Parker}, title = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {351--367}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_21}, doi = {10.1007/978-3-642-10868-6\_21}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/JouxLNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/Joux09, author = {Antoine Joux}, editor = {Marc Joye and Gregory Neven}, title = {Introduction to Identity-Based Cryptography}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {1--12}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-1}, doi = {10.3233/978-1-58603-947-9-1}, timestamp = {Thu, 11 Apr 2019 14:31:06 +0200}, biburl = {https://dblp.org/rec/series/ciss/Joux09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2009, editor = {Antoine Joux}, title = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9}, doi = {10.1007/978-3-642-01001-9}, isbn = {978-3-642-01000-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDFJ09, author = {Charles Bouillaguet and Orr Dunkelman and Pierre{-}Alain Fouque and Antoine Joux}, title = {On the Security of Iterated Hashing based on Forgery-resistant Compression Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2009}, url = {http://eprint.iacr.org/2009/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxL09, author = {Antoine Joux and Stefan Lucks}, title = {Improved generic algorithms for 3-collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2009}, url = {http://eprint.iacr.org/2009/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJKNP09, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, title = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2009}, url = {http://eprint.iacr.org/2009/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJKNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetFJT09, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Antoine Joux and Joana Treger}, title = {A Family of Weak Keys in {HFE} (and the Corresponding Practical Key-Recovery)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2009}, url = {http://eprint.iacr.org/2009/619}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetFJT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DelaunayJ08, author = {Pascal Delaunay and Antoine Joux}, editor = {Serge Vaudenay}, title = {Yet Another Attack on Vest}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {221--235}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_15}, doi = {10.1007/978-3-540-68164-9\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/DelaunayJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/IonicaJ08, author = {Sorina Ionica and Antoine Joux}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {Another Approach to Pairing Computation in Edwards Coordinates}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {400--413}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_31}, doi = {10.1007/978-3-540-89754-5\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/IonicaJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BerbainGJ08, author = {C{\^{o}}me Berbain and Henri Gilbert and Antoine Joux}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {184--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_12}, doi = {10.1007/978-3-642-04159-4\_12}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BerbainGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxLNT08, author = {Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom{\'{e}}}, title = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2008}, url = {http://eprint.iacr.org/2008/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxLNT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonicaJ08, author = {Sorina Ionica and Antoine Joux}, title = {Another approach to pairing computation in Edwards coordinates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2008}, url = {http://eprint.iacr.org/2008/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonicaJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JouxNT07, author = {Antoine Joux and David Naccache and Emmanuel Thom{\'{e}}}, editor = {Kaoru Kurosawa}, title = {When \emph{e}-th Roots Become Easier Than Factoring}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {13--28}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_2}, doi = {10.1007/978-3-540-76900-2\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/JouxNT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JouxP07, author = {Antoine Joux and Thomas Peyrin}, editor = {Alfred Menezes}, title = {Hash Functions and the (Amplified) Boomerang Attack}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {244--263}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_14}, doi = {10.1007/978-3-540-74143-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JouxP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BauerJ07, author = {Aur{\'{e}}lie Bauer and Antoine Joux}, editor = {Moni Naor}, title = {Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {361--378}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_21}, doi = {10.1007/978-3-540-72540-4\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BauerJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxR07, author = {Antoine Joux and Jean{-}Ren{\'{e}} Reinhard}, editor = {Alex Biryukov}, title = {Overtaking {VEST}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {58--72}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_4}, doi = {10.1007/978-3-540-74619-5\_4}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/JouxR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxNT07, author = {Antoine Joux and David Naccache and Emmanuel Thom{\'{e}}}, title = {When e-th Roots Become Easier Than Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2007}, url = {http://eprint.iacr.org/2007/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxNT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JouxLSV06, author = {Antoine Joux and Reynald Lercier and Nigel P. Smart and Frederik Vercauteren}, editor = {Cynthia Dwork}, title = {The Number Field Sieve in the Medium Prime Case}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {326--344}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_19}, doi = {10.1007/11818175\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JouxLSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GranboulanJS06, author = {Louis Granboulan and Antoine Joux and Jacques Stern}, editor = {Cynthia Dwork}, title = {Inverting {HFE} Is Quasipolynomial}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {345--356}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_20}, doi = {10.1007/11818175\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GranboulanJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JouxL06, author = {Antoine Joux and Reynald Lercier}, editor = {Serge Vaudenay}, title = {The Function Field Sieve in the Medium Prime Case}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {254--270}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_16}, doi = {10.1007/11761679\_16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JouxL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxM06, author = {Antoine Joux and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Matthew J. B. Robshaw}, title = {Chosen-Ciphertext Attacks Against {MOSQUITO}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {390--404}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_25}, doi = {10.1007/11799313\_25}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/JouxD06, author = {Antoine Joux and Pascal Delaunay}, editor = {Rana Barua and Tanja Lange}, title = {Galois LFSR, Embedded Devices and Side Channel Weaknesses}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {436--451}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_31}, doi = {10.1007/11941378\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/JouxD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxL06, author = {Antoine Joux and Reynald Lercier}, title = {Counting points on elliptic curves in medium characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2006}, url = {http://eprint.iacr.org/2006/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamCJCLJ05, author = {Eli Biham and Rafi Chen and Antoine Joux and Patrick Carribault and Christophe Lemuet and William Jalby}, editor = {Ronald Cramer}, title = {Collisions of {SHA-0} and Reduced {SHA-1}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {36--57}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_3}, doi = {10.1007/11426639\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamCJCLJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxM05, author = {Antoine Joux and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Henri Gilbert and Helena Handschuh}, title = {Two Attacks Against the {HBB} Stream Cipher}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {330--341}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_22}, doi = {10.1007/11502760\_22}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JouxKMR05, author = {Antoine Joux and S{\'{e}}bastien Kunz{-}Jacques and Fr{\'{e}}d{\'{e}}ric Muller and Pierre{-}Michel Ricordel}, editor = {Serge Vaudenay}, title = {Cryptanalysis of the Tractable Rational Map Cryptosystem}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {258--274}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_18}, doi = {10.1007/978-3-540-30580-4\_18}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JouxKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Joux04, author = {Antoine Joux}, title = {A One Round Protocol for Tripartite Diffie-Hellman}, journal = {J. Cryptol.}, volume = {17}, number = {4}, pages = {263--276}, year = {2004}, url = {https://doi.org/10.1007/s00145-004-0312-y}, doi = {10.1007/S00145-004-0312-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Joux04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Joux04, author = {Antoine Joux}, editor = {Matthew K. Franklin}, title = {Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {306--316}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_19}, doi = {10.1007/978-3-540-28628-8\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Joux04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FouqueJP04, author = {Pierre{-}Alain Fouque and Antoine Joux and Guillaume Poupard}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {212--226}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_15}, doi = {10.1007/978-3-540-30564-4\_15}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/FouqueJP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJ04, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux}, title = {Cryptanalysis of a Provably Secure Cryptographic Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2004}, url = {http://eprint.iacr.org/2004/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JouxN03, author = {Antoine Joux and Kim Nguyen}, title = {Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups}, journal = {J. Cryptol.}, volume = {16}, number = {4}, pages = {239--247}, year = {2003}, url = {https://doi.org/10.1007/s00145-003-0052-4}, doi = {10.1007/S00145-003-0052-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JouxN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/JouxL03, author = {Antoine Joux and Reynald Lercier}, title = {Improvements to the general number field sieve for discrete logarithms in prime fields. {A} comparison with the gaussian integer method}, journal = {Math. Comput.}, volume = {72}, number = {242}, pages = {953--967}, year = {2003}, url = {https://doi.org/10.1090/S0025-5718-02-01482-5}, doi = {10.1090/S0025-5718-02-01482-5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/JouxL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FaugereJ03, author = {Jean{-}Charles Faug{\`{e}}re and Antoine Joux}, editor = {Dan Boneh}, title = {Algebraic Cryptanalysis of Hidden Field Equation {(HFE)} Cryptosystems Using Gr{\"{o}}bner Bases}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {44--60}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_3}, doi = {10.1007/978-3-540-45146-4\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FaugereJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Joux03, author = {Antoine Joux}, editor = {Eli Biham}, title = {Cryptanalysis of the {EMD} Mode of Operation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {1--16}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_1}, doi = {10.1007/3-540-39200-9\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Joux03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxM03, author = {Antoine Joux and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Thomas Johansson}, title = {Loosening the {KNOT}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {87--99}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_8}, doi = {10.1007/978-3-540-39887-5\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxPS03, author = {Antoine Joux and Guillaume Poupard and Jacques Stern}, editor = {Thomas Johansson}, title = {New Attacks against Standardized MACs}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {170--181}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_13}, doi = {10.1007/978-3-540-39887-5\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FouqueJMV03, author = {Pierre{-}Alain Fouque and Antoine Joux and Gwena{\"{e}}lle Martinet and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Authenticated On-Line Encryption}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {145--159}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_11}, doi = {10.1007/978-3-540-24654-1\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/FouqueJMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JouxM03, author = {Antoine Joux and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {A Chosen {IV} Attack Against Turing}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {194--207}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_14}, doi = {10.1007/978-3-540-24654-1\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JouxM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/Joux02, author = {Antoine Joux}, editor = {Claus Fieker and David R. Kohel}, title = {The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems}, booktitle = {Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2369}, pages = {20--32}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45455-1\_3}, doi = {10.1007/3-540-45455-1\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/Joux02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/JouxL02, author = {Antoine Joux and Reynald Lercier}, editor = {Claus Fieker and David R. Kohel}, title = {The Function Field Sieve Is Quite Special}, booktitle = {Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2369}, pages = {431--445}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45455-1\_34}, doi = {10.1007/3-540-45455-1\_34}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ants/JouxL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JouxMV02, author = {Antoine Joux and Gwena{\"{e}}lle Martinet and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Moti Yung}, title = {Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, {IACBC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {17--30}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_2}, doi = {10.1007/3-540-45708-9\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JouxMV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChoseJM02, author = {Philippe Chose and Antoine Joux and Michel Mitton}, editor = {Lars R. Knudsen}, title = {Fast Correlation Attacks: An Algorithmic Point of View}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {209--221}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_14}, doi = {10.1007/3-540-46035-7\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChoseJM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JaulmesJV02, author = {{\'{E}}liane Jaulmes and Antoine Joux and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Joan Daemen and Vincent Rijmen}, title = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox Limit: {A} New Construction}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {237--251}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_19}, doi = {10.1007/3-540-45661-9\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JaulmesJV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/JouxL01, author = {Antoine Joux and Reynald Lercier}, title = {"Chinese {\&} Match", an alternative to Atkin's "Match and Sort" method used in the {SEA} algorithm}, journal = {Math. Comput.}, volume = {70}, number = {234}, pages = {827--836}, year = {2001}, url = {https://doi.org/10.1090/S0025-5718-00-01200-X}, doi = {10.1090/S0025-5718-00-01200-X}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/JouxL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JaulmesJ01, author = {{\'{E}}liane Jaulmes and Antoine Joux}, editor = {Kwangjo Kim}, title = {Cryptanalysis of {PKP:} {A} New Approach}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {165--172}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_12}, doi = {10.1007/3-540-44586-2\_12}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JaulmesJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxN01, author = {Antoine Joux and Kim Nguyen}, title = {Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2001}, url = {http://eprint.iacr.org/2001/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaulmesJV01, author = {{\'{E}}liane Jaulmes and Antoine Joux and Fr{\'{e}}d{\'{e}}ric Valette}, title = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox Limit - {A} New Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2001}, url = {http://eprint.iacr.org/2001/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaulmesJV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/Joux00, author = {Antoine Joux}, editor = {Wieb Bosma}, title = {A One Round Protocol for Tripartite Diffie-Hellman}, booktitle = {Algorithmic Number Theory, 4th International Symposium, ANTS-IV, Leiden, The Netherlands, July 2-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1838}, pages = {385--394}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722028\_23}, doi = {10.1007/10722028\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/Joux00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonehJN00, author = {Dan Boneh and Antoine Joux and Phong Q. Nguyen}, editor = {Tatsuaki Okamoto}, title = {Why Textbook ElGamal and {RSA} Encryption Are Insecure}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {30--43}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_3}, doi = {10.1007/3-540-44448-3\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonehJN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JaulmesJ00, author = {{\'{E}}liane Jaulmes and Antoine Joux}, editor = {Mihir Bellare}, title = {A Chosen-Ciphertext Attack against {NTRU}}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {20--35}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_2}, doi = {10.1007/3-540-44598-6\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JaulmesJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaulmesJ00, author = {{\'{E}}liane Jaulmes and Antoine Joux}, editor = {Bart Preneel}, title = {A {NICE} Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {382--391}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_26}, doi = {10.1007/3-540-45539-6\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaulmesJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GilbertHJV00, author = {Henri Gilbert and Helena Handschuh and Antoine Joux and Serge Vaudenay}, editor = {Bruce Schneier}, title = {A Statistical Attack on {RC6}}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {64--74}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_5}, doi = {10.1007/3-540-44706-7\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/GilbertHJV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JouxS98, author = {Antoine Joux and Jacques Stern}, title = {Lattice Reduction: {A} Toolbox for the Cryptanalyst}, journal = {J. Cryptol.}, volume = {11}, number = {3}, pages = {161--185}, year = {1998}, url = {https://doi.org/10.1007/s001459900042}, doi = {10.1007/S001459900042}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JouxS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rsa/FriedmanJRST98, author = {Joel Friedman and Antoine Joux and Yuval Roichman and Jacques Stern and Jean{-}Pierre Tillich}, title = {The action of a few permutations on r-tuples is quickly transitive}, journal = {Random Struct. Algorithms}, volume = {12}, number = {4}, pages = {335--350}, year = {1998}, url = {https://doi.org/10.1002/(SICI)1098-2418(199807)12:4\&\#60;335::AID-RSA2\&\#62;3.0.CO;2-U}, doi = {10.1002/(SICI)1098-2418(199807)12:4\&\#60;335::AID-RSA2\&\#62;3.0.CO;2-U}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rsa/FriedmanJRST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChabaudJ98, author = {Florent Chabaud and Antoine Joux}, editor = {Hugo Krawczyk}, title = {Differential Collisions in {SHA-0}}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {56--71}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055720}, doi = {10.1007/BFB0055720}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChabaudJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/FriedmanJRST96, author = {Joel Friedman and Antoine Joux and Yuval Roichman and Jacques Stern and Jean{-}Pierre Tillich}, editor = {Claude Puech and R{\"{u}}diger Reischuk}, title = {The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography}, booktitle = {{STACS} 96, 13th Annual Symposium on Theoretical Aspects of Computer Science, Grenoble, France, February 22-24, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1046}, pages = {375--386}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60922-9\_31}, doi = {10.1007/3-540-60922-9\_31}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stacs/FriedmanJRST96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JouxG94, author = {Antoine Joux and Louis Granboulan}, editor = {Alfredo De Santis}, title = {A Practical Attack against Knapsack based Hash Functions (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {58--66}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053424}, doi = {10.1007/BFB0053424}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JouxG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/CosterJLOSS92, author = {Matthijs J. Coster and Antoine Joux and Brian A. LaMacchia and Andrew M. Odlyzko and Claus{-}Peter Schnorr and Jacques Stern}, title = {Improved Low-Density Subset Sum Algorithms}, journal = {Comput. Complex.}, volume = {2}, pages = {111--128}, year = {1992}, url = {https://doi.org/10.1007/BF01201999}, doi = {10.1007/BF01201999}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/CosterJLOSS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JouxS91, author = {Antoine Joux and Jacques Stern}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Cryptanalysis of Another Knapsack Cryptosystem}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {470--476}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_40}, doi = {10.1007/3-540-57332-1\_40}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JouxS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CheeJS91, author = {Yeow Meng Chee and Antoine Joux and Jacques Stern}, editor = {Joan Feigenbaum}, title = {The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {204--212}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_15}, doi = {10.1007/3-540-46766-1\_15}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CheeJS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/JouxS91, author = {Antoine Joux and Jacques Stern}, editor = {Lothar Budach}, title = {Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems}, booktitle = {Fundamentals of Computation Theory, 8th International Symposium, {FCT} '91, Gosen, Germany, September 9-13, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {529}, pages = {258--264}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54458-5\_70}, doi = {10.1007/3-540-54458-5\_70}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fct/JouxS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.