Vulgarisation Scientifique
|
|
|
Articles Journaux
- Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings, Volume 153, Issue 1, pp. 27 - 39, March 2006. - B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, and J. Traoré
On Some Incompatible Properties of Voting Schemes
Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010. - Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, and Joana Treger
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
Journal of Mathematical Cryptology (JMC), Fevrier 2012. - Reza Farashahi, Pierre-Alain Fouque, Igor Shparlinski, Mehdi Tibouchi, Felipe Voloch
Indifferentiability deterministic hashing to elliptic curve and hyperelliptic curves
Math. Comp., 2013. - P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
JCEN, 2013.
Workshop
- G. Leurent, C. Bouillaguet, and P.A. Fouque
SIMD - Hash Function Candidate to the NIST SHA-3 competition
NIST HASH Workshop - P.A. Fouque, G. Leurent and P. Nugyen
Automatic Search of Differential Path in MD4
ECRYPT HASH Workshop 2007 - B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, and J. Traoré
On Some Incompatible Properties of Voting Schemes
WOTE '06.
Preprints
- P.A. Fouque and M. Tibouchi
Close to Uniform Prime Number Generation With Fewer Random Bits
Conférences
- P.A. Fouque, D. Vergnaud and J.C. Zapalowicz
Time/Memory/Data Tradeoffs for Variants of the RSA Problem
COCOON 2013, pp., Springer-Verlag, 2013. - P.A. Fouque and T. Vannet
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
FSE 2013, pp., Springer-Verlag, 2013. - P. Derbez and P.A. Fouque
Exhausting Demirci-Selcuk Meet-in-the-Middle Attacks against Reduced-Round AES
FSE 2013, pp., Springer-Verlag, 2013. - P. Derbez, P.A. Fouque and J. Jean
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
EUROCRYPT 2013, pp., Springer-Verlag, 2013. - C. Bouillaguet, P.A. Fouque and A. Veber
Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem
EUROCRYPT 2013, pp., Springer-Verlag, 2013. - C. Arnaud and P.A. Fouque
Timing Attack against protected RSA-CRT implementation used in PolarSSL
CT RSA 2013, pp., Springer-Verlag, 2013. - J. Lu, Wei, P.A. Fouque and E. Pasalic
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
IWSEC 2012, pp., Springer-Verlag, 2012. - P.A. Fouque and M. Tibouchi
Indifferentiable Hashing to Barreto-Naehrig Curves
Latincrypt 2012, LNCS, pp., Springer-Verlag, 2012. - M. Daubignard, P.A. Fouque and Y. Lakhnech
Generic Indifferentiability Proofs of Hash Designs
CSF 2012, pp., ACM, 2012. - P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
CHES 2012, LNCS, pp., Springer-Verlag, 2012. - P.A. Fouque, D. Leresteux and F. Valette
Fault Attack like Buffer Overflow
ACM Symposium on Applied Computing, pp. 1638--1639, ACM, 2012. - M. Abdalla, P.A. Fouque, V. Lyubashevski and M. Tibouchi
Tightly-Secure Signatures from Lossy ID Schemes
Eurocrypt 2012, LNCS 7237, pp. 572--590, Springer-Verlag, 2012. - C. Bouillaguet, P.A. Fouque and G. Macario-Rat
New Insights on Impossible Differential Cryptanalysis
Asiacrypt 2011, LNCS 7073, pp. 667--685, Springer-Verlag, 2011. - C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
New Insights on Impossible Differential Cryptanalysis
SAC 2011, LNCS, pp., Springer-Verlag, 2011. - P. Derbez, P.A. Fouque and D. Leresteux
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
CHES 2011, LNCS 6917, pp. 274--291, Springer-Verlag, 2011. - C. Bouillaguet, P. Derbez and P.A. Fouque
Automatic Search of Attacks on Round-Reduced AES and Applications
CRYPTO 2011, LNCS 6841, pp. 169--187, Springer-Verlag, 2011. - T. Chardin, P.A. Fouque and D. Leresteux
Cache Timing Analysis of RC4
ACNS 2011, LNCS 6715, pp. 110-129, Springer-Verlag, 2011. - C. Bouillaguet, J.C. Faugère, P.A. Fouque and L. Perret
Practical Cryptanalysis of the Indentification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
PKC 2011, LNCS 6571, pp. 473-493, Springer-Verlag, 2011. - P.A. Fouque and J. Jean
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
FSE 2011, LNCS 6733, pp. 107-127, Springer-Verlag, 2011. - B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern and J. Traore
On Some Incompatible Properties of Voting Schemes
Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010. - C. Bouillaguet, O. Dunkelman, P.A. Fouque, and G. Leurent
Another Look at Complementation Properties
FSE '10, LNCS 6147, pp. 347-364, Springer-Verlag, 2010. - P.A. Fouque and M. Tibouchi
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
LATINCRYPT 2010, LNCS 6212, pp. 81-91, Springer-Verlag, 2010. - P.A. Fouque and M. Tibouchi
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pairing 2010, LNCS 6487, pp. 265-277, Springer-Verlag, 2010. - C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
SAC 2010, LNCS 6544, pp. 18-35, Springer-Verlag, 2010. - C. Bouillaguet, P.A. Fouque and G. Leurent
Security Analysis of SIMD
SAC 2010, LNCS 6544, pp. 351-368 Springer-Verlag, 2010. - Chevalier, P.A. Fouque, D. Pointcheval, and S. Zimmer
Optimal Randomness Extraction from a Diffie-Hellman Element
Eurocrypt '09, LNCS 5479, pp. 572-589, Springer-Verlag, 2009 - P.A. Fouque, G. Leurent, D. Réal and F. Valette
Practical Electromagnetic Template Attack on HMAC
CHES 2009, LNCS 5747, pp. 66-80, Springer-Verlag, 2009. - P.A. Fouque, D. Masgana and F. Valette
Fault Attack on Schnorr Based Identification and Signature Scheme
FDTC 2009, pp. 32-38, IEEE Computer Society, 2009. - P.A. Fouque, J. Stern, and S. Zimmer
Cryptanalysis of Tweaked Versions of SMASH and Reparation
SAC '08, LNCS 5381, pp. 136-150, Springer-Verlag, 2008. - C. Bouillaguet and P.A. Fouque
Analysis of the Radiogatun Hash Function
SAC '08, LNCS 5381, pp. 245-261, Springer-Verlag, 2008 - P.A. Fouque, G. Martinet, F. Valette and S. Zimmer
On the Security of the CCM Encryption Mode and of a Slight Variant
ACNS '08, LNCS 5037, pp. 411-428, Springer-Verlag, 2008. - M. Drissi, P.A. Fouque, D. Réal and F. Valette
The Carry Leakage on the Randomized Exponent Countermeasure
CHES '08, LNCS 5154, pp. 198-213, Springer-Verlag, 2008. - P.A. Fouque, R. Lercier, D. Réal, and F. Valette
Fault Attack on Elliptic Curve with Montgomery Ladder
FDTC '08, IEEE-CS , pp. 92-98, 2008. - E. Andreeva, C. Bouillaguet, P.A. Fouque, J.J. Hoch,
J. Kelsey, A. Shamir and S. Zimmer
Second Preimage Attacks on Dithered Hash Functions
Eurocrypt '08, LNCS 4965, pp. 270-288, Springer-Verlag, 2008. - P.A. Fouque, G. Macario-Rat and J. Stern
Key Recovery on Hidden Monomial Multivariate Schemes
Eurocrypt '08, LNCS 4965, pp. 19-30, Springer-Verlag, 2008. - P.A. Fouque, G. Macario-Rat, L. Perret and J. Stern
Total Break of the l-IC Signature Scheme
PKC '08, LNCS 4939, pp. 1-17, Springer-Verlag, 2008. - P.A. Fouque, D. Pointcheval and S. Zimmer
HMAC is a Randomness Extractor and Applications to TLS
AsiaCCS '08, pp. 21-32, ACM Press, 2008. - P.A. Fouque and G. Leurent
Cryptanalysis of a Hash Function Based on Quasi-Cyclic Codes
CTRSA '08, LNCS 4964, pp. 19-35, Springer-Verlag, 2008. - P.A. Fouque, G. Leurent and P.Q. Nguyen
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Crypto '07, LNCS 4622, pp. 13-30, Springer-Verlag, 2007. - V. Dubois, P.A. Fouque, A. Shamir and J. Stern
Practical Cryptanalysis of SFLASH
Crypto '07, LNCS 4622, pp. 1-12, Springer-Verlag, 2007. - V. Dubois, P.A. Fouque and J. Stern
Cryptanalysis of SFLASH with Slightly Modified Parameters
Eurocrypt '07, LNCS 4515, pp. 264-275, Springer-Verlag, 2007. - V. Dubois, P.A. Fouque, J. Stern and A. Shamir
Cryptanalysis of the SFLASH Signature Scheme
Inscrypt '07, LNCS 4990, pp. 1-4, Springer-Verlag, 2007. - P.A. Fouque, S. Kunz-Jacques, G. Martinet, F. Muller, and
F. Valette
Power Attack on Small RSA Public Exponent
CHES '06, LNCS 4249, pp. 339-353, Springer-Verlag, 2006. - P.A. Fouque and E. Levieil
An Improved LPN Algorithm
SCN '06, LNCS 4116, pp. 348-359, Springer-Verlag, 2006. - P.A. Fouque, D. Pointcheval, J. Stern, and S. Zimmer
Hardness of Distinguishing the MSB of LSB of Secret Keys in Diffie-Hellman Schemes
ICALP '06, LNCS 4052, pp. 240-251, Springer-Verlag, 2006. - O. Chevassut, P.A. Fouque, P. Gaudry, and D. Pointcheval
The Twist-Augmented Technique for Key Exchange
PKC '06, LNCS 3958, pp. 410-426, Springer-Verlag, 2006. - M. Abdalla, O. Chevassut, P.-A. Fouque, and D. Pointcheval
A Simple Threshold Authenticated Key Exchange from Short Secrets
Asiacrypt '05, LNCS 3788, pp. 566-588, Springer-Verlag, 2005. - P.-A. Fouque, L. Granboulan and J. Stern
Differential Cryptanalysis for Multivariate Schemes
Eurocrypt '05, LNCS 3494, pp. 341-353, Springer-Verlag, 2005. - M. Abdalla, P.-A. Fouque, and D. Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting
PKC '05, LNCS 3396, pp. 65-84, Springer-Verlag, 2005. - P.-A. Fouque, A. Joux and G. Poupard
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
SAC '04, LNCS 3357, pp. 212-226, Springer-Verlag, 2004. - P.-A. Fouque, F. Muller, G. Poupard, and F. Valette
Defeating Countermeasures Based on Randomized BSD Representations
CHES '04, LNCS 3156, pp. 312-327, Springer-Verlag, 2004. - P.-A. Fouque, N. Howgrave-Graham, G. Martinet, and G. Poupard
The Insecurity of Esign in Practical Implementations
Asiacrypt '03, LNCS 2894, pp. 492-506, Springer-Verlag, 2003. - P.-A. Fouque and F. Valette
The Doubling Attack : Why Upwards is Better Than Downwards
CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003. - P.-A. Fouque, G. Martinet, and G. Poupard
Attacking Unbalanced RSA-CRT Using SPA
CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003. - P.-A. Fouque, A. Joux, G. Martinet, and F. Valette
Authenticated On-line Encryption
SAC '03, LNCS 3006, pp. 145-159, Springer-Verlag, 2003. - P.-A. Fouque and G. Poupard
On the security of RDSA
Eurocrypt '03, LNCS 2656, pp. 462-476, Springer-Verlag, 2003. - P.-A. Fouque, G. Martinet, and G. Poupard
Practical Symmetric On-line Encryption
FSE '03, LNCS 2887, pp. 362-375, Springer-Verlag, 2003. - P.-A. Fouque, J. Stern, and G. Wackers
CryptoComputing with rational Numbers
FC '02, LNCS 2357, pp. 136-146, Springer-Verlag, 2002. - P.-A. Fouque and D. Pointcheval
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Asiacrypt '01, LNCS 2248, pp. 351-368, Springer-Verlag, 2001. - P.-A. Fouque, and J. Stern
Fully Distributed Threshold RSA under Standard Assumptions
Asiacrypt '01, LNCS 2248, pp. 310-330, Springer-Verlag, 2001. - O. Baudron, P.-A. Fouque, D. Pointcheval, G. Poupard, and J. Stern
Practical Multi-Candidate Election System
PODC '01, pp. 274-283, ACM, 2001. - P.-A. Fouque and J. Stern
One Round Threshold Discrete-Log Key Generation without Private Channels
PKC '01, LNCS 1992, pp. 300-316, Springer-Verlag, 2001. - P.-A. Fouque, G. Poupard and J. Stern
Sharing Decryption in the Context of Voting or Lottery
FC '00, LNCS 1962, pp. 90-104, Springer-Verlag, 2000.
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
Articles Journaux en soumission
- Charles Bouillaguet and Pierre-Alain Fouque
Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound
Soumis dans Information Processing Letters (IPL), 2011. - Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, and Sébastien Zimmer
New Second Preimage Attacks on Hash Function
Soumis dans Journal of Cryptology, 2011. - Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque and Nathan Keller
Low Data Complexity Attacks on AES
Soumis IEEE Transactions on Information Theory, 2011. - J. Lu, Y. Wei, P.A. Fouque and E. Passalic
Meet-in-the-Middle on Reduced Versions of the Camellia Block Cipher
Soumis Information Processing Letters (IPL), 2011.
Thèse
Pierre-Alain FouqueLe partage de clés cryptographiques: Théorie et Pratique
Université Paris 7, Oct. 2001.
HDR
Pierre-Alain FouqueSur Quelques Méthodes Algébriques et Statistique en Cryptanalyse
École normale supérieure, Dec. 2010.