Up: Rapport de Recherche
Previous: Activités d'enseignement
Références
- ABSS93
-
S. Arora, L. Babai, J. Stern, and Z. Sweedyk.
The hardness of approximating problems defined by linear constraints.
In Proceedings of the IEEE Symposium on Foundations of Computer
Science, pages 586--597, 1993.
à paraître dans JCSS.
- BBC
93 -
C.H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. Wootters.
Teleporting an unkown quantum state by dual classical and EPR
channels.
Physical Review Letter, 70:1895--1898, 1993.
- BBCM94
-
C.H. Bennett, G. Brassard, C. Crépeau, and U. Maurer.
Generalized privacy amplification (abstract).
In Proceedings of the IEEE Symposium on Information
Theory, page 350, 1994.
- BBCM95
-
C.H. Bennett, G. Brassard, C. Crépeau, and U. Maurer.
Generalized privacy amplification.
IEEE Transaction on Information Theory, 1995.
à paraître.
- BBCS92
-
C.H. Bennett, G. Brassard, C. Crépeau, and M.-H. Skubiszewska.
Practical quantum oblivious transfer protocols.
In Advances in Cryptology: Proceedings of CRYPTO'91, volume 576
of LNCS, pages 351--366. Springer-Verlag, 1992.
- BC91
-
G. Brassard and C. Crépeau.
Quantum bit commitment and coin tossing protocols.
In Advances in Cryptology: Proceedings of CRYPTO'90, volume 537
of LNCS, pages 49--61. Springer-Verlag, 1991.
- BC95
-
P. Béguin and A. Cresti.
General short non perfect secret sharing schemes.
In Advances in Cryptology: Proceedings of Eurocrypt'95, LNCS.
Springer-Verlag, 1995.
to appear.
- BCJL93
-
G. Brassard, C. Crépeau, R. Jozsa, and D. Langlois.
A quantum bit commitment scheme provably unbreakable by both parties.
In
Symposium on Foundations of Computer Science,
pages 42--52. IEEE, 1993.
- BCLL91
-
G. Brassard, C. Crépeau, S. Laplante, and C. Léger.
Computationally convincing proofs of knowledge.
In Proceedings of STACS'91, volume 480 of LNCS, pages
251--262. Springer-Verlag, 1991.
- BCY91
-
G. Brassard, C. Crépeau, and M. Yung.
Constant-round perfect zero-knowledge computationally convincing
protocols.
Theoretical Computer Science, 84:23--52, 1991.
- BN94
-
P. Béguin and D. Naccache.
Breacking an improved version of a "more flexible exponentiation with
precomputation".
Presented at the rump session of CRYPTO '94, 1994.
- BQ93a
-
P. Béguin and J.-J. Quisquater.
Accélération de calculs cryptographiques à l'aide d'un
serveur non sécurisé.
In Journées de Cargèse : Complexité, Codage,
Compression et Cryptographie, pages 13 -- 25, 1993.
- BQ93b
-
P. Béguin and J.-J. Quisquater.
Efficient inverse cubic RSA computations aided by a
powerful untrusted server.
Presented at the rump session of CRYPTO'93, 1993.
- BQ94a
-
P. Béguin and J.-J. Quisquater.
Resistant server-aided secret computations for public-key
cryptosystems.
In B. Macq, editor, Proceedings of the Fifteenth Symposium on
Information Theory in the Benelux, pages 127--131. 'Werkgemeenschap voor
Informatie- en Communicatie theorie', The Netherlands, 1994.
- BQ94b
-
P. Béguin and J.-J. Quisquater.
Secure acceleration of DSS signatures using insecure
server.
In Advances in Cryptology Asiacrypt '94, LNCS. Springer-Verlag,
1994.
To appear.
- BQ95
-
P. Béguin and J.-J. Quisquater.
Acceleration of RSA signatures using an insecure server.
Submitted to Crypto '95, 1995.
- CC
-
A. Canteaut and F. Chabaud.
A general improvement of the previous attacks on McEliece's
cryptosystem.
Non publié.
- CDFdRS94
-
J.-M. Couveignes, J. F. Diaz-Frias, M. de Rougemont, and M. Santha.
On the interactive complexity of graph reliability.
In 14th FSTTCS Foundations of Software Technology and
Theoretical Computer Science. Springer, 1994.
- CG94a
-
J.-M. Couveignes and L. Granboulan.
Dessins from a geometric point of view.
In Grothendieck's dessins d'enfants, Lecture Notes in Math.
Cambridge University Press, 1994.
Disponible comme LIENS-94-2.
- CG94b
-
J.-M. Couveignes and L. Granboulan.
Explicit computation of some M24 covering.
En préparation, 1994.
- Cha93
-
F. Chabaud.
Asymptotic analysis of probabilistic algorithms for finding short
codewords.
In P. Camion, P. Charpin, and S. Harari, editors, EUROCODE'92,
volume 339 of CISM Courses and Lectures, pages 175--183.
Springer-Verlag, 1993.
- Cha94
-
F. Chabaud.
On the security of some cryptosystems based on error-correcting
codes.
In Advances in Cryptology: Proceedings of EUROCRYPT'94, LNCS.
Springer-Verlag, 1994.
To appear.
- CJL
93 -
M. J. Coster, A. Joux, B. A. LaMacchia, A. Odlyzko, C.-P. Schnorr, and
J. Stern.
Improved low-density subset sum algorithms.
Computational Complexity, 2:11--128, 1993.
- CJM94
-
J.-M. Couveignes, A. Joux, and F. Morain.
évaluation des sommes de caractères liées aux courbes
elliptiques à multiplication complexe par l'anneau des entiers d'un corps
quadratique imaginaire de nombre de classes 2.
En préparation, 1994.
- CJS91
-
Y. M. Chee, A. Joux, and J. Stern.
The cryptanalysis of a new public-key cryptosystem based on modular
knapsacks.
In J. Feigenbaum, editor, Advances in Cryptology: Proceedings of
CRYPTO'91, volume 576 of LNCS, pages 204--212. Springer-Verlag, 1991.
- CK93
-
C. Crépeau and J. Kilian.
Discreet solitary games.
In Advances in Cryptology: Proceedings of CRYPTO'93, volume 537
of LNCS, pages 319--330. Springer-Verlag, 1993.
- CM94
-
J.-M. Couveignes and F. Morain.
Schoof's algorithm and isogeny cycles.
In First Algorithmic Number Theory Conference, Lecture Notes in
Math., 1994.
- Cou93
-
J.-M. Couveignes.
Computing a square root for the number field sieve.
In The development of the number field sieve, volume 1554 of
Lecture Notes in Math., pages 95--102. Springer-Verlag, 1993.
- Cou94a
-
J.-M. Couveignes.
Calcul et rationalité de fonctions de Belyi en genre 0.
Annales de l'Institut Fourier, 44, 1994.
- Cou94b
-
J.-M. Couveignes.
Computing isogenies in small characteristic.
Submitted for publication, 1994.
- Cou94c
-
J.-M. Couveignes.
Existence de fonctions de Belyi sans automorphismes.
Submitted for publication, 1994.
- Cou94d
-
J.-M. Couveignes.
Quelques calculs en théorie des nombres.
Thèse de doctorat, École Doctorale de Bordeaux, 1994.
- Cré93
-
C. Crépeau.
Cryptographic primitives and quantum theory.
In Proceedings of the second Physics of Computation Workshop,
PHYSCOMP'92, pages 200--204, 1993.
- Cré94
-
C. Crépeau.
Quantum oblivious transfer.
Journal of Modern Optics, 41(12):2445--2454, 1994.
- CS91a
-
Crépeau C and M. Sántha.
On the reversibility of oblivious transfer.
In Advances in Cryptology: Proceedings of EUROCRYPT'91, volume
547 of LNCS, pages 106--113. Springer-Verlag, 1991.
- CS91b
-
C. Crépeau and M. Sántha.
Efficient reductions among oblivious transfer protocols based on new
self-intersecting codes.
In Sequences II, Methods in Communications, Security, and
Computer Science, pages 360--368. Springer-Verlag, 1991.
- CS95
-
C. Crépeau and L. Salvail.
Quantum oblivious mutual identification.
In Advances in Cryptology: Proceedings of Eurocrypt'95.
Springer-Verlag, 1995.
à paraître.
- CSV94
-
D. Coppersmith, J. Stern, and S. Vaudenay.
Attacks on the birational permutation signature schemes.
In D. R. Stinson, editor, Advances in Cryptology CRYPTO'93,
volume 773 of LNCS, pages 435--443. Springer-Verlag, 1994.
Disponible comme LIENS-93-25.
- CT95
-
C. Crépeau and A. Tapp.
Committed oblivious transfer.
In Advances in Cryptology: Proceedings of Crypto'95.
Springer-Verlag, 1995.
- CV94
-
F. Chabaud and S. Vaudenay.
Links between differential and linear cryptanalysis.
In A. de Santis, editor, Advances in Cryptology: Proceedings of
EUROCRYPT'94. Springer-Verlag, 1994.
Disponible comme LIENS-94-3.
- FJR
94 -
J. Friedman, A. Joux, Y. Roichman, J. Stern, and J.-P. Tillich.
Most regular graph are quickly r-transitive.
1994.
non-publié.
- Gra94
-
L. Granboulan.
Construction d'une extension régulière de Q(T) de groupe de
galois M24.
Journal of Experimental Maths, 1994.
Submitted for publication.
- GS94
-
M. Girault and J. Stern.
On the length of cryptographic hash-values used in cryptographic
identification scheme.
In Advances in Cryptology, Proceedings of CRYPTO'94, LNCS.
Springer-Verlag, 1994.
- JG94
-
A. Joux and L. Granboulan.
A practical attack against knapsack based hash functions.
In Advances in Cryptology: Proceedings of EUROCRYPT'94, LNCS.
Springer-Verlag, 1994.
- Jou93a
-
A. Joux.
A fast parallel lattice reduction algorithm.
Submitted to Gauss Symposium, 1993.
- Jou93b
-
A. Joux.
La Réduction des Réseaux en Cryptographie.
Thèse de doctorat, Ecole Polytechnique, 1993.
Disponible comme LIENS-93-7.
- JS91a
-
A. Joux and J. Stern.
Cryptanalysis of another knapsack cryptosystem.
In H. Imai, R. L. Rivest, and T. Matsumoto, editors, Advances in
Cryptology: Proceedings of ASIACRYPT'91, volume 739 of LNCS, pages
470--476. Springer-Verlag, 1991.
- JS91b
-
A. Joux and J. Stern.
Improving the critical density of the lagarias-odlyzko attack against
subset sum problems.
In L. Budach, editor, Proceedings of Fundamentals of Computation
Theory 91, volume 529 of LNCS, pages 258--264. Springer-Verlag, 1991.
- JS94
-
A. Joux and J. Stern.
Lattice reduction: a toolbox for the cryptanalyst.
Journal of Cryptology, 1994.
soumis au J. Cryptology.
- LC94
-
P. Hoogvorst L. Caudal, H. Gilbert.
A new identification scheme based on the three dimensional matching
problem.
non publié, 1994.
- LS91
-
G. Lachaud and J. Stern.
Polynomial-time construction of linear codes with almost equal
weights.
In A. de Santis, editor, Sequences II, Methods in
Communications, Security, and Computer Science, pages 59--62, New York,
1991. Springer-Verlag.
- LS92a
-
G. Lachaud and J. Stern.
Polynomial-time construction of codes I: linear codes with almost
equal weights.
Applicable Algebra in Engineering, Communication and Computing,
pages 151--161, 1992.
- LS92b
-
G. Lachaud and J. Stern.
Polynomial-time construction of spherical codes.
In Proceedings of the AAECC-9 Conference, volume 539 of
LNCS, pages 218--223. Springer-Verlag, 1992.
- LS94
-
G. Lachaud and J. Stern.
Polynomial-time construction of codes II: Spherical codes and the
kissing number of spheres.
IEEE Transactions on Information Theory, 40:1140--1146, 1994.
- MNRV94
-
D. M'Raïhi, D. Naccache, D. Raphaeli, and S. Vaudenay.
Complexity trade-offs with the digital signature standard.
In A. de Santis, editor, Advances in Cryptology: EUROCRYPT'94,
1994.
To appear.
- Poi95
-
D. Pointcheval.
A new identification scheme based on the perceptrons problem.
In L. Guillou, editor, Advances in Cryptology EUROCRYPT'95,
LNCS. Springer-Verlag, 1995.
to appear. LIENS-95-2.
- SBM93
-
J. Stern, S. Blackburn, and S. Murphy.
Weaknesses of a public key cryptosystem based on factorization of
finite groups.
In T. Helleseth, editor, Advances in Cryptology: Proceedings of
EUROCRYPT'93, volume 765 of LNCS, pages 50--54. Springer-Verlag, 1993.
- Ste93a
-
J. Stern.
Approximating the number of error locations is NP-complete.
In T. Mora, editor, Proceedings of the AAECC-10 Conference,
volume 673 of LNCS, pages 323--331. Springer-Verlag, 1993.
- Ste93b
-
J. Stern.
A new identification scheme based on syndrome decoding.
In Advances in Cyrptology, Proceedings of CRYPTO'93, volume 773
of LNCS, pages 13--21. Springer-Verlag, 1993.
- Ste94
-
J. Stern.
Designing identification scheme with keys of short size.
In Advances in Cryptology, Proceedings of CRYPTO'94, volume 839
of LNCS, pages 164--173. Springer-Verlag, 1994.
- SV94a
-
C. P. Schnorr and S. Vaudenay.
Black box cryptanalysis of hash networks based on multipermutations.
In A. de Santis, editor, Advances in Cryptology: EUROCRYPT'94,
1994.
To appear.
- SV94b
-
C. P. Schnorr and S. Vaudenay.
Parallel FFT-hashing.
In R. Anderson, editor, Fast Software Encryption, Cambridge
Security Workshop, volume 809 of LNCS, pages 149--156.
Springer-Verlag, 1994.
- Vau93a
-
S. Vaudenay.
FFT-Hash-II is not yet collision-free.
In E. F. Brickell, editor, Advances in Cryptology CRYPTO'92,
volume 740 of LNCS, pages 587--593. Springer-Verlag, 1993.
Disponible comme LIENS-92-17.
- Vau93b
-
S. Vaudenay.
One-time identification with low memory.
In P. Camion, P. Charpin, and S. Harari, editors, EUROCODE'92,
volume 339 of CISM Courses and Lectures, pages 217--228.
Springer-Verlag, 1993.
Disponible comme LIENS-92-22.
- Vau95
-
S. Vaudenay.
On the need for multipermutations: Cryptanalysis of MD4 and
SAFER.
In B. Preneel, editor, Proceedings of Leuven Workshop on
Cryptographic Algorithms, 1995.
Up: Rapport de Recherche
Previous: Activités d'enseignement