Publications
Books
Proceedings of ISC 2017: 20th International Conference on Information Security (Springer, LNCS 10599, 2017)
Proceedings of EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, LNCS 8441, 2014)
Proceedings of EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, LNCS 7881, 2013)
Proceedings of PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography (Springer, LNCS 6056, 2010)
The LLL Algorithm:
Survey and Applications (Springer, Series: Information Security and Cryptography, 2009)
Proceedings of VIETCRYPT: First International Conference on Cryptology in Vietnam (Springer, LNCS 4341, 2006)
Surveys and Lecture Notes
"Vulgarisation" in French
La cryptographie de demain (Pour la Science , 2016)
Calculer avec des données cryptées (Mensuel La Recherche , n°437 , janvier 2010)
Une géométrie pour les codes secrets (Les dossiers de la Recherche , n°37, trimestriel novembre 2009)
Le calcul en toute discrétion (Mensuel La Recherche , n°434, octobre 2009)
Les logiciels libres aussi ont des failles de sécurité (Mensuel La Recherche , n°423, octobre 2008)
Une géométrie pour les prochains codes (Mensuel La Recherche , n°420, juin 2008)
La cryptologie : Enjeux et perspectives (2005)
La géométrie des nombres : de Gauss aux codes secrets (Hors série n° 36 de Pour la Science , juillet 2002)
Journal Papers
Counting Co-cyclic Lattices (2016) *SIAM Journal on Discrete Mathematics*, 30-3, pp. 1358-1370
An LLL Algorithm with Quadratic Complexity (2009) *SIAM Journal on Computing*, Vol. 39, No. 3, pp. 874–903
Low-Dimensional Lattice Basis Reduction Revisited (2009) *ACM Transactions on Algorithms*, Vol. 5 Issue 4, October 2009
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
(2009) *Journal of Cryptology*, Volume 22, Number 2
Sieve Algorithms for the Shortest Vector Problem Are Practical (2008) *Journal of Mathematical Cryptology*, Vol 2, Number 2
Testing Set Proportionality and the Adam Isomorphism of Circulant Graphs (2005) *Journal of Discrete Algorithms*
Hidden number problem with hidden multipliers, timed-release crypto and noisy exponentiation (2003) *Mathematics of computation*, Vol 72, Number 243, Pages 1473-1485
The Insecurity of the Elliptic Curve Digital Signature
Algorithm with Partially Known Nonces (2003) *Design, Codes and Cryptography*, Vol 30, Number 2, Pages 201-217
The Insecurity of the Digital Signature
Algorithm with Partially Known Nonces (2002) *J. of Cryptology*, Vol. 15, Number 3, Pages 151-176
International Conference Papers
MISCELLANEOUS