default search action
Pierre-Alain Fouque
Person information
- affiliation: Rennes University, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j26]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. J. Cryptol. 37(1): 5 (2024) - [j25]Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher:
Key Committing Attacks against AES-based AEAD Schemes. IACR Trans. Symmetric Cryptol. 2024(1): 135-157 (2024) - 2023
- [j24]Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME. Proc. Priv. Enhancing Technol. 2023(4): 306-321 (2023) - 2022
- [j23]Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu:
BAT: Small and Fast KEM over NTRU Lattices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 240-265 (2022) - 2020
- [j22]Baptiste Lambin, Patrick Derbez, Pierre-Alain Fouque:
Linearly equivalent S-boxes and the division property. Des. Codes Cryptogr. 88(10): 2207-2231 (2020) - [j21]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub:
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations. J. Cryptogr. Eng. 10(1): 17-26 (2020) - [j20]Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 196-218 (2020) - [j19]Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard:
Fake Near Collisions Attacks. IACR Trans. Symmetric Cryptol. 2020(4): 88-103 (2020) - [j18]Patrick Derbez, Pierre-Alain Fouque:
Increasing Precision of Division Property. IACR Trans. Symmetric Cryptol. 2020(4): 173-194 (2020) - 2019
- [j17]Raphael Bost, Pierre-Alain Fouque:
Security-Efficiency Tradeoffs in Searchable Encryption. Proc. Priv. Enhancing Technol. 2019(4): 132-151 (2019) - [j16]Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
The privacy of the TLS 1.3 protocol. Proc. Priv. Enhancing Technol. 2019(4): 190-210 (2019) - [j15]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. IEEE Trans. Inf. Theory 65(2): 1307-1317 (2019) - [j14]Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard:
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks. IACR Trans. Symmetric Cryptol. 2019(2): 218-240 (2019) - 2018
- [j13]Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman:
Key-Recovery Attacks on ASASA. J. Cryptol. 31(3): 845-884 (2018) - [j12]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols. IEEE Trans. Computers 67(11): 1535-1549 (2018) - [j11]Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 121-149 (2018) - [j10]Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque:
Revisiting and Improving Algorithms for the 3XOR Problem. IACR Trans. Symmetric Cryptol. 2018(1): 254-276 (2018) - 2016
- [j9]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly Secure Signatures From Lossy Identification Schemes. J. Cryptol. 29(3): 597-631 (2016) - [j8]Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. J. Cryptol. 29(4): 657-696 (2016) - [j7]Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. Proc. Priv. Enhancing Technol. 2016(4): 255-275 (2016) - 2015
- [j6]Claude Carlet, Pierre-Alain Fouque:
Guest Editorial. Cryptogr. Commun. 7(1): 1-2 (2015) - 2013
- [j5]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT signatures with faults on montgomery multiplication. J. Cryptogr. Eng. 3(1): 59-72 (2013) - [j4]Reza Rezaeian Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, José Felipe Voloch:
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Math. Comput. 82(281): 491-512 (2013) - 2012
- [j3]Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim:
Cryptanalysis of reduced versions of the Camellia block cipher. IET Inf. Secur. 6(3): 228-238 (2012) - [j2]Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger:
A family of weak keys in HFE and the corresponding practical key-recovery. J. Math. Cryptol. 5(3-4): 247-275 (2012) - [j1]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller, Vincent Rijmen:
Low-Data Complexity Attacks on AES. IEEE Trans. Inf. Theory 58(11): 7002-7017 (2012)
Conference and Workshop Papers
- 2024
- [c139]Olivier Bernard, Pierre-Alain Fouque, Andrea Lesavourey:
Computing e-th roots in number fields. ALENEX 2024: 207-219 - [c138]Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks. Software Engineering 2024: 143-144 - [c137]Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
"These results must be false": A usability evaluation of constant-time analysis tools. USENIX Security Symposium 2024 - 2023
- [c136]Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner:
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. ASIACRYPT (4) 2023: 138-166 - [c135]Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque, Karthikeyan Bhargavan:
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake. EuroS&P 2023: 707-723 - [c134]Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen:
A Generic Transform from Multi-round Interactive Proof to NIZK. Public Key Cryptography (2) 2023: 461-481 - 2022
- [c133]Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking. ACNS 2022: 399-418 - [c132]Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen:
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool. ASIACRYPT (3) 2022: 68-88 - [c131]Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
WideLeak: How Over-the-Top Platforms Fail in Android. DSN 2022: 501-508 - [c130]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon. EUROCRYPT (3) 2022: 222-253 - [c129]Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert:
MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing. SAC 2022: 1666-1673 - [c128]Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
Exploring Widevine for Fun and Profit. SP (Workshops) 2022: 277-288 - [c127]Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks. SP 2022: 632-649 - 2021
- [c126]Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild. CCS 2021: 2497-2512 - [c125]Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle:
SSE and SSD: Page-Efficient Searchable Symmetric Encryption. CRYPTO (3) 2021: 157-184 - [c124]Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque:
Towards Faster Polynomial-Time Lattice Reduction. CRYPTO (2) 2021: 760-790 - [c123]Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete:
How to (Legally) Keep Secrets from Mobile Operators. ESORICS (1) 2021: 23-43 - [c122]Julien Devigne, Céline Duguey, Pierre-Alain Fouque:
MLS Group Messaging: How Zero-Knowledge Can Secure Updates. ESORICS (2) 2021: 587-607 - 2020
- [c121]Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque:
Multi-Device for Signal. ACNS (2) 2020: 167-187 - [c120]Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild. ACSAC 2020: 291-303 - [c119]Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque:
Fast Reduction of Algebraic Lattices over Cyclotomic Fields. CRYPTO (2) 2020: 155-185 - [c118]Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k). CRYPTO (2) 2020: 186-212 - [c117]Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe:
Designing Reverse Firewalls for the Real World. ESORICS (1) 2020: 193-213 - [c116]Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices. EUROCRYPT (3) 2020: 34-63 - [c115]Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët:
Netspot: a simple Intrusion Detection System with statistical learning. TrustCom 2020: 911-918 - 2019
- [c114]Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation. ACNS 2019: 344-362 - [c113]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. CCS 2019: 2147-2164 - [c112]Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert:
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. ESORICS (1) 2019: 300-318 - [c111]Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. EuroS&P 2019: 294-309 - 2018
- [c110]Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders:
Pattern Matching on Encrypted Streams. ASIACRYPT (1) 2018: 121-148 - [c109]Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. ASIACRYPT (1) 2018: 494-524 - [c108]Cécile Baritel-Ruet, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire:
Formal Security Proof of CMAC and Its Variants. CSF 2018: 91-104 - [c107]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. EUROCRYPT (2) 2018: 354-384 - [c106]Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët:
Are your data gathered? KDD 2018: 2210-2218 - [c105]Pauline Bert, Pierre-Alain Fouque, Adeline Roux-Langlois, Mohamed Sabt:
Practical Implementation of Ring-SIS/LWE Based Signature and IBE. PQCrypto 2018: 271-291 - [c104]Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:
Variants of the AES Key Schedule for Better Truncated Differential Bounds. SAC 2018: 27-49 - [c103]Karthikeyan Bhargavan, Ioana Boureanu, Antoine Delignat-Lavaud, Pierre-Alain Fouque, Cristina Onete:
A Formal Treatment of Accountable Proxying Over TLS. IEEE Symposium on Security and Privacy 2018: 799-816 - 2017
- [c102]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers. CCS 2017: 1857-1874 - [c101]Paul Kirchner, Pierre-Alain Fouque:
Revisiting Lattice Attacks on Overstretched NTRU Parameters. EUROCRYPT (1) 2017: 3-26 - [c100]Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner:
Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L|Δ𝕂|(½) and Application to the Cryptanalysis of a FHE Scheme. EUROCRYPT (1) 2017: 60-88 - [c99]Karthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Content delivery over TLS: a cryptographic analysis of keyless SSL. EuroS&P 2017: 1-6 - [c98]Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët:
Anomaly Detection in Streams with Extreme Value Theory. KDD 2017: 1067-1075 - [c97]Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque, Paul Kirchner:
Fast Lattice-Based Encryption: Stretching Spring. PQCrypto 2017: 125-142 - 2016
- [c96]Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Cristina Onete, Benjamin Richard:
A Cryptographic Analysis of UMTS/LTE AKA. ACNS 2016: 18-35 - [c95]Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque:
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing. ACNS 2016: 561-579 - [c94]Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud:
Efficient and Provable White-Box Primitives. ASIACRYPT (1) 2016: 159-188 - [c93]Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected Implementations with the Atomicity Technique. The New Codebreakers 2016: 479-493 - [c92]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini:
Strong Non-Interference and Type-Directed Higher-Order Masking. CCS 2016: 116-129 - [c91]Pierre-Alain Fouque, Chen Qian:
Fault Attacks on Efficient Pairing Implementations. AsiaCCS 2016: 641-650 - [c90]Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner:
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes. COCOON 2016: 269-280 - [c89]Patrick Derbez, Pierre-Alain Fouque:
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. CRYPTO (2) 2016: 157-184 - [c88]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. CT-RSA 2016: 236-252 - [c87]Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Map over the Integers. EUROCRYPT (1) 2016: 509-536 - [c86]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. SAC 2016: 140-158 - 2015
- [c85]Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman:
Key-Recovery Attacks on ASASA. ASIACRYPT (2) 2015: 3-27 - [c84]Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque:
Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism. AsiaCCS 2015: 203-214 - [c83]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. CHES 2015: 395-415 - [c82]Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. CRYPTO (1) 2015: 43-62 - [c81]Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of the Co-ACD Assumption. CRYPTO (1) 2015: 561-580 - [c80]Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE. CRYPTO (1) 2015: 683-701 - [c79]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. EUROCRYPT (1) 2015: 457-485 - 2014
- [c78]Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. ASIACRYPT (1) 2014: 262-281 - [c77]Sonia Belaïd, Pierre-Alain Fouque, Benoît Gérard:
Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM. ASIACRYPT (2) 2014: 306-325 - [c76]Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati:
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE. ASIACRYPT (1) 2014: 420-438 - [c75]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz:
Synthesis of Fault Attacks on Cryptographic Implementations. CCS 2014: 1016-1027 - [c74]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure against Non-random Faults. CHES 2014: 206-222 - [c73]Pierre-Alain Fouque, Jean-Christophe Zapalowicz:
Statistical Properties of Short RSA Distribution and Their Cryptographic Applications. COCOON 2014: 525-536 - [c72]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation with Fewer Random Bits. ICALP (1) 2014: 991-1002 - [c71]Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Binary Elligator Squared. Selected Areas in Cryptography 2014: 20-37 - [c70]Daniel Augot, Pierre-Alain Fouque, Pierre Karpman:
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation. Selected Areas in Cryptography 2014: 243-260 - 2013
- [c69]Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi:
Injective Encodings to Elliptic Curves. ACISP 2013: 203-218 - [c68]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. CHES 2013: 471-488 - [c67]Pierre-Alain Fouque, Damien Vergnaud, Jean-Christophe Zapalowicz:
Time/Memory/Data Tradeoffs for Variants of the RSA Problem. COCOON 2013: 651-662 - [c66]Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin:
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128. CRYPTO (1) 2013: 183-203 - [c65]Cyril Arnaud, Pierre-Alain Fouque:
Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL. CT-RSA 2013: 18-33 - [c64]Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber:
Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem. EUROCRYPT 2013: 211-227 - [c63]Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean:
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. EUROCRYPT 2013: 371-387 - [c62]Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks. FSE 2013: 502-517 - [c61]Patrick Derbez, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. FSE 2013: 541-560 - [c60]Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Recovering Private Keys Generated with Weak PRNGs. IMACC 2013: 158-172 - [c59]Pierre-Alain Fouque, Pierre Karpman:
Security Amplification against Meet-in-the-Middle Attacks Using Whitening. IMACC 2013: 252-269 - 2012
- [c58]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. CHES 2012: 447-462 - [c57]Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech:
Generic Indifferentiability Proofs of Hash Designs. CSF 2012: 340-353 - [c56]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures from Lossy Identification Schemes. EUROCRYPT 2012: 572-590 - [c55]Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean:
Faster Chosen-Key Distinguishers on Reduced-Round AES. INDOCRYPT 2012: 225-243 - [c54]Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque:
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. IWSEC 2012: 197-215 - [c53]Pierre-Alain Fouque, Mehdi Tibouchi:
Indifferentiable Hashing to Barreto-Naehrig Curves. LATINCRYPT 2012: 1-17 - [c52]Pierre-Alain Fouque, Delphine Leresteux, Frédéric Valette:
Using faults for buffer overflow effects. SAC 2012: 1638-1639 - 2011
- [c51]Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux:
Cache Timing Analysis of RC4. ACNS 2011: 110-129 - [c50]Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat:
Practical Key-Recovery for All Possible Parameters of SFLASH. ASIACRYPT 2011: 667-685 - [c49]Patrick Derbez, Pierre-Alain Fouque, Delphine Leresteux:
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES. CHES 2011: 274-291 - [c48]Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque:
Automatic Search of Attacks on Round-Reduced AES and Applications. CRYPTO 2011: 169-187 - [c47]Jérémy Jean, Pierre-Alain Fouque:
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function. FSE 2011: 107-127 - [c46]Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret:
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. Public Key Cryptography 2011: 473-493 - [c45]Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent:
New Insights on Impossible Differential Cryptanalysis. Selected Areas in Cryptography 2011: 243-259 - 2010
- [c44]Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque:
Another Look at Complementation Properties. FSE 2010: 347-364 - [c43]Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. LATINCRYPT 2010: 81-91 - [c42]Pierre-Alain Fouque, Mehdi Tibouchi:
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves. Pairing 2010: 265-277 - [c41]Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque:
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512. Selected Areas in Cryptography 2010: 18-35 - [c40]Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent:
Security Analysis of SIMD. Selected Areas in Cryptography 2010: 351-368 - [c39]Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien Stern, Jacques Traoré:
On Some Incompatible Properties of Voting Schemes. Towards Trustworthy Elections 2010: 191-199 - 2009
- [c38]Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette:
Practical Electromagnetic Template Attack on HMAC. CHES 2009: 66-80 - [c37]Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer:
Optimal Randomness Extraction from a Diffie-Hellman Element. EUROCRYPT 2009: 572-589 - [c36]Pierre-Alain Fouque, Delphine Masgana, Frédéric Valette:
Fault Attack on Schnorr Based Identification and Signature Schemes. FDTC 2009: 32-38 - 2008
- [c35]Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer:
On the Security of the CCM Encryption Mode and of a Slight Variant. ACNS 2008: 411-428 - [c34]Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer:
HMAC is a randomness extractor and applications to TLS. AsiaCCS 2008: 21-32 - [c33]Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi:
The Carry Leakage on the Randomized Exponent Countermeasure. CHES 2008: 198-213 - [c32]Pierre-Alain Fouque, Gaëtan Leurent:
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. CT-RSA 2008: 19-35 - [c31]Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern:
Key Recovery on Hidden Monomial Multivariate Schemes. EUROCRYPT 2008: 19-30 - [c30]Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions. EUROCRYPT 2008: 270-288 - [c29]Pierre-Alain Fouque, Reynald Lercier, Denis Réal, Frédéric Valette:
Fault Attack onElliptic Curve Montgomery Ladder Implementation. FDTC 2008: 92-98 - [c28]Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern:
Total Break of the l-IC Signature Scheme. Public Key Cryptography 2008: 1-17 - [c27]Pierre-Alain Fouque, Jacques Stern, Sébastien Zimmer:
Cryptanalysis of Tweaked Versions of SMASH and Reparation. Selected Areas in Cryptography 2008: 136-150 - [c26]Charles Bouillaguet, Pierre-Alain Fouque:
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques. Selected Areas in Cryptography 2008: 245-261 - 2007
- [c25]Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Cryptanalysis of the SFLASH Signature Scheme. Inscrypt 2007: 1-4 - [c24]Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Practical Cryptanalysis of SFLASH. CRYPTO 2007: 1-12 - [c23]Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen:
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. CRYPTO 2007: 13-30 - [c22]Vivien Dubois, Pierre-Alain Fouque, Jacques Stern:
Cryptanalysis of SFLASH with Slightly Modified Parameters. EUROCRYPT 2007: 264-275 - 2006
- [c21]Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette:
Power Attack on Small RSA Public Exponent. CHES 2006: 339-353 - [c20]Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer:
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. ICALP (2) 2006: 240-251 - [c19]Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval:
The Twist-AUgmented Technique for Key Exchange. Public Key Cryptography 2006: 410-426 - [c18]Éric Levieil, Pierre-Alain Fouque:
An Improved LPN Algorithm. SCN 2006: 348-359 - 2005
- [c17]Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval:
A Simple Threshold Authenticated Key Exchange from Short Secrets. ASIACRYPT 2005: 566-584 - [c16]Pierre-Alain Fouque, Louis Granboulan, Jacques Stern:
Differential Cryptanalysis for Multivariate Schemes. EUROCRYPT 2005: 341-353 - [c15]Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. Public Key Cryptography 2005: 65-84 - 2004
- [c14]Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette:
Defeating Countermeasures Based on Randomized BSD Representations. CHES 2004: 312-327 - [c13]Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard:
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Selected Areas in Cryptography 2004: 212-226 - 2003
- [c12]Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard:
The Insecurity of Esign in Practical Implementations. ASIACRYPT 2003: 492-506 - [c11]Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard:
Attacking Unbalanced RSA-CRT Using SPA. CHES 2003: 254-268 - [c10]Pierre-Alain Fouque, Frédéric Valette:
The Doubling Attack - Why Upwards Is Better than Downwards. CHES 2003: 269-280 - [c9]Pierre-Alain Fouque, Guillaume Poupard:
On the Security of RDSA. EUROCRYPT 2003: 462-476 - [c8]Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard:
Practical Symmetric On-Line Encryption. FSE 2003: 362-375 - [c7]Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette:
Authenticated On-Line Encryption. Selected Areas in Cryptography 2003: 145-159 - 2002
- [c6]Pierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers:
CryptoComputing with Rationals. Financial Cryptography 2002: 136-146 - 2001
- [c5]Pierre-Alain Fouque, Jacques Stern:
Fully Distributed Threshold RSA under Standard Assumptions. ASIACRYPT 2001: 310-330 - [c4]Pierre-Alain Fouque, David Pointcheval:
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. ASIACRYPT 2001: 351-368 - [c3]Pierre-Alain Fouque, Jacques Stern:
One Round Threshold Discrete-Log Key Generation without Private Channels. Public Key Cryptography 2001: 300-316 - [c2]Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Guillaume Poupard:
Practical multi-candidate election system. PODC 2001: 274-283 - 2000
- [c1]Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern:
Sharing Decryption in the Context of Voting or Lotteries. Financial Cryptography 2000: 90-104
Editorship
- 2009
- [e1]Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud:
Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. Lecture Notes in Computer Science 5536, 2009, ISBN 978-3-642-01956-2 [contents]
Informal and Other Publications
- 2024
- [i105]Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Factoring. IACR Cryptol. ePrint Arch. 2024: 222 (2024) - [i104]Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, Brice Minaud:
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes. IACR Cryptol. ePrint Arch. 2024: 609 (2024) - [i103]Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Information Set Decoding. IACR Cryptol. ePrint Arch. 2024: 907 (2024) - [i102]Clémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, Alexandre Wallet:
A reduction from Hawk to the principal ideal problem in a quaternion algebra. IACR Cryptol. ePrint Arch. 2024: 1147 (2024) - 2023
- [i101]Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque, Karthikeyan Bhargavan:
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake. CoRR abs/2307.09243 (2023) - [i100]Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME. CoRR abs/2308.05416 (2023) - [i99]Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen:
A Generic Transform from Multi-Round Interactive Proof to NIZK. IACR Cryptol. ePrint Arch. 2023: 334 (2023) - [i98]Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner:
We Are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. IACR Cryptol. ePrint Arch. 2023: 801 (2023) - [i97]Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Goubin, Robin Larrieu, Brice Minaud:
Rectangular Attack on VOX. IACR Cryptol. ePrint Arch. 2023: 1822 (2023) - 2022
- [i96]Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
Exploring Widevine for Fun and Profit. CoRR abs/2204.09298 (2022) - [i95]Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu:
BAT: Small and Fast KEM over NTRU Lattices. IACR Cryptol. ePrint Arch. 2022: 31 (2022) - [i94]Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert:
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing. IACR Cryptol. ePrint Arch. 2022: 486 (2022) - [i93]Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen:
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool. IACR Cryptol. ePrint Arch. 2022: 725 (2022) - 2021
- [i92]Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard:
Fake Near Collisions Attacks. IACR Cryptol. ePrint Arch. 2021: 21 (2021) - [i91]Patrick Derbez, Pierre-Alain Fouque:
Increasing Precision of Division Property. IACR Cryptol. ePrint Arch. 2021: 22 (2021) - [i90]Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild. IACR Cryptol. ePrint Arch. 2021: 553 (2021) - [i89]Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle:
SSE and SSD: Page-Efficient Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2021: 716 (2021) - [i88]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: a simpler, parallelizable, maskable variant of Falcon. IACR Cryptol. ePrint Arch. 2021: 1486 (2021) - [i87]Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking. IACR Cryptol. ePrint Arch. 2021: 1487 (2021) - [i86]Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
âTheyâre not that hard to mitigateâ: What Cryptographic Library Developers Think About Timing Attacks. IACR Cryptol. ePrint Arch. 2021: 1650 (2021) - 2020
- [i85]Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild. CoRR abs/2012.02745 (2020) - [i84]Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE). IACR Cryptol. ePrint Arch. 2020: 684 (2020) - [i83]Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)). IACR Cryptol. ePrint Arch. 2020: 707 (2020) - [i82]Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10. IACR Cryptol. ePrint Arch. 2020: 780 (2020) - [i81]Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe:
Designing Reverse Firewalls for the Real World. IACR Cryptol. ePrint Arch. 2020: 854 (2020) - [i80]Paul Kirchner, Pierre-Alain Fouque:
Getting Rid of Linear Algebra in Number Theory Problems. IACR Cryptol. ePrint Arch. 2020: 1619 (2020) - 2019
- [i79]Thomas Espitau, Paul Kirchner, Pierre-Alain Fouque:
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond. CoRR abs/1912.04586 (2019) - [i78]Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:
Variants of the AES Key Schedule for Better Truncated Differential Bounds. IACR Cryptol. ePrint Arch. 2019: 95 (2019) - [i77]Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. IACR Cryptol. ePrint Arch. 2019: 96 (2019) - [i76]Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin:
Linearly equivalent S-boxes and the Division Property. IACR Cryptol. ePrint Arch. 2019: 97 (2019) - [i75]Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. IACR Cryptol. ePrint Arch. 2019: 367 (2019) - [i74]Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation. IACR Cryptol. ePrint Arch. 2019: 394 (2019) - [i73]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. IACR Cryptol. ePrint Arch. 2019: 511 (2019) - [i72]Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard:
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks. IACR Cryptol. ePrint Arch. 2019: 537 (2019) - [i71]Raphael Bost, Pierre-Alain Fouque:
Security-Efficiency Tradeoffs in Searchable Encryption - Lower Bounds and Optimal Constructions. IACR Cryptol. ePrint Arch. 2019: 693 (2019) - [i70]Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
The privacy of the TLS 1.3 protocol. IACR Cryptol. ePrint Arch. 2019: 749 (2019) - [i69]Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Uprooting the Falcon Tree? IACR Cryptol. ePrint Arch. 2019: 1180 (2019) - [i68]Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque:
Multi-Device for Signal. IACR Cryptol. ePrint Arch. 2019: 1363 (2019) - [i67]Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque:
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond. IACR Cryptol. ePrint Arch. 2019: 1436 (2019) - 2018
- [i66]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. IACR Cryptol. ePrint Arch. 2018: 381 (2018) - [i65]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub:
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations. IACR Cryptol. ePrint Arch. 2018: 505 (2018) - [i64]Gilles Barthe, Sonia Belaïd, Pierre-Alain Fouque, Benjamin Grégoire:
maskVerif: a formal tool for analyzing software and hardware masked implementations. IACR Cryptol. ePrint Arch. 2018: 562 (2018) - [i63]Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner:
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes. IACR Cryptol. ePrint Arch. 2018: 653 (2018) - [i62]Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. IACR Cryptol. ePrint Arch. 2018: 822 (2018) - 2017
- [i61]Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner:
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme. IACR Cryptol. ePrint Arch. 2017: 142 (2017) - [i60]Olivier Sanders, Cristina Onete, Pierre-Alain Fouque:
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data. IACR Cryptol. ePrint Arch. 2017: 148 (2017) - [i59]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. IACR Cryptol. ePrint Arch. 2017: 505 (2017) - [i58]Raphael Bost, Pierre-Alain Fouque:
Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding. IACR Cryptol. ePrint Arch. 2017: 1060 (2017) - 2016
- [i57]Raphael Bost, Pierre-Alain Fouque, David Pointcheval:
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security. IACR Cryptol. ePrint Arch. 2016: 62 (2016) - [i56]Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Map over the Integers. IACR Cryptol. ePrint Arch. 2016: 135 (2016) - [i55]Paul Kirchner, Pierre-Alain Fouque:
Time-Memory Trade-Off for Lattice Enumeration in a Ball. IACR Cryptol. ePrint Arch. 2016: 222 (2016) - [i54]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. IACR Cryptol. ePrint Arch. 2016: 231 (2016) - [i53]Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Benjamin Richard, Cristina Onete:
A Cryptographic Analysis of UMTS/LTE AKA. IACR Cryptol. ePrint Arch. 2016: 371 (2016) - [i52]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures. IACR Cryptol. ePrint Arch. 2016: 449 (2016) - [i51]Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. IACR Cryptol. ePrint Arch. 2016: 480 (2016) - [i50]Patrick Derbez, Pierre-Alain Fouque:
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. IACR Cryptol. ePrint Arch. 2016: 579 (2016) - [i49]Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud:
Efficient and Provable White-Box Primitives. IACR Cryptol. ePrint Arch. 2016: 642 (2016) - [i48]Paul Kirchner, Pierre-Alain Fouque:
Comparison between Subfield and Straightforward Attacks on NTRU. IACR Cryptol. ePrint Arch. 2016: 717 (2016) - [i47]Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner:
Computing generator in cyclotomic integer rings. IACR Cryptol. ePrint Arch. 2016: 957 (2016) - 2015
- [i46]Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. CoRR abs/1506.02717 (2015) - [i45]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. IACR Cryptol. ePrint Arch. 2015: 60 (2015) - [i44]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. IACR Cryptol. ePrint Arch. 2015: 204 (2015) - [i43]Patrick Derbez, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. IACR Cryptol. ePrint Arch. 2015: 259 (2015) - [i42]Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. IACR Cryptol. ePrint Arch. 2015: 312 (2015) - [i41]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire:
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler. IACR Cryptol. ePrint Arch. 2015: 506 (2015) - [i40]Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE. IACR Cryptol. ePrint Arch. 2015: 515 (2015) - [i39]Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman:
Key-Recovery Attacks on ASASA. IACR Cryptol. ePrint Arch. 2015: 516 (2015) - [i38]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 542 (2015) - [i37]Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. IACR Cryptol. ePrint Arch. 2015: 552 (2015) - [i36]Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected implementations with the Atomicity Technique. IACR Cryptol. ePrint Arch. 2015: 794 (2015) - [i35]Brice Minaud, Pierre-Alain Fouque:
Cryptanalysis of the New Multilinear Map over the Integers. IACR Cryptol. ePrint Arch. 2015: 941 (2015) - 2014
- [i34]Jérôme Plût, Pierre-Alain Fouque, Gilles Macario-Rat:
Solving the "Isomorphism of Polynomials with Two Secrets" Problem for all Pairs of Quadratic Forms. CoRR abs/1406.3163 (2014) - [i33]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. CoRR abs/1406.7078 (2014) - [i32]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure Against Non-Random Faults. IACR Cryptol. ePrint Arch. 2014: 252 (2014) - [i31]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz:
Synthesis of Fault Attacks on Cryptographic Implementations. IACR Cryptol. ePrint Arch. 2014: 436 (2014) - [i30]Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Binary Elligator Squared. IACR Cryptol. ePrint Arch. 2014: 486 (2014) - [i29]Daniel Augot, Pierre-Alain Fouque, Pierre Karpman:
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation. IACR Cryptol. ePrint Arch. 2014: 551 (2014) - 2013
- [i28]Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin:
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. IACR Cryptol. ePrint Arch. 2013: 366 (2013) - [i27]Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi:
Injective Encoding to Elliptic Curves. IACR Cryptol. ePrint Arch. 2013: 373 (2013) - [i26]Pierre-Alain Fouque, Pierre Karpman:
Security Amplification against Meet-in-the-Middle Attacks Using Whitening. IACR Cryptol. ePrint Arch. 2013: 618 (2013) - [i25]Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati:
Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince. IACR Cryptol. ePrint Arch. 2013: 761 (2013) - [i24]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures From Lossy Identification Schemes. IACR Cryptol. ePrint Arch. 2013: 856 (2013) - 2012
- [i23]Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque:
Automatic Search of Attacks on round-reduced AES and Applications. IACR Cryptol. ePrint Arch. 2012: 69 (2012) - [i22]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. IACR Cryptol. ePrint Arch. 2012: 172 (2012) - [i21]Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean:
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. IACR Cryptol. ePrint Arch. 2012: 477 (2012) - [i20]Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber:
Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem. IACR Cryptol. ePrint Arch. 2012: 607 (2012) - 2011
- [i19]Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat:
Practical Key-recovery For All Possible Parameters of SFLASH. IACR Cryptol. ePrint Arch. 2011: 271 (2011) - [i18]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. IACR Cryptol. ePrint Arch. 2011: 481 (2011) - 2010
- [i17]Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. IACR Cryptol. ePrint Arch. 2010: 37 (2010) - [i16]Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent:
Security Analysis of SIMD. IACR Cryptol. ePrint Arch. 2010: 323 (2010) - [i15]Pierre-Alain Fouque, Mehdi Tibouchi:
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2010: 382 (2010) - [i14]Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret:
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. IACR Cryptol. ePrint Arch. 2010: 504 (2010) - [i13]Reza Rezaeian Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, José Felipe Voloch:
Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2010: 539 (2010) - [i12]Jérémy Jean, Pierre-Alain Fouque:
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function. IACR Cryptol. ePrint Arch. 2010: 569 (2010) - [i11]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque:
Low Data Complexity Attacks on AES. IACR Cryptol. ePrint Arch. 2010: 633 (2010) - 2009
- [i10]Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Antoine Joux:
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions. IACR Cryptol. ePrint Arch. 2009: 77 (2009) - [i9]Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret:
Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem. IACR Cryptol. ePrint Arch. 2009: 583 (2009) - [i8]Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger:
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery). IACR Cryptol. ePrint Arch. 2009: 619 (2009) - [i7]Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque:
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3512. IACR Cryptol. ePrint Arch. 2009: 634 (2009) - 2007
- [i6]Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Practical Cryptanalysis of SFLASH. IACR Cryptol. ePrint Arch. 2007: 141 (2007) - [i5]Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen:
Automatic Search of Differential Path in MD4. IACR Cryptol. ePrint Arch. 2007: 206 (2007) - [i4]Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions. IACR Cryptol. ePrint Arch. 2007: 395 (2007) - 2005
- [i3]Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval:
Key Derivation and Randomness Extraction. IACR Cryptol. ePrint Arch. 2005: 61 (2005) - 2004
- [i2]Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. IACR Cryptol. ePrint Arch. 2004: 233 (2004) - 2001
- [i1]Pierre-Alain Fouque, Jacques Stern:
Fully Distributed Threshold RSA under Standard Assumptions. IACR Cryptol. ePrint Arch. 2001: 8 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint