Skip to main content.

Vulgarisation Scientifique

Articles Journaux

  1. Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval
    Password-Based Authenticated Key Exchange in the Three-Party Setting
    IEE Proceedings, Volume 153, Issue 1, pp. 27 - 39, March 2006.
  2. B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, and J. Traoré
    On Some Incompatible Properties of Voting Schemes
    Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010.
  3. Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, and Joana Treger
    A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
    Journal of Mathematical Cryptology (JMC), Fevrier 2012.
  4. Reza Farashahi, Pierre-Alain Fouque, Igor Shparlinski, Mehdi Tibouchi, Felipe Voloch
    Indifferentiability deterministic hashing to elliptic curve and hyperelliptic curves
    Math. Comp., 2013.
  5. P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
    Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
    JCEN, 2013.
  6. J. Lu, Y. Wei, P.-A. Fouque and J. Kim
    Cryptanalysis of reduced versions of the Camellia block cipher
    IET Information Security, 6(3): 228--238, 2012.
  7. C. Bouillaguet, P. Derbez, O. Dunkelman, N. Keller and V. Rijmen
    Low-Data Complexity Attacks on AES
    IEEE Transactions on Information Theory, 58(11):7002-2017, 2012.
  8. M. Abdalla, P.A. Fouque, V. Lyubashevsky and M. Tibouchi
    Tightly-Secure Signatures From Lossy Identification Schemes
    Journal of Cryptology 29(3), pp. 597--631, 2016.
  9. E. Andreeva, C. Bouillaguet, O. Dunkelman, P.A. Fouque, J.J. Hoch, J. Kelsey, A. Shamir and S. Zimmer
    New Second-Preimage Attacks on Hash Functions
    Journal of Cryptology 29(4), pp. 657--696, 2016
  10. P. A. Fouque, C. Onete and B. Richard
    Achieving Better Privacy for the 3GPP AKA Protocol
    PETS 2016 (4), pp. 255--275, 2016.
  11. B. Minaud, P. Derbez, P.A. Fouque and P. Karpman
    Key-Recovery Attacks on ASASA.
    Journal of Cryptology 31(3), pp. 845--884, 2018.
  12. T. Espitau, P.A. Fouque, B. Gérard and M. Tibouchi
    Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols.
    IEEE Trans. Computers 67(11), pp. 1535--1549, 2018.
  13. P. Derbez, P.A. Fouque, B. Lambin and B. Minaud
    On Recovering Affine Encodings in White-Box Implementations.
    TCHES 2018(3), pp. 121--149, 2018.
  14. C. Bouillaguet, C. Delaplace and P.A. Fouque
    Revisiting and Improving Algorithms for the 3XOR Problem.
    TOSC/FSE 2018(1), pp. 254--276, 2018.
  15. P.A. Fouque and M. Tibouchi
    Close to Uniform Prime Number Generation With Fewer Random Bits.
    IEEE Trans. Information Theory 65(2), pp. 1307--1317, 2019.
  16. R. Bost and P.A. Fouque
    Security-Efficiency Tradeoffs in Searchable Encryption
    PoPETS 2019, pp. 132-151, Springer, 2019.
  17. G. Arfaoui, X. Bultel, P.A. Fouque, A. Nedelcu and C. Onete
    The Privacy of TLS 1.3 Protocol
    PoPETS 2019, pp. 190--210, Springer, 2019.
  18. P. Derbez, P.A. Fouque, B. Lambin, and V. Mollimard
    Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
    TOSC/FSE 2019, pp. 218--240, Springer, 2019.
  19. G. Barthe, S. Belaid, F. Dupressoir, P.A. Fouque, B. Grégoire, F.X. Standaert, and P.Y. Strub
    Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
    J. CEn 2020, pp. 17--26, Springer, 2020.
  20. B. Lambin, P. Derbez, and P.A. Fouque
    Linearly equivalent S-boxes and the division property
    Design, Codes Cryptography 2020, pp. 2207--2231, Springer, 2020.
  21. P. Derbez, P.A. Fouque, and V. Mollimard
    Fake Near Collisions Attacks
    TOSC/FSE 2020, pp. 88--103, Springer, 2020.
  22. P. Derbez and P.A. Fouque
    Increasing Precision of Division Property
    TOSC/FSE 2020, pp. 173--194, Springer, 2020.
  23. D. Braga, P.A. Fouque, and M. Sabt
    The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
    TCHES 2020, pp. 196--218, Springer, 2020.
  24. P.A. Fouque, P. Kirchner, T. Pornin, and Y. Yu
    BAT: Small and Fast KEM over NTRU Lattices
    TCHES 2022, pp. 240--265, Springer, 2022.
  25. G. Patat, M. Sabt, and P.A. Fouque
    Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME
    PoPETS 2023, pp. 306--321, Springer, 2023.
  26. G. Barthe, S. Belaid, T. Espitau, P.A. Fouque, B. Grégoire, M. Rossi, and M. Tibouchi
    Masking the GLP Lattice-Based Signature Scheme at Any Order
    Journal of Cryptology 37(1), pp. 5, 2024.

Workshop and Proposal for NIST competitions

Preprints

  1. P. Kirchner and P.A. Fouque
    Getting Rid of Linear Algebra in Number Theory Problems
  2. P. Kirchner and P.A. Fouque
    Time-Memory Trade-Off for Lattice Enumeration in a Ball
  3. J. Plut, P.A. Fouque and G. Macario-Rat
    Solving the "Isomorphism of Polynomials with Two Secrets" Problem for All Pairs of Quadratic Forms
  4. R. Bost, P.A. Fouque and D. Pointcheval
    Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security

Conférences

    2024

  1. O. Bernard, P.A. Fouque, and A. Lesavourey
    Computing e-th roots in number fields
    ALENEX 2024, pp. 207--219, SIAM, 2024.
  2. 2023

  3. C. Bouillaguet, A. Fleury, P.A. Fouque, and P. Kirchner
    We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve.
    ASIACRYPT 2023, pp. 138--166, Springer, 2023.
  4. D. De Almeida Braga, N. Kulatova, M. Sabt, P.A. Fouque, and K. Bhargavan
    From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake
    EuroSP 2023, pp. 707--723, IEEE, 2023.
  5. P.A. Fouque, A. Georgescu, C. Qian, A. Roux-Langlois, W. Wen
    A Generic Transform from Multi-round interactive Proof to NIZK
    PKC 2023, pp. 461--481, Springer, 2023.
  6. 2022

  7. T. Espitau, P.A. Fouque, F. Gérard, M. Rossi, A. Takahashi, M. Tibouchi, A. Wallet, and Y. Yu
    Mitaka: a simpler, parallelizable, maskable variant of Falcon
    EUROCRYPT 2022, pp. 222--253, Springer, 2022.
  8. J. Jancar, M. Fourné, D. De Almeida Braga, M. Sabt, P. Schwabe, G. Barthe, P.A. Fouque, and Y. Acar
    "They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
    IEEE Symposium on Security and Privacy, pp. 632--649, IEEE, 2022.
  9. G. Arfaoui, P.A. Fouque, T. Jacques, P. Lafourcade, A. Nedelcu, C. Onete, and L. Robert
    A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
    ACNS 2022, pp. 399--418, Springer, 2022.
  10. G. Patat, M. Sabt, and P.A. Fouque
    WideLeak: How Over-the-Top Platforms Fail in Android.
    DSN 2022, pp. 501-508, Springer, 2022.
  11. G. Patat, M. Sabt, and P.A. Fouque
    Exploring Widevine for Fun and Profit.
    SP Workshops 2022, pp. 277--288, 2022.
  12. O. Blazy, P.A. Fouque, T. Jacques, P. Lafourcade, C. Onete, and L. Robert
    MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing.
    SAC 2022, pp. 1666--1673, Springer, 2022.
  13. P. Derbez, M. Euler, P.A. Fouque, and H. Nguyen
    Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.
    ASIACRYPT 2022, pp. Springer, 2022.
  14. 2021

  15. D. De Almeida Braga, P.A. Fouque, and M. Sabt
    PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
    CCS 2021, pp. 2497--2512, ACM, 2021.
  16. A. Bossuat, R. Bost, P.A. Fouque, B. Minaud, and M. Reichle
    SSE and SSD: Page-Efficient Searchable Symmetric Encryption
    CRYPTO 2021, pp. 157--184, Springer, 2021.
  17. P. Kichner, T. Espitau, and P.A. Fouque
    Towards Faster Polynomial-Timme Lattice Reduction
    CRYPTO 2021, pp. 760--790, Springer, 2021.
  18. J. Devigne, C. Duguey, and P.A. Fouque
    MLS Group Messaging: How Zero-Knowledge Can Secure Updates
    ESORICS 2021, pp. 587--607, Springer, 2021.
  19. G. Arfaoui, O. Blazy, X. Bultel, P.A. Fouque, T. Jacques, A. Nedelcu, and C. Onete
    Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE)
    ESORICS 2021, pp. 23--43, Springer, 2021.
  20. 2020

  21. A. Siffer, P.A. Fouque, A. Termiet, and C. Largouet
    Netspot: a simple Intrusion Detection System with statistical learning
    TrustCom 2020, pp. 911--918, IEEE, 2020.
  22. D. De Almeida Braga, P.A. Fouque, and M. Sabt
    Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
    ACSAC 2020, pp. 291--303, ACM, 2020.
  23. M. Albrecht, S. Bai, P.A. Fouque, P. Kirchner, D. Stehlé, and W. Wen
    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
    CRYPTO 2020, pp. 186--212, Springer, 2020.
  24. P. Kirchner, T. Espitau, P.A. Fouque
    Fast reduction of algebraic lattices over cyclotomic fields
    CRYPTO 2020, pp. 155--185, Springer, 2020.
  25. A. Bossuat, X. Bultel, P.A. Fouque, C. Onete, and T. van der Merwe
    Designing Reverse Firewalls for the Real World
    ESORICS 2020, pp. 193--213, Springer, 2020.
  26. S. Campion, J. Devigne, C. Duguey, and P.A. Fouque
    Multi-Device for Signal
    ACNS 2020, pp. 167--187, Springer, 2020.
  27. P.A. Fouque, P. Kirchner, M. Tibouchi, A. Wallet, and Y. Yu
    Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
    EUROCRYPT 2020, pp. 34--63, Springer, 2020.
  28. 2019

  29. G. Barthe, S. Belaid, T. Espitau, P.A. Fouque, M. Rossi, and M. Tibouchi
    GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
    CCS 2019, pp. 2147--2164, ACM, 2019.
  30. G. Barthe, S. Belaid, G. Cassiers, P.A. Fouque, B. Grégoire, F.X. Standaert
    maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
    ESORICS 2019, pp. 300-318, Springer, 2019.
  31. V. Migliore, B. Gérard, M. Tibouchi and P.A. Fouque
    Masking Dilithium - Efficient Implementation and Side-Channel Evaluation
    ACNS 2019, pp. 344--362, Springer, 2019.
  32. O. Blazy, A. Bossuat, X. Bultel, P.A. Fouque, C. Onete and E. Pagnin
    SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
    EUROSP 2019, pp., IEEE, 2019.
  33. 2018

  34. N. Desmoulins, P.A. Fouque, C. Onete and O. Sanders
    Pattern Matching on Encrypted Streams.
    ASIACRYPT 2018, pp. 121--148, Springer, 2018.
  35. J. Bootle, C. Delaplace, T. Espitau, P.A. Fouque and M. Tibouchi
    LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
    ASIACRYPT 2018, pp. 494--524, Springer, 2018.
  36. C. Baritel-Ruet, F. Dupressoir, P.A. Fouque and B. Grégoire
    Formal Security Proof of CMAC and Its Variants.
    CSF 2018, pp. 91--104, 2018.
  37. G. Barthe, S. Belaid, T. Espitau, P.A. Fouque, B. Grégoire, M. Rossi and M. Tibouchi
    Masking the GLP Lattice-Based Signature Scheme at Any Order.
    EUROCRYPT 2018, pp. 354--384, Springer, 2018.
  38. A. Siffer, P.A. Fouque, A. Termier and C. Largouet
    Are your data gathered?
    SIGKDD 2018, pp. 2210--2218, 2018.
  39. P. Bert, P.A. Fouque, A. Roux-Langlois and M. Sabt
    Practical Implementation of Ring-SIS/LWE Based Signature and IBE.
    PQ Crypto 2018, pp. 271--291, Springer, 2018.
  40. P. Derbez, P.A. Fouque, J. Jean and B. Lambin
    Variants of the AES Key Schedule for Better Truncated Differential Bounds.
    SAC 2018, pp. 27--49, Springer, 2018.
  41. K. Bhargavan, I. Boureanu, A. Delignat-Lavaud, P.A. Fouque and C. Onete
    A Formal Treatment of Accountable Proxying Over TLS.
    IEEE Symposium on Security and Privacy 2018, pp. 799--816, IEEE Press, 2018.
  42. 2017

  43. T. Espitau, P.A. Fouque, B. Gérard and M. Tibouchi
    Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
    CCS 2017, pp. 1857--1874, ACM Press, 2017.
  44. A. Siffer, P.A. Fouque, A. Termier and C. Largouet
    Anomaly Detection in Streams with Extreme Value Theory
    SIGKDD 2017, pp. 1067--1075, 2017.
  45. C. Bouillaguet, C. Delaplace, P.A. Fouque and P. Kirchner
    Fast Lattice-Based Encryption: Stretching Spring
    PQCrypto 2017, pp. 125--142, 2017.
  46. P. Kirchner and P.A. Fouque
    Revisiting Lattice Attacks on overstretched NTRU parameters
    EUROCRYPT 2017, pp. 3--26, Springer-Verlag, 2017.
  47. J.F. Biasse, T. Espitau, P.A. Fouque, A. Gélin and P. Kirchner
    Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L(1/2) and Application to the Cryptanalysis of a FHE Scheme.
    EUROCRYPT 2017, pp. 60--88, Springer-Verlag, 2017.
  48. K. Bhargavan, I. Boureanu Carlson, P.A. Fouque, C. Onete, B. Richard
    Content delivery over TLS: a cryptographic analysis of Keyless SSL
    EUROSP 2017, pp., IEEE, 2017.
  49. 2016

  50. G . Barthe, S. Belaid, F. Dupressoir, P.A. Fouque, B. Grégoire and P.Y. Strub
    Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
    ACM CCS 2016, pp. 116--129, ACM, 2016.
  51. P.A. Fouque, P. Karpman, P. Kirchner and B. Minaud
    Efficient and Provable White-Box Primitives
    ASIACRYPT 2016, pp. 159--188, Springer-Verlag, 2016.
  52. T. Espitau, P.A. Fouque, B. Gérard and M. Tibouchi
    Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures
    SAC 2016, pp., Springer-Verlag, 2016.
  53. P. Derbez and P.A. Fouque
    Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
    CRYPTO 2016, pp. 157--184, Springer-Verlag, 2016.
  54. P. A. Fouque, B. Hadjibeyli and P. Kirchner
    Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
    COCOON 2016, pp. 269--280, Springer-Verlag, 2016.
  55. P. Lestringant, P.A. Fouque and F. Guihéry
    Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing
    ACNS 2016, pp. 561--579, Springer-Verlag, 2016.
  56. S. Alt, P.A. Fouque, G. Macario-Rat, C. Onete and B. Richard
    A Cryptographic Analysis of UMTS/LTE AKA
    ACNS 2016, pp. 18--35, Springer-Verlag, 2016.
  57. P.A. Fouque and C. Qian
    Fault Attacks on Efficient Pairing Implementations
    AsiaCCS 2016, pp. 641--650, ACM, 2016.
  58. J.H. Cheon, P.A. Fouque, C. Lee, B. Minaud and H. Ryu
    Cryptanalysis of the New CLT Multilinear Map over the Integers
    Eurocrypt 2016, pp. 509--536, Springer-Verlag, 2016.
  59. P. Belgarric, P.A. Fouque, G. Macario-Rat and M. Tibouchi
    Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
    CT-RSA 2016, pp. 236--252, Springer-Verlag, 2016.
  60. 2015

  61. B. Minaud, P. Derbez, P.A. Fouque and P. Karpman
    Key-Recovery Attacks on ASASA
    Asiacrypt 2015, pp. 3--27, Springer-Verlag, 2015.
  62. P. Lestringant, F. Guihéry and P.A. Fouque
    Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism
    AsiaCCS 2015, pp. 203--214, ACM Press, 2015.
  63. S. Belaid, J.-S. Coron, P.A. Fouque, B. Gérard, J.-G. Kammerer, E. Prouff
    Improved Side-Channel Analysis of Finite-Field Multiplication
    CHES 2015, pp. 395--415, Springer-Verlag, 2015.
  64. P. Kirchner and P.A. Fouque
    An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
    CRYPTO 2015, pp. 43--62, Springer-Verlag, 2015.
  65. P.A. Fouque, M.S. Lee, T. Lepoint and M. Tibouchi
    Cryptanalysis of the Co-ACD Assumption
    CRYPTO 2015, pp. 561--580, Springer-Verlag, 2015.
  66. T. Espitau, P.A. Fouque and P. Karpman
    Higher-Order Differential Meet-in-the-Middle Preimage Attacks on SHA-1 and BLAKE
    CRYPTO 2015, pp. 683--701, Springer-Verlag, 2015.
  67. G. Barthe, S. Belaid, F. Dupressoir, P.A. Fouque, B. Grégoire, P.Y. Strub
    Verified Proofs of Higher-Order Masking
    EUROCRYPT 2015, pp. 457--485, Springer-Verlag, 2015.
  68. 2014

  69. P.A. Fouque, A. Joux and C. Mavromati
    Multi-user collisions: Applications to Discrete-Logs, Even-Mansour and Prince
    Asiacrypt 2014, pp. 420--438, Springer-Verlag, 2014.
  70. D.F. Aranha, P.A. Fouque, B. Gerard, J.G. Kammerer, M. Tibouchi and J.C. Zapalowicz
    GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias
    Asiacrypt 2014, pp. 262--281, Springer-Verlag, 2014.
  71. S. Belaid, P.A. Fouque and B. Gérard
    Side-Channel Analysis of the authentication of AES-GCM
    Asiacrypt 2014, pp. 306--325, Springer-Verlag, 2014.
  72. G. Barthe, F. Dupressoir, P.A. Fouque, B. Gregoire and J.C. Zapalowicz
    Synthesis of Fault Attacks on Cryptographic Implementations
    ACM CCS 2014, pp. 1016--1027, ACM, 2014.
  73. P.A. Fouque and M. Tibouchi
    Close to Uniform Prime Number Generation With Fewer Random Bits
    ICALP 2014, pp. 991--1002, Springer-Verlag, 2014.
  74. P.A. Fouque and J.C. Zapalowicz
    Statistical Properties of Short RSA Distribution and their Cryptographic Applications
    COCOON 2014, pp. 525--536, Springer-Verlag, 2014.
  75. D. Augot, P.A. Fouque and P. Karpman
    Diffusion matrices from algebraic-geometry codes with efficient constant-time software implementation
    SAC 2014, pp. 243--260, Springer-Verlag, 2014.
  76. D.F. Aranha, Q. Chen, P.A. Fouque, M. Tibouchi and J.C. Zapalowicz
    Binary Elligator Squared
    SAC 2014, pp. 20--37, Springer-Verlag, 2014.
  77. G. Barthe, F. Dupressoir, P.A. Fouque, B. Gregoire, M. Tibouchi and J.C. Zapalowicz
    Making RSA-PSS Provably Secure Against Non-Random Faults
    CHES 2014, pp. 206--222, Springer-Verlag, 2014.
  78. 2013

  79. P.A. Fouque and P. Karpman
    Security Amplification against Meet-in-the-Middle Attacks using Whitening
    IMACC 2013, pp. 252--269, Springer-Verglag, 2013.
  80. P.A. Fouque, M. Tibouchi and J.C. Zapalowicz
    Recovering Private Keys Generated with Weak PRNGs
    IMACC 2013, pp 158--172., Springer-Verlag, 2013.
  81. P.A. Fouque, J. Jean and T. Peyrin
    Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
    CRYPTO 2013, pp. 183--203, Springer-Verlag, 2013.
  82. M. Abdalla, S. Belaid, P.A. Fouque
    Leakage-Resilient Symmetric Encryption via Re-Keying
    CHES 2013, pp. 471--488, Springer-Verlag, 2013.
  83. P.A. Fouque, A. Joux and M. Tibouchi
    Injective Encodings to Elliptic Curves
    ACISP 2013, pp. 203--218, Springer-Verlag, 2013.
  84. P.A. Fouque, D. Vergnaud and J.C. Zapalowicz
    Time/Memory/Data Tradeoffs for Variants of the RSA Problem
    COCOON 2013, pp. 651--662, Springer-Verlag, 2013.
  85. P.A. Fouque and T. Vannet
    Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
    FSE 2013, pp. 502--517, Springer-Verlag, 2013.
  86. P. Derbez and P.A. Fouque
    Exhausting Demirci-Selcuk Meet-in-the-Middle Attacks against Reduced-Round AES
    FSE 2013, pp. 541--560, Springer-Verlag, 2013.
  87. P. Derbez, P.A. Fouque and J. Jean
    Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
    EUROCRYPT 2013, pp. 371--387, Springer-Verlag, 2013.
  88. C. Bouillaguet, P.A. Fouque and A. Veber
    Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem
    EUROCRYPT 2013, pp. 211--227, Springer-Verlag, 2013.
  89. C. Arnaud and P.A. Fouque
    Timing Attack against protected RSA-CRT implementation used in PolarSSL
    CT RSA 2013, pp. 18--33, Springer-Verlag, 2013.
  90. 2012

  91. J. Lu, Wei, P.A. Fouque and E. Pasalic
    Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
    IWSEC 2012, pp. 197--215, Springer-Verlag, 2012.
  92. P. Derbez, P.A. Fouque, and J. Jean
    Faster Chosen-Key Distinguishers on Reduced-Round AES
    Indocrypt 2012, LNCS, pp. 225--243, Springer-Verlag, 2012.
  93. P.A. Fouque, D. Leresteux, and F. Valette
    Using faults for buffer overflow effects
    SAC 2012, pp. 1638--1639, ACM, 2012.
  94. P.A. Fouque and M. Tibouchi
    Indifferentiable Hashing to Barreto-Naehrig Curves
    Latincrypt 2012, LNCS, pp. 1--17, Springer-Verlag, 2012.
  95. M. Daubignard, P.A. Fouque and Y. Lakhnech
    Generic Indifferentiability Proofs of Hash Designs
    CSF 2012, pp. 340--353, ACM, 2012.
  96. P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
    Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
    CHES 2012, LNCS, pp. 447--462, Springer-Verlag, 2012.
  97. P.A. Fouque, D. Leresteux and F. Valette
    Fault Attack like Buffer Overflow
    ACM Symposium on Applied Computing, pp. 1638--1639, ACM, 2012.
  98. M. Abdalla, P.A. Fouque, V. Lyubashevski and M. Tibouchi
    Tightly-Secure Signatures from Lossy ID Schemes
    Eurocrypt 2012, LNCS 7237, pp. 572--590, Springer-Verlag, 2012.
  99. 2011

  100. C. Bouillaguet, P.A. Fouque and G. Macario-Rat
    New Insights on Impossible Differential Cryptanalysis
    Asiacrypt 2011, LNCS 7073, pp. 667--685, Springer-Verlag, 2011.
  101. C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
    New Insights on Impossible Differential Cryptanalysis
    SAC 2011, LNCS, pp., Springer-Verlag, 2011.
  102. P. Derbez, P.A. Fouque and D. Leresteux
    Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
    CHES 2011, LNCS 6917, pp. 274--291, Springer-Verlag, 2011.
  103. C. Bouillaguet, P. Derbez and P.A. Fouque
    Automatic Search of Attacks on Round-Reduced AES and Applications
    CRYPTO 2011, LNCS 6841, pp. 169--187, Springer-Verlag, 2011.
  104. T. Chardin, P.A. Fouque and D. Leresteux
    Cache Timing Analysis of RC4
    ACNS 2011, LNCS 6715, pp. 110-129, Springer-Verlag, 2011.
  105. C. Bouillaguet, J.C. Faugère, P.A. Fouque and L. Perret
    Practical Cryptanalysis of the Indentification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
    PKC 2011, LNCS 6571, pp. 473-493, Springer-Verlag, 2011.
  106. P.A. Fouque and J. Jean
    Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
    FSE 2011, LNCS 6733, pp. 107-127, Springer-Verlag, 2011.
  107. 2010

  108. B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern and J. Traore
    On Some Incompatible Properties of Voting Schemes
    Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010.
  109. C. Bouillaguet, O. Dunkelman, P.A. Fouque, and G. Leurent
    Another Look at Complementation Properties
    FSE '10, LNCS 6147, pp. 347-364, Springer-Verlag, 2010.
  110. P.A. Fouque and M. Tibouchi
    Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
    LATINCRYPT 2010, LNCS 6212, pp. 81-91, Springer-Verlag, 2010.
  111. P.A. Fouque and M. Tibouchi
    Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
    Pairing 2010, LNCS 6487, pp. 265-277, Springer-Verlag, 2010.
  112. C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
    Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
    SAC 2010, LNCS 6544, pp. 18-35, Springer-Verlag, 2010.
  113. C. Bouillaguet, P.A. Fouque and G. Leurent
    Security Analysis of SIMD
    SAC 2010, LNCS 6544, pp. 351-368 Springer-Verlag, 2010.
  114. 2009

  115. Chevalier, P.A. Fouque, D. Pointcheval, and S. Zimmer
    Optimal Randomness Extraction from a Diffie-Hellman Element
    Eurocrypt '09, LNCS 5479, pp. 572-589, Springer-Verlag, 2009
  116. P.A. Fouque, G. Leurent, D. Réal and F. Valette
    Practical Electromagnetic Template Attack on HMAC
    CHES 2009, LNCS 5747, pp. 66-80, Springer-Verlag, 2009.
  117. P.A. Fouque, D. Masgana and F. Valette
    Fault Attack on Schnorr Based Identification and Signature Scheme
    FDTC 2009, pp. 32-38, IEEE Computer Society, 2009.
  118. 2008

  119. P.A. Fouque, J. Stern, and S. Zimmer
    Cryptanalysis of Tweaked Versions of SMASH and Reparation
    SAC '08, LNCS 5381, pp. 136-150, Springer-Verlag, 2008.
  120. C. Bouillaguet and P.A. Fouque
    Analysis of the Radiogatun Hash Function
    SAC '08, LNCS 5381, pp. 245-261, Springer-Verlag, 2008
  121. P.A. Fouque, G. Martinet, F. Valette and S. Zimmer
    On the Security of the CCM Encryption Mode and of a Slight Variant
    ACNS '08, LNCS 5037, pp. 411-428, Springer-Verlag, 2008.
  122. M. Drissi, P.A. Fouque, D. Réal and F. Valette
    The Carry Leakage on the Randomized Exponent Countermeasure
    CHES '08, LNCS 5154, pp. 198-213, Springer-Verlag, 2008.
  123. P.A. Fouque, R. Lercier, D. Réal, and F. Valette
    Fault Attack on Elliptic Curve with Montgomery Ladder
    FDTC '08, IEEE-CS , pp. 92-98, 2008.
  124. E. Andreeva, C. Bouillaguet, P.A. Fouque, J.J. Hoch, J. Kelsey, A. Shamir and S. Zimmer
    Second Preimage Attacks on Dithered Hash Functions
    Eurocrypt '08, LNCS 4965, pp. 270-288, Springer-Verlag, 2008.
  125. P.A. Fouque, G. Macario-Rat and J. Stern
    Key Recovery on Hidden Monomial Multivariate Schemes
    Eurocrypt '08, LNCS 4965, pp. 19-30, Springer-Verlag, 2008.
  126. P.A. Fouque, G. Macario-Rat, L. Perret and J. Stern
    Total Break of the l-IC Signature Scheme
    PKC '08, LNCS 4939, pp. 1-17, Springer-Verlag, 2008.
  127. P.A. Fouque, D. Pointcheval and S. Zimmer
    HMAC is a Randomness Extractor and Applications to TLS
    AsiaCCS '08, pp. 21-32, ACM Press, 2008.
  128. P.A. Fouque and G. Leurent
    Cryptanalysis of a Hash Function Based on Quasi-Cyclic Codes
    CTRSA '08, LNCS 4964, pp. 19-35, Springer-Verlag, 2008.
  129. 2007

  130. P.A. Fouque, G. Leurent and P.Q. Nguyen
    Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
    Crypto '07, LNCS 4622, pp. 13-30, Springer-Verlag, 2007.
  131. V. Dubois, P.A. Fouque, A. Shamir and J. Stern
    Practical Cryptanalysis of SFLASH
    Crypto '07, LNCS 4622, pp. 1-12, Springer-Verlag, 2007.
  132. V. Dubois, P.A. Fouque and J. Stern
    Cryptanalysis of SFLASH with Slightly Modified Parameters
    Eurocrypt '07, LNCS 4515, pp. 264-275, Springer-Verlag, 2007.
  133. V. Dubois, P.A. Fouque, J. Stern and A. Shamir
    Cryptanalysis of the SFLASH Signature Scheme
    Inscrypt '07, LNCS 4990, pp. 1-4, Springer-Verlag, 2007.
  134. 2006

  135. P.A. Fouque, S. Kunz-Jacques, G. Martinet, F. Muller, and F. Valette
    Power Attack on Small RSA Public Exponent
    CHES '06, LNCS 4249, pp. 339-353, Springer-Verlag, 2006.
  136. P.A. Fouque and E. Levieil
    An Improved LPN Algorithm
    SCN '06, LNCS 4116, pp. 348-359, Springer-Verlag, 2006.
  137. P.A. Fouque, D. Pointcheval, J. Stern, and S. Zimmer
    Hardness of Distinguishing the MSB of LSB of Secret Keys in Diffie-Hellman Schemes
    ICALP '06, LNCS 4052, pp. 240-251, Springer-Verlag, 2006.
  138. O. Chevassut, P.A. Fouque, P. Gaudry, and D. Pointcheval
    The Twist-Augmented Technique for Key Exchange
    PKC '06, LNCS 3958, pp. 410-426, Springer-Verlag, 2006.
  139. 2005

  140. M. Abdalla, O. Chevassut, P.-A. Fouque, and D. Pointcheval
    A Simple Threshold Authenticated Key Exchange from Short Secrets
    Asiacrypt '05, LNCS 3788, pp. 566-588, Springer-Verlag, 2005.
  141. P.-A. Fouque, L. Granboulan and J. Stern
    Differential Cryptanalysis for Multivariate Schemes
    Eurocrypt '05, LNCS 3494, pp. 341-353, Springer-Verlag, 2005.
  142. M. Abdalla, P.-A. Fouque, and D. Pointcheval
    Password-Based Authenticated Key Exchange in the Three-Party Setting
    PKC '05, LNCS 3396, pp. 65-84, Springer-Verlag, 2005.
  143. 2004

  144. P.-A. Fouque, A. Joux and G. Poupard
    Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
    SAC '04, LNCS 3357, pp. 212-226, Springer-Verlag, 2004.
  145. P.-A. Fouque, F. Muller, G. Poupard, and F. Valette
    Defeating Countermeasures Based on Randomized BSD Representations
    CHES '04, LNCS 3156, pp. 312-327, Springer-Verlag, 2004.
  146. 2003

  147. P.-A. Fouque, N. Howgrave-Graham, G. Martinet, and G. Poupard
    The Insecurity of Esign in Practical Implementations
    Asiacrypt '03, LNCS 2894, pp. 492-506, Springer-Verlag, 2003.
  148. P.-A. Fouque and F. Valette
    The Doubling Attack : Why Upwards is Better Than Downwards
    CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003.
  149. P.-A. Fouque, G. Martinet, and G. Poupard
    Attacking Unbalanced RSA-CRT Using SPA
    CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003.
  150. P.-A. Fouque, A. Joux, G. Martinet, and F. Valette
    Authenticated On-line Encryption
    SAC '03, LNCS 3006, pp. 145-159, Springer-Verlag, 2003.
  151. P.-A. Fouque and G. Poupard
    On the security of RDSA
    Eurocrypt '03, LNCS 2656, pp. 462-476, Springer-Verlag, 2003.
  152. P.-A. Fouque, G. Martinet, and G. Poupard
    Practical Symmetric On-line Encryption
    FSE '03, LNCS 2887, pp. 362-375, Springer-Verlag, 2003.
  153. 2002

  154. P.-A. Fouque, J. Stern, and G. Wackers
    CryptoComputing with rational Numbers
    FC '02, LNCS 2357, pp. 136-146, Springer-Verlag, 2002.
  155. 2001

  156. P.-A. Fouque and D. Pointcheval
    Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
    Asiacrypt '01, LNCS 2248, pp. 351-368, Springer-Verlag, 2001.
  157. P.-A. Fouque, and J. Stern
    Fully Distributed Threshold RSA under Standard Assumptions
    Asiacrypt '01, LNCS 2248, pp. 310-330, Springer-Verlag, 2001.
  158. O. Baudron, P.-A. Fouque, D. Pointcheval, G. Poupard, and J. Stern
    Practical Multi-Candidate Election System
    PODC '01, pp. 274-283, ACM, 2001.
  159. P.-A. Fouque and J. Stern
    One Round Threshold Discrete-Log Key Generation without Private Channels
    PKC '01, LNCS 1992, pp. 300-316, Springer-Verlag, 2001.
  160. 2000

  161. P.-A. Fouque, G. Poupard and J. Stern
    Sharing Decryption in the Context of Voting or Lottery
    FC '00, LNCS 1962, pp. 90-104, Springer-Verlag, 2000.

Thèse

Pierre-Alain Fouque
Le partage de clés cryptographiques: Théorie et Pratique
Université Paris 7, Oct. 2001.

HDR

Pierre-Alain Fouque
Sur Quelques Méthodes Algébriques et Statistique en Cryptanalyse
École normale supérieure, Dec. 2010.