Crypto Team - CASCADE



Cryptography (see more details)

Cryptographic algorithms are the equivalent of locks, seals, security stamps and identification documents on the Internet. They are essential to protect our on-line bank transactions, credit cards, medical and personal information and to support e-commerce and e-government. They come in different flavors. Encryption algorithms are essential to protect sensitive information such as medical data, financial information and Personal Identification Numbers (PINs) from prying eyes. Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms. Identification protocols allow to securely verify the identity of the party at the other end of the line. Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole.

The research activity of the project-team CASCADE addresses the following topics, which cover almost all the domains that are currently active in the international cryptographic community, but mainly in the public-key area:


Research

Teaching

How to find us

Wiki


Members of the Team

Head of the team: David Pointcheval

Researchers

Associated Members

Post-docs

  • Itai Dinur - CDD ENS (FSMP)
  • Angelo De Caro - CDD ENS (ANR)

Ph.D. Students

  • Fabrice Ben Hamouda - 2012 - ENS
  • Mario Cornejo - 2013 - CDD INRIA
  • Alain Passelègue - 2013 - CDD ENS (ANR PRINCE / DGA)

Ph.D. Students in collaboration with the Industry

  • Tancrède Lepoint - 2011 - CryptoExperts
  • Sylvain Ruhault - 2011 - Oppida
  • Sonia Belaid - 2012 - Thales
  • Thomas Prest - 2012 - Thèse CIFRE Thales
  • Oliviers Sanders - 2012 - Thèse CIFRE Orange Labs
  • Houda Ferradi - 2013 - Thèse CIFRE Morpho
  • Adrian Thillard - 2013 - ANSSI

Visitors

  • Eike Kiltz - Ruhr-Universität Bochum, Germany

Internship Students

  • Florian Bourse
  • Geoffroy Couteau
  • Rafael Del Pino
  • Pierrick Meaux
  • Antonia Schmidt-Lademann

Former Members

Activities

Crypto Seminar

Working Groups

Collaborative Research Projects

  • 2013-2017: ANR JCJC CLE: Cryptography from learning with errors
  • 2013-2016: ANR INS SIMPATIC: SIM and PAiring Theory for Information and Communications security
  • 2012-2016: ANR JCJC ROMAnTIC: Randomness in mathematical cryptography
  • 2011-2014: ICT EU-Brazil SecFuNet: Security for Future Networks
  • 2011-2015: ANR ARPEGE PRINCE: Proven Resilience against Information leakage in Cryptographic Engineering
  • 2011-2015: ANR VERSO ProSe: Security protocols : formal model, computational model, and implementations

  • 2010-2013: ANR VERSO BEST: Broadcast Encryption for Secure Telecommunications
  • 2009-2013: ANR VERSO SAPHIR II: Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes (Security and analysis of innovating and recent hashing primitives)
  • 2008-2012: We lead the MAYA virtual lab of the network of excellence ECRYPT II
  • 2007-2011: ANR SESUR PAMPA: Password Authentication and Methods for Privacy and Anonymity
  • 2007-2011: ANR TELECOM PACE: Pairings and Advances in Cryptology for E-cash
  • 2006-2010: ANR TELECOM SAVE: Sécurité et Audit du Vote Electronique (Security and audit for electronic voting)
  • 2005-2009: ANR RNRT BACH: Biometric Authentication with Cryptographic Handling
  • 2005-2009: ANR RNRT SAPHIR: Sécurité et Analyse des Primitives de Hachage Innovantes et Récentes (Security and analysis of innovating and recent hashing primitives)
  • 2005-2009: ARA SSIA CrySCoE: Cryptographie pour la sécurité des codes embarqués (Cryptography for the security of embedded systems)
  • 2005-2009: ARA SSIA FORMACRYPT: Formal security proofs for cryptographic protocols
  • 2004-2008: We lead the AZTEC virtual lab of the network of excellence ECRYPT

Publications of the Team (since 2013)

2014

Conference proceedings

Rèf biblio
Sébastien Canard, David Pointcheval, Olivier Sanders. Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. Hugo Krawczyk. 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC '14), Mar 2014, Buenos Aires, Argentina. Springer, Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC '14), 8383, pp. 167-183, LNCS
Accès au bibtex
BibTex
Rèf biblio
Tancrède Lepoint, Jean-Sébastien Coron, Mehdi Tibouchi. Scale-Invariant Fully-Homomorphic Encryption over the Integers. Hugo Krawczyk. PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2014, Buenos Aires, Argentina. Springer, Public-Key Cryptography - PKC 2014, 8383, pp. 311-328, LNCS - Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-54631-0_18
Accès au bibtex
BibTex

2013

Article in peer-reviewed journal

Rèf biblio
Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. Short Blind Signatures. Journal of Computer Security, IOS Press, 2013, 21 (5), pp. 627-661. http://dx.doi.org/10.3233/JCS-130477
Accès au bibtex
BibTex
Rèf biblio
Vadim Lyubashevsky, Chris Peikert, Oded Regev. On Ideal Lattices and Learning with Errors over Rings. Journal of the ACM, ACM, 2013, 60 (6). http://dx.doi.org/10.1145/2535925
Accès au bibtex
BibTex
Rèf biblio
Hung Q. Ngo, Duong Hieu Phan, David Pointcheval. Black-Box Trace&Revoke Codes. Algorithmica, Springer, 2013, 67 (3), pp. 418-448. http://dx.doi.org/10.1007/s00453-012-9702-y
Accès au bibtex
BibTex
Rèf biblio
Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. International Journal of Information Security, Springer, 2013, 12 (4), pp. 251-265. http://dx.doi.org/10.1007/s10207-013-0190-0
Accès au bibtex
BibTex
Rèf biblio
Sorina Ionica. Pairing-based algorithms for Jacobians of genus 2 curves with maximal endomorphism ring. Journal of Number Theory, 2013, 133, pp. 3755-3770. http://dx.doi.org/10.1016/j.jnt.2013.04.023
Accès au texte intégral et bibtex
Draft5.pdf Draft5.ps BibTex
Rèf biblio
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin. Improved Cryptanalysis of AES-like Permutations. Journal of Cryptology, Springer, 2013
Accès au bibtex
BibTex
Rèf biblio
Michel Abdalla, Dario Catalano, Dario Fiore. Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. Journal of Cryptology, Springer-Verlag, 2013. http://dx.doi.org/10.1007/s00145-013-9153-x. http://link.springer.com/article/10.1007%2Fs00145-013-9153-x
Accès au bibtex
BibTex
Rèf biblio
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards. Journal of Cryptographic Engineering, Springer, 2013, 3 (4), pp. 241-265. http://dx.doi.org/10.1007/s13389-013-0062-6
Accès au bibtex
BibTex
Rèf biblio
Jean-Michel Cioranesco, Houda Ferradi, David Naccache. Communicating Covertly through CPU Monitoring. IEEE Security & Privacy, IEEE, 2013, 11 (6), pp. 71-73. http://dx.doi.org/10.1109/MSP.2013.140
Accès au bibtex
BibTex

Invited conference talk

Rèf biblio
Roman Korkikian, David Naccache, Guilherme Ozari De Almeida. Instantaneous Frequency Analysis. DCNET/ICE-B/OPTICS 2013: IS-11 - 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Jul 2013, Reykjavík, Iceland. SciTePress
Accès au bibtex
BibTex
Rèf biblio
Céline Chevalier, Damien Gaumont, David Naccache. How to (Carefully) Breach a Service Contract?. Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey.
Accès au bibtex
BibTex
Rèf biblio
Eric Brier, David Naccache, Li-Yao Xia. How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling. Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey.
Accès au bibtex
BibTex

Conference proceedings

Rèf biblio
Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. SPHF-Friendly Non-Interactive Commitments. Kazue Sako and Palash Sarkar. ASIACRYPT 2013, Dec 2013, Bangalore, India. Springer, Advances in Cryptology - ASIACRYPT 2013, 8269, pp. 214-234, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-42033-7_12
Accès au bibtex
BibTex
Rèf biblio
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust. ACM CCS 2013 - 20th ACM Conference on Computer and Communications Security, Nov 2013, Berlin, Germany. ACM. http://dx.doi.org/10.1145/2508859.2516653
Accès au bibtex
BibTex
Rèf biblio
Aurore Guillevic, Sorina Ionica. Four-Dimensional GLV via the Weil Restriction. Kazue Sako and Palash Sarkar. Asiacrypt - 19th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2013, Bengalore, India. Springer
Accès au texte intégral et bibtex
version-5-nov-2013.pdf BibTex
Rèf biblio
Tancrède Lepoint, Jean-Sébastien Coron, Mehdi Tibouchi. Practical Multilinear Maps over the Integers. Canetti, Ran and Garay, Juan A.. CRYPTO 2013 - 33rd Annual Cryptology Conference Advances in Cryptology, Aug 2013, Santa-Barbara, United States. Springer, Advances in Cryptology - CRYPTO 2013, 8042, pp. 476-493, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-40041-4_26
Accès au bibtex
BibTex
Rèf biblio
Leo Ducas, Alain Durmus, Tancrede Lepoint, Vadim Lyubashevsky. Lattice signatures and bimodal Gaussians. Canetti, Ran and Garay, Juan A.. CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, United States. Springer, Advances in Cryptology - CRYPTO 2013, 8042, pp. 40-56, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-40041-4_3
Accès au bibtex
BibTex
Rèf biblio
Vadim Lyubashevsky, Daniel Masny. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs. Canetti, Ran and Garay, Juan A.. CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013, Aug 2013, Santa Barbara, United States. Springer, Advances in Cryptology - CRYPTO 2013, 8043, pp. 308-325, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-40084-1_18
Accès au bibtex
BibTex
Rèf biblio
Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. CRYPTO 2013, Aug 2013, Santa Barbara, United States.
Accès au texte intégral et bibtex
crypto2013.pdf BibTex
Rèf biblio
Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain. White-Box Security Notions for Symmetric Encryption Schemes. SAC 2013 - Conference Selected Areas in Cryptography, Aug 2013, Burnaby, British Columbia, Canada.
Accès au bibtex
BibTex
Rèf biblio
Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Bart Preneel, Peter Roelse. Two Attacks on a White-Box AES Implementation. SAC 2013 - Conference Selected Areas in Cryptography, Aug 2013, Burnaby, British Columbia, Canada.
Accès au bibtex
BibTex
Rèf biblio
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin. Multiple Limited-Birthday Distinguishers and Applications. Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada.
Accès au texte intégral et bibtex
sac2013.pdf BibTex
Rèf biblio
Vadim Lyubashevsky, Chris Peikert, Oded Regev. A toolkit for Ring-LWE cryptography. Johansson, Thomas and Nguyen, Phong Q.. EUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. Springer, Advances in Cryptology - EUROCRYPT 2013, 7881, pp. 35-54, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-38348-9_3
Accès au bibtex
BibTex
Rèf biblio
Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. EUROCRYPT 2013, May 2013, Athens, Greece.
Accès au texte intégral et bibtex
eurocrypt2013.pdf BibTex
Rèf biblio
Jung Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun. Batch Fully Homomorphic Encryption over the Integers. Johansson, Thomas and Nguyen, Phong Q.. EUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. Springer, 7881, pp. 315-335, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-38348-9_20
Accès au bibtex
BibTex
Rèf biblio
Aurore Guillevic. Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. ACNS - 11th International Conference on Applied Cryptography and Network Security - 2013, Jun 2013, Banff, Canada.
Accès au texte intégral et bibtex
Paper_v6.pdf BibTex
Rèf biblio
Tancrède Lepoint, Pascal Paillier. On the Minimal Number of Bootstrappings in Homomorphic Circuits. Adams, Andrew A. and Brenner, Michael and Smith, Matthew. Workshop on Applied Homomorphic Cryptography, Apr 2013, Okinawa, Japan. Springer, Financial Cryptography and Data Security : FC 2013 Workshops, USEC and WAHC 2013, 7862, pp. 189-200, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-41320-9_13
Accès au bibtex
BibTex
Rèf biblio
Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu. Security Analysis of PRINCE. FSE 2013, Mar 2013, Singapore, Singapore.
Accès au texte intégral et bibtex
fse2013.pdf BibTex
Rèf biblio
Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme. K. Kurosawa and G. Hanaoka. Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. Springer, Public-Key Cryptography (PKC 2013), 7778, pp. 292-311, LNCS. http://dx.doi.org/10.1007/978-3-642-36362-7_19
Accès au bibtex
BibTex
Rèf biblio
Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. K. Kurosawa and G. Hanaoka. Public-Key Cryptography - PKC 2013, Feb 2013, Nara, Japan. Springer, Public-Key Cryptography - PKC 2013, 7778, pp. 272-291, LNCS. http://dx.doi.org/10.1007/978-3-642-36362-7_18
Accès au bibtex
BibTex
Rèf biblio
Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. New Techniques for SPHFs and Efficient One-Round PAKE Protocols. Canetti, Ran and Garay, Juan A.. CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, CA, United States. Springer, Advances in Cryptology - CRYPTO 2013, 8042, pp. 449-475, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-40041-4_25
Accès au bibtex
BibTex
Rèf biblio
Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh. Multi-channel broadcast encryption.. ASIA CCS '13 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, May 2013, Hangzhou, China. ACM, pp. 277-286. http://dx.doi.org/10.1145/2484313.2484348
Accès au bibtex
BibTex
Rèf biblio
Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. Michael Jacobson and Michael Locasto and Payman Mohassel and Reihaneh Safavi-Naini. ACNS 2013 - 11th International Conference Applied Cryptography and Network Security, Jun 2013, Banff, Canada. Springer, Applied Cryptography and Network Security, 7954, pp. 534-551, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-38980-1_34
Accès au bibtex
BibTex
Rèf biblio
Michel Abdalla, Sonia Belaid, Pierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying. Guido Bertoni and Jean-Sébastien Coron. Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. Springer, 8086, pp. 471-488, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-40349-1_27
Accès au bibtex
BibTex
Rèf biblio
Pierre-Alain Fouque, Damien Vergnaud, Jean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem. Ding-Zhu Du and Guochuan Zhang. Computing and Combinatorics, 19th International Conference, COCOON 2013, 2013, Hangzhou, China. Springer, Computing and Combinatorics, 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings., 7936, pp. 651-662, Lecture Notes in Computer Science. http://dx.doi.org/10.1007/978-3-642-38768-5_57
Accès au bibtex
BibTex
Rèf biblio
Aurore Guillevic, Damien Vergnaud. Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions. Michel Abdalla and Tanja Lange. Pairing-Based Cryptography - Pairing 2012, 2012, Cologne, Germany. Springer, Pairing-Based Cryptography - Pairing 2012, 7708, pp. 234-253, 2013, Lecture Notes in Computer Science
Accès au bibtex
BibTex
Rèf biblio
Diana Maimut, Cédric Murdica, David Naccache, Mehdi Tibouchi. Fault Attacks on Projective-to-Affine Coordinates Conversion. COSADE 2013 - 4th International Workshop Constructive Side-Channel Analysis and Secure Design, 2013, Paris, France. Springer, pp. 46-61. http://dx.doi.org/10.1007/978-3-642-40026-1_4
Accès au bibtex
BibTex
Rèf biblio
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache. Using Hamiltonian Totems as Passwords. SantaCrypt 2013, 2013, Prague, Czech Republic.
Accès au bibtex
BibTex

Conference, seminar, workshop communication

Rèf biblio
Sonia Belaid, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre. Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. SECRYPT 2013 - 10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland.
Accès au texte intégral et bibtex
articleHMAC.pdf BibTex

Edition of book or proceedings

Rèf biblio
Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab. CANS 2013. Michel Abdalla and Cristina Nita-Rotaru and Ricardo Dahab. 8257, Springer, pp. 349, Nov. 2013, Lecture Notes in Computer Science, 978-3-319-02936-8. http://dx.doi.org/10.1007/978-3-319-02937-5
Accès au bibtex
BibTex
Rèf biblio
Michel Abdalla, Tanja Lange. Pairing-Based Cryptography - PAIRING 2012. Michel Abdalla and Tanja Lange. 7708, Springer, pp. 333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. http://dx.doi.org/10.1007/978-3-642-36334-4
Accès au bibtex
BibTex

PhD thesis

Rèf biblio
Aurore Guillevic. Arithmetic of pairings on algebraic curves for cryptography. informatique. Ecole Normale Supérieure de Paris - ENS Paris, Dec. 2013. English
Accès au texte intégral et bibtex
Guillevic2013thesis.pdf BibTex
Rèf biblio
Patrick Derbez. Meet-in-the-Middle Attacks on AES. Ecole Normale Supérieure de Paris - ENS Paris, Dec. 2013. English
Accès au texte intégral et bibtex
these.pdf BibTex
Rèf biblio
Mario Strefler. Broadcast Encryption with Traitor Tracing. informatique. Ecole Normale Supérieure de Paris - ENS Paris, Sep. 2013. English
Accès au texte intégral et bibtex
Stref13Thesis.pdf BibTex
Rèf biblio
Jérémy Jean. Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. Ecole Normale Supérieure de Paris - ENS Paris, Sep. 2013. English
Accès au texte intégral et bibtex
phd-thesis-jeremy-jean.pdf BibTex

Research report

Rèf biblio
Roman Korkikian, David Naccache, Guilherme Ozari De Almeida. Instantaneous Frequency Analysis. (Research Report), 2013. IACR Cryptology ePrint Archive 2013: 320 (2013)
Accès au bibtex
BibTex
Rèf biblio
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. Dynamic Countermeasure Against the Zero Power Analysis. (Research Report), 2013. IACR Cryptology ePrint Archive 2013: 764 (2013)
Accès au bibtex
BibTex
Rèf biblio
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache. Using Hamiltonian Totems as Passwords. (Research Report), 2013. IACR Cryptology ePrint Archive 2013: 751 (2013)
Accès au bibtex
BibTex
Rèf biblio
Eric Brier, David Naccache, Li-Yao Xia. How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling. (Research Report), 2013. IACR Cryptology ePrint Archive 2013: 432 (2013)
Accès au bibtex
BibTex

 
Webmaster: webdi[@]di[.]ens[.]fr.