Crypto Team - CASCADE



Cryptography (see more details)

Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet. They are essential to protect our on-line bank transactions, credit cards, medical and personal information and to support e-commerce and e-government. They come in different flavors. Encryption algorithms are essential to protect sensitive information such as medical data, financial information and Personal Identification Numbers (PINs) from prying eyes. Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms. Identification protocols allow to securely verify the identity of the party at the other end of the line. Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole.

The research activity of the project-team CASCADE addresses the following topics, which cover almost all the domains that are currently active in the international cryptographic community, but mainly in the public-key area:


Research

Teaching

How to find us

Wiki


Members of the Team

Head of the team: David Pointcheval

Researchers

Associated Members

Post-Docs

  • Angelo De Caro - CDD Fondation ENS (Chaire France Telecom)
  • Itai Dinur - CDD ENS (FSMP)
  • Thomas Peters - CDD CNRS (ERC CryptoCloud)

Ph.D. Students

  • Fabrice Ben Hamouda - 2012 - ENS
  • Florian Bourse - 2014 - CNRS (ERC CryptoCloud)
  • Mario Cornejo - 2013 - INRIA
  • Geoffroy Couteau - 2014 - CNRS (ERC CryptoCloud)
  • Rafael Del Pino - 2014 - INRIA (FUI CryptoComp? )
  • Pierrick Meaux - 2014 - INRIA (ANR CLE)
  • Alain Passelègue - 2013 - ENS (ANR PRINCE / DGA)

Ph.D. Students in collaboration with the Industry

  • Sylvain Ruhault - 2011 - Oppida
  • Sonia Belaid - 2012 - Thales
  • Jérémie Clément - 2013 - Thèse CIFRE Crocus
  • Simon Cogliani - 2013 - Thèse CIFRE CS
  • Houda Ferradi - 2013
  • Diana Maimut - 2011
  • Thomas Prest - 2012 - Thèse CIFRE Thales
  • Oliviers Sanders - 2012 - Thèse CIFRE Orange Labs
  • Adrian Thillard - 2013 - ANSSI

Visitors

Pre-Docs

  • Romain Gay
  • Anca Nitulescu

Former Members

Activities

Crypto Seminar

Working Groups

Collaborative Research Projects

  • 2014-2018: ANR JCJC EnBiD: Encryption for Big Data
  • 2014-2019: ERC Advanced Grant CryptoCloud: Cryptography for the Cloud
  • 2013-2017: ANR JCJC CLE: Cryptography from learning with errors
  • 2013-2016: ANR INS SIMPATIC: SIM and PAiring Theory for Information and Communications security
  • 2012-2016: ANR JCJC ROMAnTIC: Randomness in mathematical cryptography
  • 2011-2015: ANR ARPEGE PRINCE: Proven Resilience against Information leakage in Cryptographic Engineering
  • 2011-2015: ANR VERSO ProSe: Security protocols : formal model, computational model, and implementations

  • 2011-2014: ICT EU-Brazil SecFuNet: Security for Future Networks
  • 2010-2013: ANR VERSO BEST: Broadcast Encryption for Secure Telecommunications
  • 2009-2013: ANR VERSO SAPHIR II: Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes (Security and analysis of innovating and recent hashing primitives)
  • 2008-2012: We lead the MAYA virtual lab of the network of excellence ECRYPT II
  • 2007-2011: ANR SESUR PAMPA: Password Authentication and Methods for Privacy and Anonymity
  • 2007-2011: ANR TELECOM PACE: Pairings and Advances in Cryptology for E-cash
  • 2006-2010: ANR TELECOM SAVE: Sécurité et Audit du Vote Electronique (Security and audit for electronic voting)
  • 2005-2009: ANR RNRT BACH: Biometric Authentication with Cryptographic Handling
  • 2005-2009: ANR RNRT SAPHIR: Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes (Security and analysis of innovating and recent hashing primitives)
  • 2005-2009: ARA SSIA CrySCoE: Cryptographie pour la sécurité des codes embarqués (Cryptography for the security of embedded systems)
  • 2005-2009: ARA SSIA FORMACRYPT: Formal security proofs for cryptographic protocols
  • 2004-2008: We lead the AZTEC virtual lab of the network of excellence ECRYPT

Publications of the Team (since 2013)

2014

Journal articles

titre
Cryptris 1/2. Comprendre une des techniques les plus sophistiquées de cryptographie en... jouant à Tetris.
auteur
Anthony Teston, Léo Ducas, Mathieu Jouhet, Thierry Viéville
article
Image des Maths, CNRS, 2014, http://images.math.cnrs.fr/Cryptris-1-2-Comprendre-une-des.html
Accès au bibtex
BibTex
titre
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions
auteur
Michel Abdalla, Dario Catalano, Dario Fiore
article
Journal of Cryptology, Springer Verlag (Germany), 2014, 27 (3), pp.544-593. http://link.springer.com/article/10.1007%2Fs00145-013-9153-x. 10.1007/s00145-013-9153-x
Accès au bibtex
BibTex

Conference papers

titre
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
auteur
Tancrède Lepoint, Michael Naehrig
article
David Pointcheval; Damien Vergnaud. AFRICACRYPT 2014, May 2014, Marrakesh, Morocco. Springer, 8469, pp.318-335, Lecture Notes in Computer Science. 10.1007/978-3-319-06734-6_20
Accès au bibtex
BibTex
titre
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
auteur
Sébastien Canard, David Pointcheval, Olivier Sanders
article
Hugo Krawczyk. 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC '14), Mar 2014, Buenos Aires, Argentina. Springer, 8383, pp.167-183, LNCS; Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC '14)
Accès au bibtex
BibTex
titre
Scale-Invariant Fully-Homomorphic Encryption over the Integers
auteur
Tancrède Lepoint, Jean-Sébastien Coron, Mehdi Tibouchi
article
Hugo Krawczyk. PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2014, Buenos Aires, Argentina. Springer, 8383, pp.311-328, Public-Key Cryptography - PKC 2014; LNCS - Lecture Notes in Computer Science. 10.1007/978-3-642-54631-0_18
Accès au bibtex
BibTex
titre
Improved Generic Attacks Against Hash-based MACs and HAIFA
auteur
Itai Dinur, Gaëtan Leurent
article
CRYPTO 2014 - 34th Annual Cryptology Conference, Aug 2014, Santa Barbara, CA, United States. Springer, 8616, LNCS - Lecture Notes in Computer Science. 10.1007/978-3-662-44371-2_9
Accès au bibtex
BibTex
titre
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
auteur
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
article
Juan A. Garay and Rosario Gennaro. CRYPTO 2014, Aug 2014, Santa Barbara, United States. 8616, pp.77-94, Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO 2014. 10.1007/978-3-662-44371-2_5
Accès au bibtex
BibTex
titre
Improved Differential Cryptanalysis of Round-Reduced Speck
auteur
Itai Dinur
article
SAC 2014 - 21st International Conference Selected Areas in Cryptography, Aug 2014, Montreal, Canada
Accès au bibtex
BibTex
titre
Password-Based Authenticated Key Exchange: An Overview
auteur
Michel Abdalla
article
Sherman S. M. Chow; Joseph K. Liu; Lucas C. K. Hui; Siu Ming Yiu. PROVSEC 2014, Oct 2014, Hong Kong, China. Springer, 8782, pp.1-9, 10.1007/978-3-319-12475-9_1
Accès au bibtex
BibTex
titre
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
auteur
Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven
article
Palash Sarkar ; Tetsu Iwata. ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2014, Kaohsiung, Taiwan. Springer, 8873, pp.551-572 LNCS - Lecture Notes in Computer Science. 10.1007/978-3-662-45611-8_29
Accès au bibtex
BibTex
titre
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
auteur
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
article
Palash Sarkar ; Tetsu Iwata ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Dec 2014, Kaoshiung, Taiwan. Springer, 8873, pp.439-457 LNCS - Lecture Notes in Computer Science 10.1007/978-3-662-45611-8_23
Accès au bibtex
BibTex
titre
Algorithms for Outsourcing Pairing Computation
auteur
Aurore Guillevic, Damien Vergnaud
article
Marc Joye and Amir Moradi. CARDIS 2014, 13th Smart Card Research and Advanced Application Conference, Nov 2014, Paris, France. Springer, Lecture Notes in Computer Science (LNCS), http://cedric.cnam.fr/events/cardis/index.html
Accès au bibtex
BibTex
titre
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools
auteur
Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache
article
Xinyi Huang and Jianying Zhou. ISPEC 2014, May 2014, Fuzhou, China. Springer, 8434, pp.8-14, Lecture Notes in Computer Science. 10.1007/978-3-319-06320-1_2
Accès au bibtex
BibTex
titre
Characterization of Real-Life PRNGs under Partial State Corruption
auteur
Mario Cornejo, Sylvain Ruhault
article
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Nov 2014, Scottsdale, Arizona, United States. ACM, pp.1004-1015, 10.1145/2660267.2660377
Accès au bibtex
BibTex
titre
Cryptanalysis of FIDES
auteur
Itai Dinur, Jérémy Jean
article
FSE 2014 - 21st International Workshop on Fast Software Encryption, Mar 2014, London United Kingdom
Accès au bibtex
BibTex
titre
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
auteur
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
article
FSE 2014 - 21st International Workshop on Fast Software Encryption, Mar 2014, London, United Kingdom
Accès au bibtex
BibTex

Directions of work or proceedings

titre
Security and Cryptography for Networks - SCN 2014
auteur
Michel Abdalla, Roberto De Prisco
article
Michel Abdalla and Roberto De Prisco. 8642, Springer, pp.609, 2014, Lecture Notes in Computer Science, 10.1007/978-3-319-10879-7
Accès au bibtex
BibTex

Reports

titre
Disjunctions for Hash Proof Systems: New Constructions and Applications
auteur
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
article
[Technical Report] Cryptology ePrint Archive: Report 2014/483, 2014
Accès au bibtex
BibTex
titre
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
auteur
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
article
[Technical Report] Cryptology ePrint Archive: Report 2014/488, 2014
Accès au bibtex
BibTex
titre
Removing Erasures with Explainable Hash Proof Systems
auteur
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
article
[Technical Report] Cryptology ePrint Archive: Report 2014/125, 2014
Accès au bibtex
BibTex
titre
Structure-Preserving Encryption Indistinguishable Under Plaintext-Checkable Attacks
auteur
Michel Abdalla, Fabrice Benhamouda, David Pointcheval
article
[Technical Report] Cryptology ePrint Archive: Report 2014/609, IACR. 2014
Accès au bibtex
BibTex

Theses

titre
Design and Implementation of Lattice-Based Cryptography
auteur
Tancrède Lepoint
article
Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2014. English
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-01069864/file/thesis-lepoint-print.pdf BibTex

2013

Journal articles

titre
Short Blind Signatures
auteur
Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
article
Journal of Computer Security, IOS Press, 2013, 21 (5), pp.627-661. 10.3233/JCS-130477
Accès au bibtex
BibTex
titre
Pairing-based algorithms for Jacobians of genus 2 curves with maximal endomorphism ring
auteur
Sorina Ionica
article
Journal of Number Theory, Elsevier, 2013, 133, pp.3755-3770. 10.1016/j.jnt.2013.04.023
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-00675045/file/Draft5.pdf BibTex
titre
On Ideal Lattices and Learning with Errors over Rings
auteur
Vadim Lyubashevsky, Chris Peikert, Oded Regev
article
Journal of the ACM, ACM, 2013, 60 (6), 10.1145/2535925
Accès au bibtex
BibTex
titre
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
auteur
Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler
article
International Journal of Information Security, Springer Verlag (Germany), 2013, 12 (4), pp.251-265. 10.1007/s10207-013-0190-0
Accès au bibtex
BibTex
titre
A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards
auteur
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
article
Journal of Cryptographic Engineering, Springer, 2013, 3 (4), pp.241-265. 10.1007/s13389-013-0062-6
Accès au bibtex
BibTex
titre
Black-Box Trace&Revoke Codes
auteur
Hung Q. Ngo, Duong Hieu Phan, David Pointcheval
article
Algorithmica, Springer Verlag (Germany), 2013, 67 (3), pp.418-448. 10.1007/s00453-012-9702-y
Accès au bibtex
BibTex
titre
Communicating Covertly through CPU Monitoring
auteur
Jean-Michel Cioranesco, Houda Ferradi, David Naccache
article
IEEE Security & Privacy, IEEE, 2013, 11 (6), pp.71-73. 10.1109/MSP.2013.140
Accès au bibtex
BibTex
titre
Improved Cryptanalysis of AES-like Permutations
auteur
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
article
Journal of Cryptology, Springer Verlag (Germany), 2013
Accès au bibtex
BibTex

Conference papers

titre
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
auteur
Sonia Belaid, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre
article
SECRYPT 2013 - 10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland. Scitepress
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00872410/file/articleHMAC.pdf BibTex
titre
Instantaneous Frequency Analysis
auteur
Roman Korkikian, David Naccache, Guilherme Ozari De Almeida
article
DCNET/ICE-B/OPTICS 2013: IS-11 - 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Jul 2013, Reykjavík, Iceland. SciTePress
Accès au bibtex
BibTex
titre
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
auteur
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
article
EUROCRYPT 2013, May 2013, Athens, Greece
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870449/file/eurocrypt2013.pdf BibTex
titre
A toolkit for Ring-LWE cryptography
auteur
Vadim Lyubashevsky, Chris Peikert, Oded Regev
article
Johansson, Thomas and Nguyen, Phong Q. EUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. Springer, 7881, pp.35-54, Lecture Notes in Computer Science; Advances in Cryptology - EUROCRYPT 2013. 10.1007/978-3-642-38348-9_3
Accès au bibtex
BibTex
titre
Batch Fully Homomorphic Encryption over the Integers
auteur
Jung Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun
article
Johansson, Thomas and Nguyen, Phong Q. EUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. Springer, 7881, pp.315-335, Lecture Notes in Computer Science. 10.1007/978-3-642-38348-9_20
Accès au bibtex
BibTex
titre
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
auteur
Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
article
K. Kurosawa and G. Hanaoka. Public-Key Cryptography - PKC 2013, Feb 2013, Nara, Japan. Springer, 7778, pp.272-291, LNCS; Public-Key Cryptography - PKC 2013. 10.1007/978-3-642-36362-7_18
Accès au bibtex
BibTex
titre
Tighter Reductions for Forward-Secure Signature Scheme
auteur
Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval
article
K. Kurosawa and G. Hanaoka. Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. Springer, 7778, pp.292-311, LNCS; Public-Key Cryptography (PKC 2013). 10.1007/978-3-642-36362-7_19
Accès au bibtex
BibTex
titre
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
auteur
Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
article
Michael Jacobson and Michael Locasto and Payman Mohassel and Reihaneh Safavi-Naini. ACNS 2013 - 11th International Conference Applied Cryptography and Network Security, Jun 2013, Banff, Canada. Springer, 7954, pp.534-551, Lecture Notes in Computer Science; Applied Cryptography and Network Security. 10.1007/978-3-642-38980-1_34
Accès au bibtex
BibTex
titre
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
auteur
Aurore Guillevic
article
ACNS - 11th International Conference on Applied Cryptography and Network Security - 2013, Jun 2013, Banff, Canada
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00812960/file/Paper_v6.pdf BibTex
titre
Leakage-Resilient Symmetric Encryption via Re-keying
auteur
Michel Abdalla, Sonia Belaid, Pierre-Alain Fouque
article
Guido Bertoni and Jean-Sébastien Coron. Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. Springer, 8086, pp.471-488, Lecture Notes in Computer Science. 10.1007/978-3-642-40349-1_27
Accès au bibtex
BibTex
titre
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
auteur
Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
article
CRYPTO 2013, Aug 2013, Santa Barbara, United States
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870453/file/crypto2013.pdf BibTex
titre
How to (Carefully) Breach a Service Contract?
auteur
Céline Chevalier, Damien Gaumont, David Naccache
article
Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey
Accès au bibtex
BibTex
titre
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
auteur
Eric Brier, David Naccache, Li-Yao Xia
article
Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey
Accès au bibtex
BibTex
titre
Lattice signatures and bimodal Gaussians
auteur
Leo Ducas, Alain Durmus, Tancrede Lepoint, Vadim Lyubashevsky
article
Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, United States. Springer, 8042, pp.40-56, Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO 2013. 10.1007/978-3-642-40041-4_3
Accès au bibtex
BibTex
titre
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
auteur
Vadim Lyubashevsky, Daniel Masny
article
Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013, Aug 2013, Santa Barbara, United States. Springer, 8043, pp.308-325, Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO 2013. 10.1007/978-3-642-40084-1_18
Accès au bibtex
BibTex
titre
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
auteur
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
article
Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, CA, United States. Springer, 8042, pp.449-475, Lecture Notes in Computer Science. 10.1007/978-3-642-40041-4_25
Accès au bibtex
BibTex
titre
Practical Multilinear Maps over the Integers
auteur
Tancrède Lepoint, Jean-Sébastien Coron, Mehdi Tibouchi
article
Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference Advances in Cryptology, Aug 2013, Santa-Barbara, United States. Springer, 8042, pp.476-493, Advances in Cryptology - CRYPTO 2013; Lecture Notes in Computer Science. 10.1007/978-3-642-40041-4_26
Accès au bibtex
BibTex
titre
Multiple Limited-Birthday Distinguishers and Applications
auteur
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
article
Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870452/file/sac2013.pdf BibTex
titre
Two Attacks on a White-Box AES Implementation
auteur
Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Bart Preneel, Peter Roelse
article
SAC 2013 - Conference Selected Areas in Cryptography, Aug 2013, Burnaby, British Columbia, Canada
Accès au bibtex
BibTex
titre
White-Box Security Notions for Symmetric Encryption Schemes
auteur
Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
article
SAC 2013 - Conference Selected Areas in Cryptography, Aug 2013, Burnaby, British Columbia, Canada
Accès au bibtex
BibTex
titre
Security Analysis of PRINCE
auteur
Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
article
FSE 2013, Mar 2013, Singapore, Singapore
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870448/file/fse2013.pdf BibTex
titre
Multi-channel broadcast encryption.
auteur
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
article
ASIA CCS '13 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, May 2013, Hangzhou, China. ACM, pp.277-286, 10.1145/2484313.2484348
Accès au bibtex
BibTex
titre
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
auteur
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs
article
ACM CCS 2013 - 20th ACM Conference on Computer and Communications Security, Nov 2013, Berlin, Germany. ACM, 10.1145/2508859.2516653
Accès au bibtex
BibTex
titre
Four-Dimensional GLV via the Weil Restriction
auteur
Aurore Guillevic, Sorina Ionica
article
Kazue Sako and Palash Sarkar. Asiacrypt - 19th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2013, Bengalore, India. Springer
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00864966/file/version-5-nov-2013.pdf BibTex
titre
On the Minimal Number of Bootstrappings in Homomorphic Circuits
auteur
Tancrède Lepoint, Pascal Paillier
article
Adams, Andrew A. and Brenner, Michael and Smith, Matthew. Workshop on Applied Homomorphic Cryptography, Apr 2013, Okinawa, Japan. Springer, 7862, pp.189-200, Lecture Notes in Computer Science; Financial Cryptography and Data Security : FC 2013 Workshops, USEC and WAHC 2013. 10.1007/978-3-642-41320-9_13
Accès au bibtex
BibTex
titre
SPHF-Friendly Non-Interactive Commitments
auteur
Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
article
Kazue Sako and Palash Sarkar. ASIACRYPT 2013, Dec 2013, Bangalore, India. Springer, 8269, pp.214-234, Lecture Notes in Computer Science; Advances in Cryptology - ASIACRYPT 2013. 10.1007/978-3-642-42033-7_12
Accès au bibtex
BibTex
titre
Fault Attacks on Projective-to-Affine Coordinates Conversion
auteur
Diana Maimut, Cédric Murdica, David Naccache, Mehdi Tibouchi
article
COSADE 2013 - 4th International Workshop Constructive Side-Channel Analysis and Secure Design, Dec 2012, Paris, France. Springer, pp.46-61, 10.1007/978-3-642-40026-1_4
Accès au bibtex
BibTex
titre
Time/Memory/Data Tradeoffs for Variants of the RSA Problem
auteur
Pierre-Alain Fouque, Damien Vergnaud, Jean-Christophe Zapalowicz
article
Ding-Zhu Du and Guochuan Zhang. Computing and Combinatorics, 19th International Conference, COCOON 2013, Dec 2012, Hangzhou, China. Springer, 7936, pp.651-662, Lecture Notes in Computer Science; Computing and Combinatorics, 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings. 10.1007/978-3-642-38768-5_57
Accès au bibtex
BibTex
titre
Using Hamiltonian Totems as Passwords
auteur
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
article
SantaCrypt 2013, Dec 2012, Prague, Czech Republic
Accès au bibtex
BibTex

Directions of work or proceedings

titre
CANS 2013
auteur
Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
article
Michel Abdalla and Cristina Nita-Rotaru and Ricardo Dahab. 8257, Springer, pp.349, 2013, Lecture Notes in Computer Science, 978-3-319-02936-8. 10.1007/978-3-319-02937-5
Accès au bibtex
BibTex
titre
Pairing-Based Cryptography - PAIRING 2012
auteur
Michel Abdalla, Tanja Lange
article
Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. 10.1007/978-3-642-36334-4
Accès au bibtex
BibTex

Reports

titre
Dynamic Countermeasure Against the Zero Power Analysis
auteur
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
article
[Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013
Accès au bibtex
BibTex
titre
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
auteur
Eric Brier, David Naccache, Li-Yao Xia
article
[Research Report] IACR Cryptology ePrint Archive 2013: 432 (2013), 2013
Accès au bibtex
BibTex
titre
Instantaneous Frequency Analysis
auteur
Roman Korkikian, David Naccache, Guilherme Ozari De Almeida
article
[Research Report] IACR Cryptology ePrint Archive 2013: 320 (2013), 2013
Accès au bibtex
BibTex
titre
Using Hamiltonian Totems as Passwords
auteur
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
article
[Research Report] IACR Cryptology ePrint Archive 2013: 751 (2013), 2013
Accès au bibtex
BibTex

Theses

titre
Broadcast Encryption with Traitor Tracing
auteur
Mario Strefler
article
Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00870910/file/Stref13Thesis.pdf BibTex
titre
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher
auteur
Jérémy Jean
article
Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00911049/file/phd-thesis-jeremy-jean.pdf BibTex
titre
Arithmetic of pairings on algebraic curves for cryptography
auteur
Aurore Guillevic
article
Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00921940/file/Guillevic2013thesis.pdf BibTex
titre
Meet-in-the-Middle Attacks on AES
auteur
Patrick Derbez
article
Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00918146/file/these.pdf BibTex

 
Webmaster: webdi[@]di[.]ens[.]fr.