Skip to main content.

Vulgarisation Scientifique

Articles Journaux

  1. Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval
    Password-Based Authenticated Key Exchange in the Three-Party Setting
    IEE Proceedings, Volume 153, Issue 1, pp. 27 - 39, March 2006.
  2. B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, and J. Traoré
    On Some Incompatible Properties of Voting Schemes
    Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010.
  3. Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, and Joana Treger
    A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
    Journal of Mathematical Cryptology (JMC), Fevrier 2012.
  4. Reza Farashahi, Pierre-Alain Fouque, Igor Shparlinski, Mehdi Tibouchi, Felipe Voloch
    Indifferentiability deterministic hashing to elliptic curve and hyperelliptic curves
    Math. Comp., 2013.
  5. P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
    Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
    JCEN, 2013.
  6. J. Lu, Y. Wei, P.-A. Fouque and J. Kim
    Cryptanalysis of reduced versions of the Camellia block cipher
    IET Information Security, 6(3): 228--238, 2012.
  7. C. Bouillaguet, P. Derbez, O. Dunkelman, N. Keller and V. Rijmen
    Low-Data Complexity Attacks on AES
    IEEE Transactions on Information Theory, 58(11):7002-2017, 2012.

Workshop

Preprints

  1. J. Plut, P.A. Fouque and G. Macario-Rat
    Solving the "Isomorphism of Polynomials with Two Secrets" Problem for All Pairs of Quadratic Forms
  2. P.A. Fouque, A. Joux and C. Mavromati
    Multi-user collisions: Applications to Discrete-Logs, Even-Mansour and Prince
  3. P. Derbez and P.A. Fouque
    On the Zorro Block Cipher: Attacks and Reparation
  4. D.F. Aranha, P.A. Fouque, B. Gerard, J.G. Kammerer, M. Tibouchi and J.C. Zapalowicz
    GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias

Conférences

    2014

  1. G. Barthe, F. Dupressoir, P.A. Fouque, B. Gregoire and J.C. Zapalowicz
    Synthesis of Fault Attacks on Cryptographic Implementations
    ACM CCS 2014, pp., ACM, 2014.
  2. P.A. Fouque and M. Tibouchi
    Close to Uniform Prime Number Generation With Fewer Random Bits
    ICALP 2014, pp. , Springer-Verlag, 2014.
  3. P.A. Fouque and J.C. Zapalowicz
    Statistical Properties of Short RSA Distribution and their Cryptographic Applications
    COCOON 2014, pp. , Springer-Verlag, 2014.
  4. D. Augot, P.A. Fouque and P. Karpman
    Diffusion matrices from algebraic-geometry codes with efficient constant-time software implementation
    SAC 2014, pp. , Springer-Verlag, 2014.
  5. D.F. Aranha, Q. Chen, P.A. Fouque, M. Tibouchi and J.C. Zapalowicz
    Binary Elligator Squared
    SAC 2014, pp. , Springer-Verlag, 2014.
  6. G. Barthe, F. Dupressoir, P.A. Fouque, B. Gregoire, M. Tibouchi and J.C. Zapalowicz
    Making RSA-PSS Provably Secure Against Non-Random Faults
    CHES 2014, pp. , Springer-Verlag, 2014.
  7. 2013

  8. P.A. Fouque and P. Karpman
    Security Amplification against Meet-in-the-Middle Attacks using Whitening
    IMACC 2013, pp., Springer-Verglag, 2013.
  9. P.A. Fouque, M. Tibouchi and J.C. Zapalowicz
    Recovering Private Keys Generated with Weak PRNGs
    IMACC 2013, pp., Springer-Verlag, 2013.
  10. P.A. Fouque, J. Jean and T. Peyrin
    Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
    CRYPTO 2013, pp., Springer-Verlag, 2013.
  11. M. Abdalla, S. Belaid, P.A. Fouque
    Leakage-Resilient Symmetric Encryption via Re-Keying
    CHES 2013, pp., Springer-Verlag, 2013.
  12. P.A. Fouque, A. Joux and M. Tibouchi
    Injective Encodings to Elliptic Curves
    ACISP 2013, pp., Springer-Verlag, 2013.
  13. P.A. Fouque, D. Vergnaud and J.C. Zapalowicz
    Time/Memory/Data Tradeoffs for Variants of the RSA Problem
    COCOON 2013, pp., Springer-Verlag, 2013.
  14. P.A. Fouque and T. Vannet
    Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
    FSE 2013, pp., Springer-Verlag, 2013.
  15. P. Derbez and P.A. Fouque
    Exhausting Demirci-Selcuk Meet-in-the-Middle Attacks against Reduced-Round AES
    FSE 2013, pp., Springer-Verlag, 2013.
  16. P. Derbez, P.A. Fouque and J. Jean
    Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
    EUROCRYPT 2013, pp., Springer-Verlag, 2013.
  17. C. Bouillaguet, P.A. Fouque and A. Veber
    Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem
    EUROCRYPT 2013, pp., Springer-Verlag, 2013.
  18. C. Arnaud and P.A. Fouque
    Timing Attack against protected RSA-CRT implementation used in PolarSSL
    CT RSA 2013, pp., Springer-Verlag, 2013.
  19. 2012

  20. J. Lu, Wei, P.A. Fouque and E. Pasalic
    Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
    IWSEC 2012, pp., Springer-Verlag, 2012.
  21. P.A. Fouque and M. Tibouchi
    Indifferentiable Hashing to Barreto-Naehrig Curves
    Latincrypt 2012, LNCS, pp., Springer-Verlag, 2012.
  22. M. Daubignard, P.A. Fouque and Y. Lakhnech
    Generic Indifferentiability Proofs of Hash Designs
    CSF 2012, pp., ACM, 2012.
  23. P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
    Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
    CHES 2012, LNCS, pp., Springer-Verlag, 2012.
  24. P.A. Fouque, D. Leresteux and F. Valette
    Fault Attack like Buffer Overflow
    ACM Symposium on Applied Computing, pp. 1638--1639, ACM, 2012.
  25. M. Abdalla, P.A. Fouque, V. Lyubashevski and M. Tibouchi
    Tightly-Secure Signatures from Lossy ID Schemes
    Eurocrypt 2012, LNCS 7237, pp. 572--590, Springer-Verlag, 2012.
  26. 2011

  27. C. Bouillaguet, P.A. Fouque and G. Macario-Rat
    New Insights on Impossible Differential Cryptanalysis
    Asiacrypt 2011, LNCS 7073, pp. 667--685, Springer-Verlag, 2011.
  28. C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
    New Insights on Impossible Differential Cryptanalysis
    SAC 2011, LNCS, pp., Springer-Verlag, 2011.
  29. P. Derbez, P.A. Fouque and D. Leresteux
    Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
    CHES 2011, LNCS 6917, pp. 274--291, Springer-Verlag, 2011.
  30. C. Bouillaguet, P. Derbez and P.A. Fouque
    Automatic Search of Attacks on Round-Reduced AES and Applications
    CRYPTO 2011, LNCS 6841, pp. 169--187, Springer-Verlag, 2011.
  31. T. Chardin, P.A. Fouque and D. Leresteux
    Cache Timing Analysis of RC4
    ACNS 2011, LNCS 6715, pp. 110-129, Springer-Verlag, 2011.
  32. C. Bouillaguet, J.C. Faugère, P.A. Fouque and L. Perret
    Practical Cryptanalysis of the Indentification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
    PKC 2011, LNCS 6571, pp. 473-493, Springer-Verlag, 2011.
  33. P.A. Fouque and J. Jean
    Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
    FSE 2011, LNCS 6733, pp. 107-127, Springer-Verlag, 2011.
  34. 2010

  35. B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern and J. Traore
    On Some Incompatible Properties of Voting Schemes
    Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010.
  36. C. Bouillaguet, O. Dunkelman, P.A. Fouque, and G. Leurent
    Another Look at Complementation Properties
    FSE '10, LNCS 6147, pp. 347-364, Springer-Verlag, 2010.
  37. P.A. Fouque and M. Tibouchi
    Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
    LATINCRYPT 2010, LNCS 6212, pp. 81-91, Springer-Verlag, 2010.
  38. P.A. Fouque and M. Tibouchi
    Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
    Pairing 2010, LNCS 6487, pp. 265-277, Springer-Verlag, 2010.
  39. C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
    Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
    SAC 2010, LNCS 6544, pp. 18-35, Springer-Verlag, 2010.
  40. C. Bouillaguet, P.A. Fouque and G. Leurent
    Security Analysis of SIMD
    SAC 2010, LNCS 6544, pp. 351-368 Springer-Verlag, 2010.
  41. 2009

  42. Chevalier, P.A. Fouque, D. Pointcheval, and S. Zimmer
    Optimal Randomness Extraction from a Diffie-Hellman Element
    Eurocrypt '09, LNCS 5479, pp. 572-589, Springer-Verlag, 2009
  43. P.A. Fouque, G. Leurent, D. Réal and F. Valette
    Practical Electromagnetic Template Attack on HMAC
    CHES 2009, LNCS 5747, pp. 66-80, Springer-Verlag, 2009.
  44. P.A. Fouque, D. Masgana and F. Valette
    Fault Attack on Schnorr Based Identification and Signature Scheme
    FDTC 2009, pp. 32-38, IEEE Computer Society, 2009.
  45. 2008

  46. P.A. Fouque, J. Stern, and S. Zimmer
    Cryptanalysis of Tweaked Versions of SMASH and Reparation
    SAC '08, LNCS 5381, pp. 136-150, Springer-Verlag, 2008.
  47. C. Bouillaguet and P.A. Fouque
    Analysis of the Radiogatun Hash Function
    SAC '08, LNCS 5381, pp. 245-261, Springer-Verlag, 2008
  48. P.A. Fouque, G. Martinet, F. Valette and S. Zimmer
    On the Security of the CCM Encryption Mode and of a Slight Variant
    ACNS '08, LNCS 5037, pp. 411-428, Springer-Verlag, 2008.
  49. M. Drissi, P.A. Fouque, D. Réal and F. Valette
    The Carry Leakage on the Randomized Exponent Countermeasure
    CHES '08, LNCS 5154, pp. 198-213, Springer-Verlag, 2008.
  50. P.A. Fouque, R. Lercier, D. Réal, and F. Valette
    Fault Attack on Elliptic Curve with Montgomery Ladder
    FDTC '08, IEEE-CS , pp. 92-98, 2008.
  51. E. Andreeva, C. Bouillaguet, P.A. Fouque, J.J. Hoch, J. Kelsey, A. Shamir and S. Zimmer
    Second Preimage Attacks on Dithered Hash Functions
    Eurocrypt '08, LNCS 4965, pp. 270-288, Springer-Verlag, 2008.
  52. P.A. Fouque, G. Macario-Rat and J. Stern
    Key Recovery on Hidden Monomial Multivariate Schemes
    Eurocrypt '08, LNCS 4965, pp. 19-30, Springer-Verlag, 2008.
  53. P.A. Fouque, G. Macario-Rat, L. Perret and J. Stern
    Total Break of the l-IC Signature Scheme
    PKC '08, LNCS 4939, pp. 1-17, Springer-Verlag, 2008.
  54. P.A. Fouque, D. Pointcheval and S. Zimmer
    HMAC is a Randomness Extractor and Applications to TLS
    AsiaCCS '08, pp. 21-32, ACM Press, 2008.
  55. P.A. Fouque and G. Leurent
    Cryptanalysis of a Hash Function Based on Quasi-Cyclic Codes
    CTRSA '08, LNCS 4964, pp. 19-35, Springer-Verlag, 2008.
  56. 2007

  57. P.A. Fouque, G. Leurent and P.Q. Nguyen
    Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
    Crypto '07, LNCS 4622, pp. 13-30, Springer-Verlag, 2007.
  58. V. Dubois, P.A. Fouque, A. Shamir and J. Stern
    Practical Cryptanalysis of SFLASH
    Crypto '07, LNCS 4622, pp. 1-12, Springer-Verlag, 2007.
  59. V. Dubois, P.A. Fouque and J. Stern
    Cryptanalysis of SFLASH with Slightly Modified Parameters
    Eurocrypt '07, LNCS 4515, pp. 264-275, Springer-Verlag, 2007.
  60. V. Dubois, P.A. Fouque, J. Stern and A. Shamir
    Cryptanalysis of the SFLASH Signature Scheme
    Inscrypt '07, LNCS 4990, pp. 1-4, Springer-Verlag, 2007.
  61. 2006

  62. P.A. Fouque, S. Kunz-Jacques, G. Martinet, F. Muller, and F. Valette
    Power Attack on Small RSA Public Exponent
    CHES '06, LNCS 4249, pp. 339-353, Springer-Verlag, 2006.
  63. P.A. Fouque and E. Levieil
    An Improved LPN Algorithm
    SCN '06, LNCS 4116, pp. 348-359, Springer-Verlag, 2006.
  64. P.A. Fouque, D. Pointcheval, J. Stern, and S. Zimmer
    Hardness of Distinguishing the MSB of LSB of Secret Keys in Diffie-Hellman Schemes
    ICALP '06, LNCS 4052, pp. 240-251, Springer-Verlag, 2006.
  65. O. Chevassut, P.A. Fouque, P. Gaudry, and D. Pointcheval
    The Twist-Augmented Technique for Key Exchange
    PKC '06, LNCS 3958, pp. 410-426, Springer-Verlag, 2006.
  66. 2005

  67. M. Abdalla, O. Chevassut, P.-A. Fouque, and D. Pointcheval
    A Simple Threshold Authenticated Key Exchange from Short Secrets
    Asiacrypt '05, LNCS 3788, pp. 566-588, Springer-Verlag, 2005.
  68. P.-A. Fouque, L. Granboulan and J. Stern
    Differential Cryptanalysis for Multivariate Schemes
    Eurocrypt '05, LNCS 3494, pp. 341-353, Springer-Verlag, 2005.
  69. M. Abdalla, P.-A. Fouque, and D. Pointcheval
    Password-Based Authenticated Key Exchange in the Three-Party Setting
    PKC '05, LNCS 3396, pp. 65-84, Springer-Verlag, 2005.
  70. 2004

  71. P.-A. Fouque, A. Joux and G. Poupard
    Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
    SAC '04, LNCS 3357, pp. 212-226, Springer-Verlag, 2004.
  72. P.-A. Fouque, F. Muller, G. Poupard, and F. Valette
    Defeating Countermeasures Based on Randomized BSD Representations
    CHES '04, LNCS 3156, pp. 312-327, Springer-Verlag, 2004.
  73. 2003

  74. P.-A. Fouque, N. Howgrave-Graham, G. Martinet, and G. Poupard
    The Insecurity of Esign in Practical Implementations
    Asiacrypt '03, LNCS 2894, pp. 492-506, Springer-Verlag, 2003.
  75. P.-A. Fouque and F. Valette
    The Doubling Attack : Why Upwards is Better Than Downwards
    CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003.
  76. P.-A. Fouque, G. Martinet, and G. Poupard
    Attacking Unbalanced RSA-CRT Using SPA
    CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003.
  77. P.-A. Fouque, A. Joux, G. Martinet, and F. Valette
    Authenticated On-line Encryption
    SAC '03, LNCS 3006, pp. 145-159, Springer-Verlag, 2003.
  78. P.-A. Fouque and G. Poupard
    On the security of RDSA
    Eurocrypt '03, LNCS 2656, pp. 462-476, Springer-Verlag, 2003.
  79. P.-A. Fouque, G. Martinet, and G. Poupard
    Practical Symmetric On-line Encryption
    FSE '03, LNCS 2887, pp. 362-375, Springer-Verlag, 2003.
  80. 2002

  81. P.-A. Fouque, J. Stern, and G. Wackers
    CryptoComputing with rational Numbers
    FC '02, LNCS 2357, pp. 136-146, Springer-Verlag, 2002.
  82. 2001

  83. P.-A. Fouque and D. Pointcheval
    Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
    Asiacrypt '01, LNCS 2248, pp. 351-368, Springer-Verlag, 2001.
  84. P.-A. Fouque, and J. Stern
    Fully Distributed Threshold RSA under Standard Assumptions
    Asiacrypt '01, LNCS 2248, pp. 310-330, Springer-Verlag, 2001.
  85. O. Baudron, P.-A. Fouque, D. Pointcheval, G. Poupard, and J. Stern
    Practical Multi-Candidate Election System
    PODC '01, pp. 274-283, ACM, 2001.
  86. P.-A. Fouque and J. Stern
    One Round Threshold Discrete-Log Key Generation without Private Channels
    PKC '01, LNCS 1992, pp. 300-316, Springer-Verlag, 2001.
  87. 2000

  88. P.-A. Fouque, G. Poupard and J. Stern
    Sharing Decryption in the Context of Voting or Lottery
    FC '00, LNCS 1962, pp. 90-104, Springer-Verlag, 2000.

Articles Journaux en soumission

Thèse

Pierre-Alain Fouque
Le partage de clés cryptographiques: Théorie et Pratique
Université Paris 7, Oct. 2001.

HDR

Pierre-Alain Fouque
Sur Quelques Méthodes Algébriques et Statistique en Cryptanalyse
École normale supérieure, Dec. 2010.