Crypto Team - CASCADE



Cryptography (see more details)

Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet. They are essential to protect our on-line bank transactions, credit cards, medical and personal information and to support e-commerce and e-government. They come in different flavors. Encryption algorithms are essential to protect sensitive information such as medical data, financial information and Personal Identification Numbers (PINs) from prying eyes. Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms. Identification protocols allow to securely verify the identity of the party at the other end of the line. Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole.

The research activity of the project-team CASCADE addresses the following topics, which cover almost all the domains that are currently active in the international cryptographic community, but mainly in the public-key area:


Research

Teaching

How to find us

Wiki


Members of the Team

Head of the team: David Pointcheval

Researchers

Associated Members

Post-Docs

  • Angelo De Caro - CDD Fondation ENS (Chaire France Telecom)
  • Itai Dinur - CDD ENS (FSMP)
  • Thomas Peters - CDD CNRS (ERC CryptoCloud)

Ph.D. Students

  • Fabrice Ben Hamouda - 2012 - ENS
  • Florian Bourse - 2014 - CNRS (ERC CryptoCloud)
  • Mario Cornejo - 2013 - INRIA
  • Geoffroy Couteau - 2014 - CNRS (ERC CryptoCloud)
  • Rafael Del Pino - 2014 - INRIA (FUI CryptoComp? )
  • Pierrick Meaux - 2014 - INRIA (ANR CLE)
  • Alain Passelègue - 2013 - ENS (ANR PRINCE / DGA)

Ph.D. Students in collaboration with the Industry

  • Sylvain Ruhault - 2011 - Oppida
  • Sonia Belaid - 2012 - Thales
  • Jérémie Clément - 2013 - Thèse CIFRE Crocus
  • Simon Cogliani - 2013 - Thèse CIFRE CS
  • Houda Ferradi - 2013
  • Diana Maimut - 2011
  • Thomas Prest - 2012 - Thèse CIFRE Thales
  • Oliviers Sanders - 2012 - Thèse CIFRE Orange Labs
  • Adrian Thillard - 2013 - ANSSI

Visitors

Pre-Docs

  • Romain Gay
  • Anca Nitulescu

Former Members

Activities

Crypto Seminar

Working Groups

Collaborative Research Projects

  • 2014-2018: ANR JCJC EnBiD: Encryption for Big Data
  • 2014-2019: ERC Advanced Grant CryptoCloud: Cryptography for the Cloud
  • 2013-2017: ANR JCJC CLE: Cryptography from learning with errors
  • 2013-2016: ANR INS SIMPATIC: SIM and PAiring Theory for Information and Communications security
  • 2012-2016: ANR JCJC ROMAnTIC: Randomness in mathematical cryptography
  • 2011-2015: ANR ARPEGE PRINCE: Proven Resilience against Information leakage in Cryptographic Engineering
  • 2011-2015: ANR VERSO ProSe: Security protocols : formal model, computational model, and implementations

  • 2011-2014: ICT EU-Brazil SecFuNet: Security for Future Networks
  • 2010-2013: ANR VERSO BEST: Broadcast Encryption for Secure Telecommunications
  • 2009-2013: ANR VERSO SAPHIR II: Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes (Security and analysis of innovating and recent hashing primitives)
  • 2008-2012: We lead the MAYA virtual lab of the network of excellence ECRYPT II
  • 2007-2011: ANR SESUR PAMPA: Password Authentication and Methods for Privacy and Anonymity
  • 2007-2011: ANR TELECOM PACE: Pairings and Advances in Cryptology for E-cash
  • 2006-2010: ANR TELECOM SAVE: Sécurité et Audit du Vote Electronique (Security and audit for electronic voting)
  • 2005-2009: ANR RNRT BACH: Biometric Authentication with Cryptographic Handling
  • 2005-2009: ANR RNRT SAPHIR: Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes (Security and analysis of innovating and recent hashing primitives)
  • 2005-2009: ARA SSIA CrySCoE: Cryptographie pour la sécurité des codes embarqués (Cryptography for the security of embedded systems)
  • 2005-2009: ARA SSIA FORMACRYPT: Formal security proofs for cryptographic protocols
  • 2004-2008: We lead the AZTEC virtual lab of the network of excellence ECRYPT

Publications of the Team (since 2013)

2014

Journal articles

ref_biblio
Anthony Teston, Léo Ducas, Mathieu Jouhet, Thierry Viéville. Cryptris 1/2. Comprendre une des techniques les plus sophistiquées de cryptographie en... jouant à Tetris.. Image des Maths, 2014, http://images.math.cnrs.fr/Cryptris-1-2-Comprendre-une-des.html. hal-01009430
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Dario Catalano, Dario Fiore. Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. Journal of Cryptology, Springer Verlag (Germany), 2014, 27 (3), pp.544-593. http://link.springer.com/article/10.1007%2Fs00145-013-9153-x. 10.1007/s00145-013-9153-x. hal-00915548
Accès au bibtex
BibTex

Conference papers

ref_biblio
Tancrède Lepoint, Jean-Sébastien Coron, Mehdi Tibouchi. Scale-Invariant Fully-Homomorphic Encryption over the Integers. Hugo Krawczyk. PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2014, Buenos Aires, Argentina. Springer, 8383, pp.311-328, Public-Key Cryptography - PKC 2014; LNCS - Lecture Notes in Computer Science. 10.1007/978-3-642-54631-0_18. hal-00950481
Accès au bibtex
BibTex
ref_biblio
Sébastien Canard, David Pointcheval, Olivier Sanders. Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. Hugo Krawczyk. 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC '14), Mar 2014, Buenos Aires, Argentina. Springer, 8383, pp.167-183, LNCS; Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC '14). hal-00940045
Accès au bibtex
BibTex
ref_biblio
Tancrède Lepoint, Michael Naehrig. A Comparison of the Homomorphic Encryption Schemes FV and YASHE. David Pointcheval, Damien Vergnaud. AFRICACRYPT 2014, May 2014, Marrakesh, Morocco. Springer, 8469, pp.318-335, Lecture Notes in Computer Science. 10.1007/978-3-319-06734-6_20. hal-01006484
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson. Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. Juan A. Garay and Rosario Gennaro. CRYPTO 2014, Aug 2014, Santa Barbara, United States. 8616, pp.77-94, Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO 2014. 10.1007/978-3-662-44371-2_5. hal-01068388
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla. Password-Based Authenticated Key Exchange: An Overview. Sherman S. M. Chow and Joseph K. Liu and Lucas C. K. Hui and Siu Ming Yiu. PROVSEC 2014, Oct 2014, Hong Kong, China. Springer, 8782, pp.1-9, Lecture Notes in Computer Science; 8th International Conference on Provable Security. 10.1007/978-3-319-12475-9_1. hal-01071313
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache. Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. Xinyi Huang and Jianying Zhou. ISPEC 2014, May 2014, Fuzhou, China. Springer, 8434, pp.8-14, Lecture Notes in Computer Science. 10.1007/978-3-319-06320-1_2. hal-01071319
Accès au bibtex
BibTex

Directions of work or proceedings

ref_biblio
Michel Abdalla, Roberto De Prisco. Security and Cryptography for Networks - SCN 2014. Michel Abdalla and Roberto De Prisco. 8642, Springer, pp.609, 2014, Lecture Notes in Computer Science, 10.1007/978-3-319-10879-7. hal-01068374
Accès au bibtex
BibTex

Reports

ref_biblio
Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Disjunctions for Hash Proof Systems: New Constructions and Applications. [Technical Report] Cryptology ePrint Archive: Report 2014/483, 2014. hal-01068420
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Fabrice Benhamouda, David Pointcheval. SPOKE: Simple Password-Only Key Exchange in the Standard Model. [Technical Report] Cryptology ePrint Archive: Report 2014/609, 2014. hal-01068416
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Removing Erasures with Explainable Hash Proof Systems. [Technical Report] Cryptology ePrint Archive: Report 2014/125, 2014. hal-01068442
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson. Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. [Technical Report] Cryptology ePrint Archive: Report 2014/488, 2014. hal-01068465
Accès au bibtex
BibTex

Theses

ref_biblio
Tancrède Lepoint. Design and Implementation of Lattice-Based Cryptography. Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2014. English. tel-01069864
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-01069864/file/thesis-lepoint-print.pdf BibTex

2013

Journal articles

ref_biblio
Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. Short Blind Signatures. Journal of Computer Security, 2013, 21 (5), pp.627-661. 10.3233/JCS-130477. hal-00921915
Accès au bibtex
BibTex
ref_biblio
Sorina Ionica. Pairing-based algorithms for Jacobians of genus 2 curves with maximal endomorphism ring. Journal of Number Theory, Elsevier, 2013, 133, pp.3755-3770. 10.1016/j.jnt.2013.04.023. hal-00675045v5
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-00675045/file/Draft5.pdf BibTex
ref_biblio
Vadim Lyubashevsky, Chris Peikert, Oded Regev. On Ideal Lattices and Learning with Errors over Rings. Journal of the ACM, 2013, 60 (6), 10.1145/2535925. hal-00921792
Accès au bibtex
BibTex
ref_biblio
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin. Improved Cryptanalysis of AES-like Permutations. Journal of Cryptology, Springer Verlag (Germany), 2013. hal-00907706
Accès au bibtex
BibTex
ref_biblio
Hung Q. Ngo, Duong Hieu Phan, David Pointcheval. Black-Box Trace&Revoke Codes. Algorithmica, Springer Verlag (Germany), 2013, 67 (3), pp.418-448. 10.1007/s00453-012-9702-y. hal-00763979
Accès au bibtex
BibTex
ref_biblio
Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. International Journal of Information Security, Springer Verlag (Germany), 2013, 12 (4), pp.251-265. 10.1007/s10207-013-0190-0. hal-00864357
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards. Journal of Cryptographic Engineering, 2013, 3 (4), pp.241-265. 10.1007/s13389-013-0062-6. hal-00934333
Accès au bibtex
BibTex
ref_biblio
Jean-Michel Cioranesco, Houda Ferradi, David Naccache. Communicating Covertly through CPU Monitoring. IEEE Security & Privacy, 2013, 11 (6), pp.71-73. 10.1109/MSP.2013.140. hal-00934347
Accès au bibtex
BibTex

Conference papers

ref_biblio
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. EUROCRYPT 2013, May 2013, Athens, Greece. hal-00870449
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870449/file/eurocrypt2013.pdf BibTex
ref_biblio
Vadim Lyubashevsky, Chris Peikert, Oded Regev. A toolkit for Ring-LWE cryptography. Johansson, Thomas and Nguyen, Phong Q. EUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. Springer, 7881, pp.35-54, Lecture Notes in Computer Science; Advances in Cryptology - EUROCRYPT 2013. 10.1007/978-3-642-38348-9_3. hal-00864284
Accès au bibtex
BibTex
ref_biblio
Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. K. Kurosawa and G. Hanaoka. Public-Key Cryptography - PKC 2013, Feb 2013, Nara, Japan. Springer, 7778, pp.272-291, LNCS; Public-Key Cryptography - PKC 2013. 10.1007/978-3-642-36362-7_18. hal-00790633
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme. K. Kurosawa and G. Hanaoka. Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. Springer, 7778, pp.292-311, LNCS; Public-Key Cryptography (PKC 2013). 10.1007/978-3-642-36362-7_19. hal-00790626
Accès au bibtex
BibTex
ref_biblio
Jung Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Lee, Tancrède Lepoint, et al.. Batch Fully Homomorphic Encryption over the Integers. Johansson, Thomas and Nguyen, Phong Q. EUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. Springer, 7881, pp.315-335, Lecture Notes in Computer Science. 10.1007/978-3-642-38348-9_20. hal-00864327
Accès au bibtex
BibTex
ref_biblio
Tancrède Lepoint, Jean-Sébastien Coron, Mehdi Tibouchi. Practical Multilinear Maps over the Integers. Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference Advances in Cryptology, Aug 2013, Santa-Barbara, United States. Springer, 8042, pp.476-493, Advances in Cryptology - CRYPTO 2013; Lecture Notes in Computer Science. 10.1007/978-3-642-40041-4_26. hal-00872773
Accès au bibtex
BibTex
ref_biblio
Leo Ducas, Alain Durmus, Tancrede Lepoint, Vadim Lyubashevsky. Lattice signatures and bimodal Gaussians. Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, United States. Springer, 8042, pp.40-56, Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO 2013. 10.1007/978-3-642-40041-4_3. hal-00864298
Accès au bibtex
BibTex
ref_biblio
Vadim Lyubashevsky, Daniel Masny. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs. Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013, Aug 2013, Santa Barbara, United States. Springer, 8043, pp.308-325, Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO 2013. 10.1007/978-3-642-40084-1_18. hal-00864299
Accès au bibtex
BibTex
ref_biblio
Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. CRYPTO 2013, Aug 2013, Santa Barbara, United States. hal-00870453
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870453/file/crypto2013.pdf BibTex
ref_biblio
Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain. White-Box Security Notions for Symmetric Encryption Schemes. SAC 2013 - Conference Selected Areas in Cryptography, Aug 2013, Burnaby, British Columbia, Canada. hal-00872841
Accès au bibtex
BibTex
ref_biblio
Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Bart Preneel, Peter Roelse. Two Attacks on a White-Box AES Implementation. SAC 2013 - Conference Selected Areas in Cryptography, Aug 2013, Burnaby, British Columbia, Canada. hal-00872844
Accès au bibtex
BibTex
ref_biblio
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin. Multiple Limited-Birthday Distinguishers and Applications. Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada. hal-00870452
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870452/file/sac2013.pdf BibTex
ref_biblio
Aurore Guillevic. Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. ACNS - 11th International Conference on Applied Cryptography and Network Security - 2013, Jun 2013, Banff, Canada. hal-00812960
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00812960/file/Paper_v6.pdf BibTex
ref_biblio
Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu. Security Analysis of PRINCE. FSE 2013, Mar 2013, Singapore, Singapore. hal-00870448
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00870448/file/fse2013.pdf BibTex
ref_biblio
Aurore Guillevic, Sorina Ionica. Four-Dimensional GLV via the Weil Restriction. Kazue Sako and Palash Sarkar. Asiacrypt - 19th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2013, Bengalore, India. Springer. hal-00864966v2
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00864966/file/version-5-nov-2013.pdf BibTex
ref_biblio
Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. SPHF-Friendly Non-Interactive Commitments. Kazue Sako and Palash Sarkar. ASIACRYPT 2013, Dec 2013, Bangalore, India. Springer, 8269, pp.214-234, Lecture Notes in Computer Science; Advances in Cryptology - ASIACRYPT 2013. 10.1007/978-3-642-42033-7_12. hal-00915542
Accès au bibtex
BibTex
ref_biblio
Tancrède Lepoint, Pascal Paillier. On the Minimal Number of Bootstrappings in Homomorphic Circuits. Adams, Andrew A. and Brenner, Michael and Smith, Matthew. Workshop on Applied Homomorphic Cryptography, Apr 2013, Okinawa, Japan. Springer, 7862, pp.189-200, Lecture Notes in Computer Science; Financial Cryptography and Data Security : FC 2013 Workshops, USEC and WAHC 2013. 10.1007/978-3-642-41320-9_13. hal-00872833
Accès au bibtex
BibTex
ref_biblio
Pierre-Alain Fouque, Damien Vergnaud, Jean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem. Ding-Zhu Du and Guochuan Zhang. Computing and Combinatorics, 19th International Conference, COCOON 2013, Dec 2012, Hangzhou, China. Springer, 7936, pp.651-662, Lecture Notes in Computer Science; Computing and Combinatorics, 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings. 10.1007/978-3-642-38768-5_57. hal-00871319
Accès au bibtex
BibTex
ref_biblio
Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. Michael Jacobson and Michael Locasto and Payman Mohassel and Reihaneh Safavi-Naini. ACNS 2013 - 11th International Conference Applied Cryptography and Network Security, Jun 2013, Banff, Canada. Springer, 7954, pp.534-551, Lecture Notes in Computer Science; Applied Cryptography and Network Security. 10.1007/978-3-642-38980-1_34. hal-00865612
Accès au bibtex
BibTex
ref_biblio
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust. ACM CCS 2013 - 20th ACM Conference on Computer and Communications Security, Nov 2013, Berlin, Germany. ACM, 10.1145/2508859.2516653. hal-00864431
Accès au bibtex
BibTex
ref_biblio
Sonia Belaid, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre. Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. SECRYPT 2013 - 10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland. Scitepress. hal-00872410
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00872410/file/articleHMAC.pdf BibTex
ref_biblio
Diana Maimut, Cédric Murdica, David Naccache, Mehdi Tibouchi. Fault Attacks on Projective-to-Affine Coordinates Conversion. COSADE 2013 - 4th International Workshop Constructive Side-Channel Analysis and Secure Design, Dec 2012, Paris, France. Springer, pp.46-61, 10.1007/978-3-642-40026-1_4. hal-00934335
Accès au bibtex
BibTex
ref_biblio
Eric Brier, David Naccache, Li-Yao Xia. How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling. Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey. hal-00934345
Accès au bibtex
BibTex
ref_biblio
Roman Korkikian, David Naccache, Guilherme Ozari De Almeida. Instantaneous Frequency Analysis. DCNET/ICE-B/OPTICS 2013: IS-11 - 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Jul 2013, Reykjavík, Iceland. SciTePress. hal-00934340
Accès au bibtex
BibTex
ref_biblio
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache. Using Hamiltonian Totems as Passwords. SantaCrypt 2013, Dec 2012, Prague, Czech Republic. hal-00934341
Accès au bibtex
BibTex
ref_biblio
Céline Chevalier, Damien Gaumont, David Naccache. How to (Carefully) Breach a Service Contract?. Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey. hal-00934343
Accès au bibtex
BibTex
ref_biblio
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. New Techniques for SPHFs and Efficient One-Round PAKE Protocols. Canetti, Ran and Garay, Juan A. CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, CA, United States. Springer, 8042, pp.449-475, Lecture Notes in Computer Science. 10.1007/978-3-642-40041-4_25. hal-00864345
Accès au bibtex
BibTex
ref_biblio
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh. Multi-channel broadcast encryption.. ASIA CCS '13 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, May 2013, Hangzhou, China. ACM, pp.277-286, 10.1145/2484313.2484348. hal-00864356
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Sonia Belaid, Pierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying. Guido Bertoni and Jean-Sébastien Coron. Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. Springer, 8086, pp.471-488, Lecture Notes in Computer Science. 10.1007/978-3-642-40349-1_27. hal-00870955
Accès au bibtex
BibTex
ref_biblio
Aurore Guillevic, Damien Vergnaud. Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions. Michel Abdalla and Tanja Lange. Pairing-Based Cryptography - Pairing 2012, Dec 2011, Cologne, Germany. Springer, 7708, pp.234-253, 2013, Lecture Notes in Computer Science; Pairing-Based Cryptography - Pairing 2012. hal-00871327
Accès au bibtex
BibTex

Directions of work or proceedings

ref_biblio
Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab. CANS 2013. Michel Abdalla and Cristina Nita-Rotaru and Ricardo Dahab. 8257, Springer, pp.349, 2013, Lecture Notes in Computer Science, 978-3-319-02936-8. 10.1007/978-3-319-02937-5. hal-00915711
Accès au bibtex
BibTex
ref_biblio
Michel Abdalla, Tanja Lange. Pairing-Based Cryptography - PAIRING 2012. Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. 10.1007/978-3-642-36334-4. hal-00915796
Accès au bibtex
BibTex

Reports

ref_biblio
Roman Korkikian, David Naccache, Guilherme Ozari De Almeida. Instantaneous Frequency Analysis. [Research Report] IACR Cryptology ePrint Archive 2013: 320 (2013), 2013. hal-00934334
Accès au bibtex
BibTex
ref_biblio
Eric Brier, David Naccache, Li-Yao Xia. How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling. [Research Report] IACR Cryptology ePrint Archive 2013: 432 (2013), 2013. hal-00934338
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. Dynamic Countermeasure Against the Zero Power Analysis. [Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013. hal-00934336
Accès au bibtex
BibTex
ref_biblio
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache. Using Hamiltonian Totems as Passwords. [Research Report] IACR Cryptology ePrint Archive 2013: 751 (2013), 2013. hal-00934337
Accès au bibtex
BibTex

Theses

ref_biblio
Mario Strefler. Broadcast Encryption with Traitor Tracing. Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English. tel-00870910
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00870910/file/Stref13Thesis.pdf BibTex
ref_biblio
Jérémy Jean. Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English. tel-00911049
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00911049/file/phd-thesis-jeremy-jean.pdf BibTex
ref_biblio
Aurore Guillevic. Arithmetic of pairings on algebraic curves for cryptography. Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English. tel-00921940
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00921940/file/Guillevic2013thesis.pdf BibTex
ref_biblio
Patrick Derbez. Meet-in-the-Middle Attacks on AES. Cryptography and Security. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English. tel-00918146
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00918146/file/these.pdf BibTex

 
Webmaster: webdi[@]di[.]ens[.]fr.