BibTeX records: Antoine Joux

download as .bib file

@article{DBLP:journals/iacr/BuiCCGJ24,
  author       = {Dung Bui and
                  Eliana Carozza and
                  Geoffroy Couteau and
                  Dahmun Goudarzi and
                  Antoine Joux},
  title        = {Short Signatures from Regular Syndrome Decoding, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/252},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuiCCGJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxLW24,
  author       = {Antoine Joux and
                  Julian Loss and
                  Benedikt Wagner},
  title        = {Kleptographic Attacks against Implicit Rejection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/260},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxKL24,
  author       = {Antoine Joux and
                  Hunter Kippen and
                  Julian Loss},
  title        = {A Concrete Analysis of Wagner's k-List Algorithm over {\(\mathbb{Z}\)}\({}_{\mbox{p}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/282},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxKL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasJ24,
  author       = {Dipayan Das and
                  Antoine Joux},
  title        = {Key Recovery Attack on the Partial Vandermonde Knapsack Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/366},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DasJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FeneuilJR23,
  author       = {Thibauld Feneuil and
                  Antoine Joux and
                  Matthieu Rivain},
  title        = {Shared permutation for syndrome decoding: new zero-knowledge protocol
                  and code-based signature},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {563--608},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01116-1},
  doi          = {10.1007/S10623-022-01116-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FeneuilJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DasJ23,
  author       = {Dipayan Das and
                  Antoine Joux},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {On the Hardness of the Finite Field Isomorphism Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {343--359},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_12},
  doi          = {10.1007/978-3-031-30589-4\_12},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DasJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CarozzaCJ23,
  author       = {Eliana Carozza and
                  Geoffroy Couteau and
                  Antoine Joux},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Short Signatures from Regular Syndrome Decoding in the Head},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {532--563},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_19},
  doi          = {10.1007/978-3-031-30589-4\_19},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CarozzaCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-08726,
  author       = {Lo{\"{\i}}c Bidoux and
                  Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and
                  Thibauld Feneuil and
                  Philippe Gaborit and
                  Antoine Joux and
                  Matthieu Rivain and
                  Adrien Vin{\c{c}}otte},
  title        = {{RYDE:} {A} Digital Signature Scheme based on Rank-Syndrome-Decoding
                  Problem with MPCitH Paradigm},
  journal      = {CoRR},
  volume       = {abs/2307.08726},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.08726},
  doi          = {10.48550/ARXIV.2307.08726},
  eprinttype    = {arXiv},
  eprint       = {2307.08726},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-08726.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joux23,
  author       = {Antoine Joux},
  title        = {{MPC} in the head for isomorphisms and group actions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/664},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joux23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarozzaCJ23,
  author       = {Eliana Carozza and
                  Geoffroy Couteau and
                  Antoine Joux},
  title        = {Short Signatures from Regular Syndrome Decoding in the Head},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1035},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1035},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarozzaCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuthJ23,
  author       = {Janik Huth and
                  Antoine Joux},
  title        = {{MPC} in the head using the subfield bilinear collision problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1685},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1685},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuthJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FeneuilJR22,
  author       = {Thibauld Feneuil and
                  Antoine Joux and
                  Matthieu Rivain},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {541--572},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_19},
  doi          = {10.1007/978-3-031-15979-4\_19},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FeneuilJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/AllcockHJKS22,
  author       = {Jonathan Allcock and
                  Yassine Hamoudi and
                  Antoine Joux and
                  Felix Klingelh{\"{o}}fer and
                  Miklos Santha},
  editor       = {Shiri Chechik and
                  Gonzalo Navarro and
                  Eva Rotenberg and
                  Grzegorz Herman},
  title        = {Classical and Quantum Algorithms for Variants of Subset-Sum via Dynamic
                  Programming},
  booktitle    = {30th Annual European Symposium on Algorithms, {ESA} 2022, September
                  5-9, 2022, Berlin/Potsdam, Germany},
  series       = {LIPIcs},
  volume       = {244},
  pages        = {6:1--6:18},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ESA.2022.6},
  doi          = {10.4230/LIPICS.ESA.2022.6},
  timestamp    = {Wed, 28 Feb 2024 00:16:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esa/AllcockHJKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/TangDJPQS22,
  author       = {Gang Tang and
                  Dung Hoang Duong and
                  Antoine Joux and
                  Thomas Plantard and
                  Youming Qiao and
                  Willy Susilo},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Practical Post-Quantum Signature Schemes from Isomorphism Problems
                  of Trilinear Forms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {582--612},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_21},
  doi          = {10.1007/978-3-031-07082-2\_21},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/TangDJPQS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeneuilJR22,
  author       = {Thibauld Feneuil and
                  Antoine Joux and
                  Matthieu Rivain},
  title        = {Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge
                  Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/188},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FeneuilJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasJN22,
  author       = {Dipayan Das and
                  Antoine Joux and
                  Anand Kumar Narayanan},
  title        = {Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/205},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DasJN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangDJPQS22,
  author       = {Gang Tang and
                  Dung Hoang Duong and
                  Antoine Joux and
                  Thomas Plantard and
                  Youming Qiao and
                  Willy Susilo},
  title        = {Practical Post-Quantum Signature Schemes from Isomorphism Problems
                  of Trilinear Forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/267},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangDJPQS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001J22,
  author       = {Dipayan Das and
                  Antoine Joux},
  title        = {On the Hardness of the Finite Field Isomorphism Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {998},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/998},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001J22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-07059,
  author       = {Jonathan Allcock and
                  Yassine Hamoudi and
                  Antoine Joux and
                  Felix Klingelh{\"{o}}fer and
                  Miklos Santha},
  title        = {Classical and quantum dynamic programming for Subset-Sum and variants},
  journal      = {CoRR},
  volume       = {abs/2111.07059},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.07059},
  eprinttype    = {arXiv},
  eprint       = {2111.07059},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-07059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerJ21,
  author       = {Robert Granger and
                  Antoine Joux},
  title        = {Computing Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1140},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1140},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeneuilJR21,
  author       = {Thibauld Feneuil and
                  Antoine Joux and
                  Matthieu Rivain},
  title        = {Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol
                  and Code-Based Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1576},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1576},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FeneuilJR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/EspitauJ20,
  author       = {Thomas Espitau and
                  Antoine Joux},
  title        = {Certified lattice reduction},
  journal      = {Adv. Math. Commun.},
  volume       = {14},
  number       = {1},
  pages        = {137--159},
  year         = {2020},
  url          = {https://doi.org/10.3934/amc.2020011},
  doi          = {10.3934/AMC.2020011},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/EspitauJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JouxP20,
  author       = {Antoine Joux and
                  Jacek Pomykala},
  title        = {Preface for the Number-Theoretic Methods in Cryptology conferences},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {393--396},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0111},
  doi          = {10.1515/JMC-2019-0111},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/JouxP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/EspitauJK20,
  author       = {Thomas Espitau and
                  Antoine Joux and
                  Natalia Kharchenko},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {On a Dual/Hybrid Approach to Small Secret {LWE} - {A} Dual/Enumeration
                  Technique for Learning with Errors and Application to Security Estimates
                  of {FHE} Schemes},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {440--462},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_20},
  doi          = {10.1007/978-3-030-65277-7\_20},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/EspitauJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspitauJK20,
  author       = {Thomas Espitau and
                  Antoine Joux and
                  Natalia Kharchenko},
  title        = {On a hybrid approach to solve binary-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/515},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspitauJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/GololuJ19,
  author       = {Faruk G{\"{o}}loglu and
                  Antoine Joux},
  title        = {A simplified approach to rigorous degree 2 elimination in discrete
                  logarithm algorithms},
  journal      = {Math. Comput.},
  volume       = {88},
  number       = {319},
  pages        = {2485--2496},
  year         = {2019},
  url          = {https://doi.org/10.1090/mcom/3404},
  doi          = {10.1090/MCOM/3404},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/GololuJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-11743,
  author       = {Thomas Espitau and
                  Antoine Joux},
  title        = {Certified lattice reduction},
  journal      = {CoRR},
  volume       = {abs/1905.11743},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.11743},
  eprinttype    = {arXiv},
  eprint       = {1905.11743},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-11743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-02689,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {Algorithmic aspects of elliptic bases in finite field discrete logarithm
                  algorithms},
  journal      = {CoRR},
  volume       = {abs/1907.02689},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.02689},
  eprinttype    = {arXiv},
  eprint       = {1907.02689},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-02689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-01662,
  author       = {G{\'{a}}bor Ivanyos and
                  Antoine Joux and
                  Miklos Santha},
  title        = {Discrete logarithm and Diffie-Hellman problems in identity black-box
                  groups},
  journal      = {CoRR},
  volume       = {abs/1911.01662},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.01662},
  eprinttype    = {arXiv},
  eprint       = {1911.01662},
  timestamp    = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-01662.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joux19,
  author       = {Antoine Joux},
  title        = {Fully homomorphic encryption modulo Fermat numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joux19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxP19,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {Algorithmic aspects of elliptic bases in finite field discrete logarithm
                  algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {782},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/782},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxN19,
  author       = {Antoine Joux and
                  Anand Kumar Narayanan},
  title        = {Drinfeld modules are not for isogeny based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1329},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoudarziJR18,
  author       = {Dahmun Goudarzi and
                  Antoine Joux and
                  Matthieu Rivain},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {How to Securely Compute with Noisy Leakage in Quasilinear Complexity},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {547--574},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_19},
  doi          = {10.1007/978-3-030-03329-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoudarziJR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalJPS18,
  author       = {Divesh Aggarwal and
                  Antoine Joux and
                  Anupam Prakash and
                  Miklos Santha},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {A New Public-Key Cryptosystem via Mersenne Numbers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {459--482},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_16},
  doi          = {10.1007/978-3-319-96878-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalJPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2018,
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6},
  doi          = {10.1007/978-3-319-89339-6},
  isbn         = {978-3-319-89338-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GologluJ18,
  author       = {Faruk G{\"{o}}loglu and
                  Antoine Joux},
  title        = {A Simplified Approach to Rigorous Degree 2 Elimination in Discrete
                  Logarithm Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GologluJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nutmic/JouxV17,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  editor       = {Jerzy Kaczorowski and
                  Josef Pieprzyk and
                  Jacek Pomykala},
  title        = {A Crossbred Algorithm for Solving Boolean Polynomial Systems},
  booktitle    = {Number-Theoretic Methods in Cryptology - First International Conference,
                  NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10737},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-76620-1\_1},
  doi          = {10.1007/978-3-319-76620-1\_1},
  timestamp    = {Sun, 02 Jun 2019 21:19:28 +0200},
  biburl       = {https://dblp.org/rec/conf/nutmic/JouxV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/Joux17,
  author       = {Antoine Joux},
  editor       = {Heribert Vollmer and
                  Brigitte Vall{\'{e}}e},
  title        = {Discrete Logarithms in Small Characteristic Finite Fields: a Survey
                  of Recent Advances (Invited Talk)},
  booktitle    = {34th Symposium on Theoretical Aspects of Computer Science, {STACS}
                  2017, March 8-11, 2017, Hannover, Germany},
  series       = {LIPIcs},
  volume       = {66},
  pages        = {3:1--3:1},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.STACS.2017.3},
  doi          = {10.4230/LIPICS.STACS.2017.3},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/stacs/Joux17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV17,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {A crossbred algorithm for solving Boolean polynomial systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalJPS17,
  author       = {Divesh Aggarwal and
                  Antoine Joux and
                  Anupam Prakash and
                  Miklos Santha},
  title        = {A New Public-Key Cryptosystem via Mersenne Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalJPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoudarziJR17,
  author       = {Dahmun Goudarzi and
                  Antoine Joux and
                  Matthieu Rivain},
  title        = {How to Securely Compute with Noisy Leakage in Quasilinear Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {929},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/929},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoudarziJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JouxP16,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {Technical history of discrete logarithms in small characteristic finite
                  fields - The road from subexponential to quasi-polynomial complexity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {73--85},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0147-6},
  doi          = {10.1007/S10623-015-0147-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JouxP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/GelinJ16,
  author       = {Alexandre G{\'{e}}lin and
                  Antoine Joux},
  title        = {Reducing number field defining polynomials: an application to class
                  group computations},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {19},
  number       = {A},
  pages        = {315--331},
  year         = {2016},
  url          = {https://doi.org/10.1112/s1461157016000255},
  doi          = {10.1112/S1461157016000255},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/GelinJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspitauJ16,
  author       = {Thomas Espitau and
                  Antoine Joux},
  title        = {Adaptive precision {LLL} and Potential-LLL reductions with Interval
                  arithmetic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspitauJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GelinJ16,
  author       = {Alexandre G{\'{e}}lin and
                  Antoine Joux},
  title        = {Reducing number field defining polynomials: An application to class
                  group computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GelinJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamCJ15,
  author       = {Eli Biham and
                  Rafi Chen and
                  Antoine Joux},
  title        = {Cryptanalysis of {SHA-0} and Reduced {SHA-1}},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {1},
  pages        = {110--160},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9179-8},
  doi          = {10.1007/S00145-014-9179-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerGJ15,
  author       = {Anja Becker and
                  Nicolas Gama and
                  Antoine Joux},
  title        = {Speeding-up lattice sieving without increasing the memory, using sub-quadratic
                  nearest neighbor search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerGJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxP15,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {Nearly Sparse Linear Algebra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {930},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/930},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/GutierrezIJ14,
  author       = {Jaime Gutierrez and
                  {\'{A}}lvar Ibeas and
                  Antoine Joux},
  title        = {Recovering a sum of two squares decomposition},
  journal      = {J. Symb. Comput.},
  volume       = {64},
  pages        = {16--21},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jsc.2013.12.003},
  doi          = {10.1016/J.JSC.2013.12.003},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/GutierrezIJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/0001GJ14,
  author       = {Anja Becker and
                  Nicolas Gama and
                  Antoine Joux},
  title        = {A sieve algorithm based on overlattices},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {17},
  number       = {Theory},
  pages        = {49--70},
  year         = {2014},
  url          = {https://doi.org/10.1112/s1461157014000229},
  doi          = {10.1112/S1461157014000229},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/0001GJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JouxP14,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Improving the Polynomial time Precomputation of Frobenius Representation
                  Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic
                  Finite Fields},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {378--397},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_20},
  doi          = {10.1007/978-3-662-45611-8\_20},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JouxP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FouqueJM14,
  author       = {Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Chrysanthi Mavromati},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour
                  and {PRINCE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {420--438},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_22},
  doi          = {10.1007/978-3-662-45611-8\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FouqueJM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BarbulescuGJT14,
  author       = {Razvan Barbulescu and
                  Pierrick Gaudry and
                  Antoine Joux and
                  Emmanuel Thom{\'{e}}},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite
                  Fields of Small Characteristic},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_1},
  doi          = {10.1007/978-3-642-55220-5\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BarbulescuGJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaugereHJRV14,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Louise Huot and
                  Antoine Joux and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  Vanessa Vitse},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Symmetrized Summation Polynomials: Using Small Order Torsion Points
                  to Speed Up Elliptic Curve Index Calculus},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {40--57},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_3},
  doi          = {10.1007/978-3-642-55220-5\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FaugereHJRV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/JouxOP14,
  author       = {Antoine Joux and
                  Andrew M. Odlyzko and
                  C{\'{e}}cile Pierrot},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {The Past, Evolving Present, and Future of the Discrete Logarithm},
  booktitle    = {Open Problems in Mathematics and Computational Science},
  pages        = {5--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10683-0\_2},
  doi          = {10.1007/978-3-319-10683-0\_2},
  timestamp    = {Tue, 16 May 2017 14:01:44 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/JouxOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2014,
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4},
  doi          = {10.1007/978-3-319-13051-4},
  isbn         = {978-3-319-13050-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxP14,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {Improving the Polynomial time Precomputation of Frobenius Representation
                  Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic
                  Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {924},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/924},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JouxV13,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {Elliptic Curve Discrete Logarithm Problem over Small Degree Extension
                  Fields - Application to the Static Diffie-Hellman Problem on {\textdollar}E({\textbackslash}mathbb\{F\}{\_}\{q{\^{}}\{5\}\}){\textdollar}},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {1},
  pages        = {119--143},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-011-9116-z},
  doi          = {10.1007/S00145-011-9116-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JouxV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/IonicaJ13,
  author       = {Sorina Ionica and
                  Antoine Joux},
  title        = {Pairing the volcano},
  journal      = {Math. Comput.},
  volume       = {82},
  number       = {281},
  pages        = {581--603},
  year         = {2013},
  url          = {https://doi.org/10.1090/S0025-5718-2012-02622-6},
  doi          = {10.1090/S0025-5718-2012-02622-6},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/IonicaJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FouqueJT13,
  author       = {Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Mehdi Tibouchi},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Injective Encodings to Elliptic Curves},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_14},
  doi          = {10.1007/978-3-642-39059-3\_14},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FouqueJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Joux13,
  author       = {Antoine Joux},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Faster Index Calculus for the Medium Prime Case Application to 1175-bit
                  and 1425-bit Finite Fields},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {177--193},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_11},
  doi          = {10.1007/978-3-642-38348-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Joux13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JouxR13,
  author       = {Antoine Joux and
                  Antoine Rojat},
  editor       = {Yvo Desmedt},
  title        = {Security Ranking Among Assumptions Within the \emph{Uber Assumption}
                  Framework},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {391--406},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_28},
  doi          = {10.1007/978-3-319-27659-5\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JouxR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/JouxP13,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {The Special Number Field Sieve in {\(\mathbb{F}\)}\({}_{\mbox{p\({}^{\mbox{n}}\)}}\)
                  - Application to Pairing-Friendly Constructions},
  booktitle    = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  pages        = {45--61},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04873-4\_3},
  doi          = {10.1007/978-3-319-04873-4\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pairing/JouxP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Joux13,
  author       = {Antoine Joux},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {A New Index Calculus Algorithm with Complexity {\textdollar}{\textdollar}L(1/4+o(1)){\textdollar}{\textdollar}
                  in Small Characteristic},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {355--379},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_18},
  doi          = {10.1007/978-3-662-43414-7\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Joux13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BarbulescuGJT13,
  author       = {Razvan Barbulescu and
                  Pierrick Gaudry and
                  Antoine Joux and
                  Emmanuel Thom{\'{e}}},
  title        = {A quasi-polynomial algorithm for discrete logarithm in finite fields
                  of small characteristic},
  journal      = {CoRR},
  volume       = {abs/1306.4244},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.4244},
  eprinttype    = {arXiv},
  eprint       = {1306.4244},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/BarbulescuGJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joux13,
  author       = {Antoine Joux},
  title        = {A new index calculus algorithm with complexity L(1/4+o(1)) in very
                  small characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joux13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxR13,
  author       = {Antoine Joux and
                  Antoine Rojat},
  title        = {On Diffie-Hellman - like Security Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueJT13,
  author       = {Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Mehdi Tibouchi},
  title        = {Injective Encoding to Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuGJT13,
  author       = {Razvan Barbulescu and
                  Pierrick Gaudry and
                  Antoine Joux and
                  Emmanuel Thom{\'{e}}},
  title        = {A quasi-polynomial algorithm for discrete logarithm in finite fields
                  of small characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuGJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxP13,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {The Special Number Field Sieve in F\({}_{\mbox{p\({}^{\mbox{n}}\)}}\),
                  Application to Pairing-Friendly Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerGJ13,
  author       = {Anja Becker and
                  Nicolas Gama and
                  Antoine Joux},
  title        = {Solving shortest and closest vector problems: The decomposition approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/685},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerGJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueJM13,
  author       = {Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Chrysanthi Mavromati},
  title        = {Multi-user collisions: Applications to Discrete Logs, Even-Mansour
                  and Prince},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {761},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/761},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueJM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BouillaguetFJT12,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Joana Treger},
  title        = {A family of weak keys in {HFE} and the corresponding practical key-recovery},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {3-4},
  pages        = {247--275},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.012},
  doi          = {10.1515/JMC.2011.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BouillaguetFJT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MedwedSJ12,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Antoine Joux},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient
                  PRFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {193--212},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_12},
  doi          = {10.1007/978-3-642-33027-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MedwedSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Joux12,
  author       = {Antoine Joux},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {A Tutorial on High Performance Computing Applied to Cryptanalysis
                  - (Invited Talk Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_1},
  doi          = {10.1007/978-3-642-29011-4\_1},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Joux12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JouxV12,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Cover and Decomposition Index Calculus on Elliptic Curves Made Practical
                  - Application to a Previously Unreachable Curve over {\textdollar}{\textbackslash}mathbb\{F\}{\_}\{p{\^{}}6\}{\textdollar}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {9--26},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_3},
  doi          = {10.1007/978-3-642-29011-4\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JouxV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BeckerJMM12,
  author       = {Anja Becker and
                  Antoine Joux and
                  Alexander May and
                  Alexander Meurer},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves
                  Information Set Decoding},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {520--536},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_31},
  doi          = {10.1007/978-3-642-29011-4\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BeckerJMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerJMM12,
  author       = {Anja Becker and
                  Antoine Joux and
                  Alexander May and
                  Alexander Meurer},
  title        = {Decoding Random Binary Linear Codes in 2\({}^{\mbox{n/20}}\): How
                  1+1=0 Improves Information Set Decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerJMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joux12,
  author       = {Antoine Joux},
  title        = {Faster index calculus for the medium prime case. Application to 1175-bit
                  and 1425-bit finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joux12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JouxV11,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  editor       = {Aggelos Kiayias},
  title        = {A Variant of the {F4} Algorithm},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {356--375},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_23},
  doi          = {10.1007/978-3-642-19074-2\_23},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JouxV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BeckerCJ11,
  author       = {Anja Becker and
                  Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux},
  editor       = {Kenneth G. Paterson},
  title        = {Improved Generic Algorithms for Hard Knapsacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {364--385},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_21},
  doi          = {10.1007/978-3-642-20465-4\_21},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BeckerCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronJMNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {147--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_9},
  doi          = {10.1007/978-3-642-19379-8\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronJMNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2011,
  editor       = {Antoine Joux},
  title        = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9},
  doi          = {10.1007/978-3-642-21702-9},
  isbn         = {978-3-642-21701-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/JouxL11,
  author       = {Antoine Joux and
                  Reynald Lercier},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Number Field Sieve for the {DLP}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {867--873},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_834},
  doi          = {10.1007/978-1-4419-5906-5\_834},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/JouxL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV11,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {Cover and Decomposition Index Calculus on Elliptic Curves made practical.
                  Application to a seemingly secure curve over F\({}_{\mbox{p\({}^{\mbox{6}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerCJ11,
  author       = {Anja Becker and
                  Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux},
  title        = {Improved Generic Algorithms for Hard Knapsacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Joux10,
  author       = {Antoine Joux},
  title        = {On the security of blockwise secure modes of operation beyond the
                  birthday bound},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {56},
  number       = {3},
  pages        = {1239--1246},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIT.2009.2039164},
  doi          = {10.1109/TIT.2009.2039164},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Joux10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/IonicaJ10,
  author       = {Sorina Ionica and
                  Antoine Joux},
  editor       = {Guillaume Hanrot and
                  Fran{\c{c}}ois Morain and
                  Emmanuel Thom{\'{e}}},
  title        = {Pairing the Volcano},
  booktitle    = {Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy,
                  France, July 19-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6197},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14518-6\_18},
  doi          = {10.1007/978-3-642-14518-6\_18},
  timestamp    = {Thu, 14 Oct 2021 10:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/IonicaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Howgrave-GrahamJ10,
  author       = {Nick Howgrave{-}Graham and
                  Antoine Joux},
  editor       = {Henri Gilbert},
  title        = {New Generic Algorithms for Hard Knapsacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {235--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_12},
  doi          = {10.1007/978-3-642-13190-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Howgrave-GrahamJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/FaugereJPT10,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Antoine Joux and
                  Ludovic Perret and
                  Joana Treger},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Cryptanalysis of the Hidden Matrix Cryptosystem},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {241--254},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_15},
  doi          = {10.1007/978-3-642-14712-8\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/FaugereJPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/IonicaJ10,
  author       = {Sorina Ionica and
                  Antoine Joux},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Pairing Computation on Elliptic Curves with Efficiently Computable
                  Endomorphism and Small Embedding Degree},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {435--449},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_27},
  doi          = {10.1007/978-3-642-17455-1\_27},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/IonicaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV10,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {Elliptic Curve Discrete Logarithm Problem over Small Degree Extension
                  Fields. Application to the static Diffie-Hellman problem on E(F\({}_{\mbox{q\({}^{\mbox{5}}\)}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV10a,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {A variant of the {F4} algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Howgrave-GrahamJ10,
  author       = {Nick Howgrave{-}Graham and
                  Antoine Joux},
  title        = {New generic algorithms for hard knapsacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Howgrave-GrahamJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonicaJ10,
  author       = {Sorina Ionica and
                  Antoine Joux},
  title        = {Pairing computation on elliptic curves with efficiently computable
                  endomorphism and small embedding degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonicaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJMNT10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJMNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JouxL09,
  author       = {Antoine Joux and
                  Stefan Lucks},
  editor       = {Mitsuru Matsui},
  title        = {Improved Generic Algorithms for 3-Collisions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {347--363},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_21},
  doi          = {10.1007/978-3-642-10366-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JouxL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CastagnosJLN09,
  author       = {Guilhem Castagnos and
                  Antoine Joux and
                  Fabien Laguillaumie and
                  Phong Q. Nguyen},
  editor       = {Mitsuru Matsui},
  title        = {Factoring \emph{pq}\({}^{\mbox{2}}\) with Quadratic Forms: Nice Cryptanalyses},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {469--486},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_28},
  doi          = {10.1007/978-3-642-10366-7\_28},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CastagnosJLN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronJKNP09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Ilya Kizhvatov and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {444--456},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_31},
  doi          = {10.1007/978-3-642-04138-9\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JouxLNT09,
  author       = {Antoine Joux and
                  Reynald Lercier and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  editor       = {Matthew Geoffrey Parker},
  title        = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {351--367},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_21},
  doi          = {10.1007/978-3-642-10868-6\_21},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/JouxLNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/Joux09,
  author       = {Antoine Joux},
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Introduction to Identity-Based Cryptography},
  booktitle    = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  pages        = {1--12},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-58603-947-9-1},
  doi          = {10.3233/978-1-58603-947-9-1},
  timestamp    = {Thu, 11 Apr 2019 14:31:06 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/Joux09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2009,
  editor       = {Antoine Joux},
  title        = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9},
  doi          = {10.1007/978-3-642-01001-9},
  isbn         = {978-3-642-01000-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDFJ09,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Antoine Joux},
  title        = {On the Security of Iterated Hashing based on Forgery-resistant Compression
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxL09,
  author       = {Antoine Joux and
                  Stefan Lucks},
  title        = {Improved generic algorithms for 3-collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJKNP09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Ilya Kizhvatov and
                  David Naccache and
                  Pascal Paillier},
  title        = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJKNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFJT09,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Joana Treger},
  title        = {A Family of Weak Keys in {HFE} (and the Corresponding Practical Key-Recovery)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/619},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFJT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/DelaunayJ08,
  author       = {Pascal Delaunay and
                  Antoine Joux},
  editor       = {Serge Vaudenay},
  title        = {Yet Another Attack on Vest},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {221--235},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_15},
  doi          = {10.1007/978-3-540-68164-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/DelaunayJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/IonicaJ08,
  author       = {Sorina Ionica and
                  Antoine Joux},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {Another Approach to Pairing Computation in Edwards Coordinates},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {400--413},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_31},
  doi          = {10.1007/978-3-540-89754-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/IonicaJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BerbainGJ08,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert and
                  Antoine Joux},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Algebraic and Correlation Attacks against Linearly Filtered Non Linear
                  Feedback Shift Registers},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_12},
  doi          = {10.1007/978-3-642-04159-4\_12},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BerbainGJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxLNT08,
  author       = {Antoine Joux and
                  Reynald Lercier and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  title        = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxLNT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonicaJ08,
  author       = {Sorina Ionica and
                  Antoine Joux},
  title        = {Another approach to pairing computation in Edwards coordinates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonicaJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JouxNT07,
  author       = {Antoine Joux and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  editor       = {Kaoru Kurosawa},
  title        = {When \emph{e}-th Roots Become Easier Than Factoring},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {13--28},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_2},
  doi          = {10.1007/978-3-540-76900-2\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JouxNT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JouxP07,
  author       = {Antoine Joux and
                  Thomas Peyrin},
  editor       = {Alfred Menezes},
  title        = {Hash Functions and the (Amplified) Boomerang Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {244--263},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_14},
  doi          = {10.1007/978-3-540-74143-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JouxP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BauerJ07,
  author       = {Aur{\'{e}}lie Bauer and
                  Antoine Joux},
  editor       = {Moni Naor},
  title        = {Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {361--378},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_21},
  doi          = {10.1007/978-3-540-72540-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BauerJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxR07,
  author       = {Antoine Joux and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Alex Biryukov},
  title        = {Overtaking {VEST}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_4},
  doi          = {10.1007/978-3-540-74619-5\_4},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/JouxR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxNT07,
  author       = {Antoine Joux and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  title        = {When e-th Roots Become Easier Than Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxNT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JouxLSV06,
  author       = {Antoine Joux and
                  Reynald Lercier and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Cynthia Dwork},
  title        = {The Number Field Sieve in the Medium Prime Case},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {326--344},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_19},
  doi          = {10.1007/11818175\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JouxLSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GranboulanJS06,
  author       = {Louis Granboulan and
                  Antoine Joux and
                  Jacques Stern},
  editor       = {Cynthia Dwork},
  title        = {Inverting {HFE} Is Quasipolynomial},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {345--356},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_20},
  doi          = {10.1007/11818175\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GranboulanJS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JouxL06,
  author       = {Antoine Joux and
                  Reynald Lercier},
  editor       = {Serge Vaudenay},
  title        = {The Function Field Sieve in the Medium Prime Case},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {254--270},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_16},
  doi          = {10.1007/11761679\_16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JouxL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxM06,
  author       = {Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Matthew J. B. Robshaw},
  title        = {Chosen-Ciphertext Attacks Against {MOSQUITO}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {390--404},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_25},
  doi          = {10.1007/11799313\_25},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/JouxD06,
  author       = {Antoine Joux and
                  Pascal Delaunay},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Galois LFSR, Embedded Devices and Side Channel Weaknesses},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {436--451},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_31},
  doi          = {10.1007/11941378\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/JouxD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxL06,
  author       = {Antoine Joux and
                  Reynald Lercier},
  title        = {Counting points on elliptic curves in medium characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamCJCLJ05,
  author       = {Eli Biham and
                  Rafi Chen and
                  Antoine Joux and
                  Patrick Carribault and
                  Christophe Lemuet and
                  William Jalby},
  editor       = {Ronald Cramer},
  title        = {Collisions of {SHA-0} and Reduced {SHA-1}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {36--57},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_3},
  doi          = {10.1007/11426639\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamCJCLJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxM05,
  author       = {Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Two Attacks Against the {HBB} Stream Cipher},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {330--341},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_22},
  doi          = {10.1007/11502760\_22},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JouxKMR05,
  author       = {Antoine Joux and
                  S{\'{e}}bastien Kunz{-}Jacques and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Pierre{-}Michel Ricordel},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of the Tractable Rational Map Cryptosystem},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {258--274},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_18},
  doi          = {10.1007/978-3-540-30580-4\_18},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JouxKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Joux04,
  author       = {Antoine Joux},
  title        = {A One Round Protocol for Tripartite Diffie-Hellman},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {4},
  pages        = {263--276},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-004-0312-y},
  doi          = {10.1007/S00145-004-0312-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Joux04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Joux04,
  author       = {Antoine Joux},
  editor       = {Matthew K. Franklin},
  title        = {Multicollisions in Iterated Hash Functions. Application to Cascaded
                  Constructions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {306--316},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_19},
  doi          = {10.1007/978-3-540-28628-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Joux04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FouqueJP04,
  author       = {Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Guillaume Poupard},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption
                  Schemes},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {212--226},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_15},
  doi          = {10.1007/978-3-540-30564-4\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FouqueJP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJ04,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux},
  title        = {Cryptanalysis of a Provably Secure Cryptographic Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JouxN03,
  author       = {Antoine Joux and
                  Kim Nguyen},
  title        = {Separating Decision Diffie-Hellman from Computational Diffie-Hellman
                  in Cryptographic Groups},
  journal      = {J. Cryptol.},
  volume       = {16},
  number       = {4},
  pages        = {239--247},
  year         = {2003},
  url          = {https://doi.org/10.1007/s00145-003-0052-4},
  doi          = {10.1007/S00145-003-0052-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JouxN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/JouxL03,
  author       = {Antoine Joux and
                  Reynald Lercier},
  title        = {Improvements to the general number field sieve for discrete logarithms
                  in prime fields. {A} comparison with the gaussian integer method},
  journal      = {Math. Comput.},
  volume       = {72},
  number       = {242},
  pages        = {953--967},
  year         = {2003},
  url          = {https://doi.org/10.1090/S0025-5718-02-01482-5},
  doi          = {10.1090/S0025-5718-02-01482-5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/JouxL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FaugereJ03,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Antoine Joux},
  editor       = {Dan Boneh},
  title        = {Algebraic Cryptanalysis of Hidden Field Equation {(HFE)} Cryptosystems
                  Using Gr{\"{o}}bner Bases},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_3},
  doi          = {10.1007/978-3-540-45146-4\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FaugereJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Joux03,
  author       = {Antoine Joux},
  editor       = {Eli Biham},
  title        = {Cryptanalysis of the {EMD} Mode of Operation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_1},
  doi          = {10.1007/3-540-39200-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Joux03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxM03,
  author       = {Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Thomas Johansson},
  title        = {Loosening the {KNOT}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {87--99},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_8},
  doi          = {10.1007/978-3-540-39887-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxPS03,
  author       = {Antoine Joux and
                  Guillaume Poupard and
                  Jacques Stern},
  editor       = {Thomas Johansson},
  title        = {New Attacks against Standardized MACs},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {170--181},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_13},
  doi          = {10.1007/978-3-540-39887-5\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FouqueJMV03,
  author       = {Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Gwena{\"{e}}lle Martinet and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Authenticated On-Line Encryption},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_11},
  doi          = {10.1007/978-3-540-24654-1\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FouqueJMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JouxM03,
  author       = {Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {A Chosen {IV} Attack Against Turing},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_14},
  doi          = {10.1007/978-3-540-24654-1\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JouxM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/Joux02,
  author       = {Antoine Joux},
  editor       = {Claus Fieker and
                  David R. Kohel},
  title        = {The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems},
  booktitle    = {Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney,
                  Australia, July 7-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2369},
  pages        = {20--32},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45455-1\_3},
  doi          = {10.1007/3-540-45455-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/Joux02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/JouxL02,
  author       = {Antoine Joux and
                  Reynald Lercier},
  editor       = {Claus Fieker and
                  David R. Kohel},
  title        = {The Function Field Sieve Is Quite Special},
  booktitle    = {Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney,
                  Australia, July 7-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2369},
  pages        = {431--445},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45455-1\_34},
  doi          = {10.1007/3-540-45455-1\_34},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ants/JouxL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JouxMV02,
  author       = {Antoine Joux and
                  Gwena{\"{e}}lle Martinet and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Moti Yung},
  title        = {Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some
                  Provably Secure Encryption Models: CBC, GEM, {IACBC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {17--30},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_2},
  doi          = {10.1007/3-540-45708-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JouxMV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChoseJM02,
  author       = {Philippe Chose and
                  Antoine Joux and
                  Michel Mitton},
  editor       = {Lars R. Knudsen},
  title        = {Fast Correlation Attacks: An Algorithmic Point of View},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {209--221},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_14},
  doi          = {10.1007/3-540-46035-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChoseJM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JaulmesJV02,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox
                  Limit: {A} New Construction},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_19},
  doi          = {10.1007/3-540-45661-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JaulmesJV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/JouxL01,
  author       = {Antoine Joux and
                  Reynald Lercier},
  title        = {"Chinese {\&} Match", an alternative to Atkin's "Match
                  and Sort" method used in the {SEA} algorithm},
  journal      = {Math. Comput.},
  volume       = {70},
  number       = {234},
  pages        = {827--836},
  year         = {2001},
  url          = {https://doi.org/10.1090/S0025-5718-00-01200-X},
  doi          = {10.1090/S0025-5718-00-01200-X},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/JouxL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JaulmesJ01,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux},
  editor       = {Kwangjo Kim},
  title        = {Cryptanalysis of {PKP:} {A} New Approach},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {165--172},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_12},
  doi          = {10.1007/3-540-44586-2\_12},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JaulmesJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxN01,
  author       = {Antoine Joux and
                  Kim Nguyen},
  title        = {Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic
                  groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaulmesJV01,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  title        = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox
                  Limit - {A} New Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaulmesJV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/Joux00,
  author       = {Antoine Joux},
  editor       = {Wieb Bosma},
  title        = {A One Round Protocol for Tripartite Diffie-Hellman},
  booktitle    = {Algorithmic Number Theory, 4th International Symposium, ANTS-IV, Leiden,
                  The Netherlands, July 2-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1838},
  pages        = {385--394},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722028\_23},
  doi          = {10.1007/10722028\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/Joux00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehJN00,
  author       = {Dan Boneh and
                  Antoine Joux and
                  Phong Q. Nguyen},
  editor       = {Tatsuaki Okamoto},
  title        = {Why Textbook ElGamal and {RSA} Encryption Are Insecure},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_3},
  doi          = {10.1007/3-540-44448-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonehJN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JaulmesJ00,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux},
  editor       = {Mihir Bellare},
  title        = {A Chosen-Ciphertext Attack against {NTRU}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_2},
  doi          = {10.1007/3-540-44598-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JaulmesJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JaulmesJ00,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux},
  editor       = {Bart Preneel},
  title        = {A {NICE} Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {382--391},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_26},
  doi          = {10.1007/3-540-45539-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JaulmesJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertHJV00,
  author       = {Henri Gilbert and
                  Helena Handschuh and
                  Antoine Joux and
                  Serge Vaudenay},
  editor       = {Bruce Schneier},
  title        = {A Statistical Attack on {RC6}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {64--74},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_5},
  doi          = {10.1007/3-540-44706-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertHJV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JouxS98,
  author       = {Antoine Joux and
                  Jacques Stern},
  title        = {Lattice Reduction: {A} Toolbox for the Cryptanalyst},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {161--185},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900042},
  doi          = {10.1007/S001459900042},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JouxS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rsa/FriedmanJRST98,
  author       = {Joel Friedman and
                  Antoine Joux and
                  Yuval Roichman and
                  Jacques Stern and
                  Jean{-}Pierre Tillich},
  title        = {The action of a few permutations on r-tuples is quickly transitive},
  journal      = {Random Struct. Algorithms},
  volume       = {12},
  number       = {4},
  pages        = {335--350},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1098-2418(199807)12:4\&\#60;335::AID-RSA2\&\#62;3.0.CO;2-U},
  doi          = {10.1002/(SICI)1098-2418(199807)12:4\&\#60;335::AID-RSA2\&\#62;3.0.CO;2-U},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rsa/FriedmanJRST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChabaudJ98,
  author       = {Florent Chabaud and
                  Antoine Joux},
  editor       = {Hugo Krawczyk},
  title        = {Differential Collisions in {SHA-0}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {56--71},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055720},
  doi          = {10.1007/BFB0055720},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChabaudJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/FriedmanJRST96,
  author       = {Joel Friedman and
                  Antoine Joux and
                  Yuval Roichman and
                  Jacques Stern and
                  Jean{-}Pierre Tillich},
  editor       = {Claude Puech and
                  R{\"{u}}diger Reischuk},
  title        = {The Action of a Few Random Permutations on r-Tuples and an Application
                  to Cryptography},
  booktitle    = {{STACS} 96, 13th Annual Symposium on Theoretical Aspects of Computer
                  Science, Grenoble, France, February 22-24, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1046},
  pages        = {375--386},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60922-9\_31},
  doi          = {10.1007/3-540-60922-9\_31},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/FriedmanJRST96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JouxG94,
  author       = {Antoine Joux and
                  Louis Granboulan},
  editor       = {Alfredo De Santis},
  title        = {A Practical Attack against Knapsack based Hash Functions (Extended
                  Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {58--66},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053424},
  doi          = {10.1007/BFB0053424},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JouxG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/CosterJLOSS92,
  author       = {Matthijs J. Coster and
                  Antoine Joux and
                  Brian A. LaMacchia and
                  Andrew M. Odlyzko and
                  Claus{-}Peter Schnorr and
                  Jacques Stern},
  title        = {Improved Low-Density Subset Sum Algorithms},
  journal      = {Comput. Complex.},
  volume       = {2},
  pages        = {111--128},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF01201999},
  doi          = {10.1007/BF01201999},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/CosterJLOSS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JouxS91,
  author       = {Antoine Joux and
                  Jacques Stern},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Cryptanalysis of Another Knapsack Cryptosystem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {470--476},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_40},
  doi          = {10.1007/3-540-57332-1\_40},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JouxS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CheeJS91,
  author       = {Yeow Meng Chee and
                  Antoine Joux and
                  Jacques Stern},
  editor       = {Joan Feigenbaum},
  title        = {The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular
                  Knapsacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {204--212},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_15},
  doi          = {10.1007/3-540-46766-1\_15},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CheeJS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/JouxS91,
  author       = {Antoine Joux and
                  Jacques Stern},
  editor       = {Lothar Budach},
  title        = {Improving the Critical Density of the Lagarias-Odlyzko Attack Against
                  Subset Sum Problems},
  booktitle    = {Fundamentals of Computation Theory, 8th International Symposium, {FCT}
                  '91, Gosen, Germany, September 9-13, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {529},
  pages        = {258--264},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54458-5\_70},
  doi          = {10.1007/3-540-54458-5\_70},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/JouxS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics