Vulgarisation Scientifique
|
Articles Journaux
- Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings, Volume 153, Issue 1, pp. 27 - 39, March 2006. - B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, and J. Traoré
On Some Incompatible Properties of Voting Schemes
Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010. - Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, and Joana Treger
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
Journal of Mathematical Cryptology (JMC), Fevrier 2012. - Reza Farashahi, Pierre-Alain Fouque, Igor Shparlinski, Mehdi Tibouchi, Felipe Voloch
Indifferentiability deterministic hashing to elliptic curve and hyperelliptic curves
Math. Comp., 2013. - P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
JCEN, 2013. - J. Lu, Y. Wei, P.-A. Fouque and J. Kim
Cryptanalysis of reduced versions of the Camellia block cipher
IET Information Security, 6(3): 228--238, 2012. - C. Bouillaguet, P. Derbez, O. Dunkelman, N. Keller and V. Rijmen
Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory, 58(11):7002-2017, 2012. - M. Abdalla, P.A. Fouque, V. Lyubashevsky and M. Tibouchi
Tightly-Secure Signatures From Lossy Identification Schemes
Journal of Cryptology 29(3), pp. 597--631, 2016. - E. Andreeva, C. Bouillaguet, O. Dunkelman, P.A. Fouque, J.J. Hoch, J. Kelsey, A. Shamir and S. Zimmer
New Second-Preimage Attacks on Hash Functions
Journal of Cryptology 29(4), pp. 657--696, 2016 - P. A. Fouque, C. Onete and B. Richard
Achieving Better Privacy for the 3GPP AKA Protocol
PETS 2016 (4), pp. 255--275, 2016. - B. Minaud, P. Derbez, P.A. Fouque and P. Karpman
Key-Recovery Attacks on ASASA.
Journal of Cryptology 31(3), pp. 845--884, 2018. - T. Espitau, P.A. Fouque, B. Gérard and M. Tibouchi
Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols.
IEEE Trans. Computers 67(11), pp. 1535--1549, 2018. - P. Derbez, P.A. Fouque, B. Lambin and B. Minaud
On Recovering Affine Encodings in White-Box Implementations.
TCHES 2018(3), pp. 121--149, 2018. - C. Bouillaguet, C. Delaplace and P.A. Fouque
Revisiting and Improving Algorithms for the 3XOR Problem.
TOSC/FSE 2018(1), pp. 254--276, 2018. - P.A. Fouque and M. Tibouchi
Close to Uniform Prime Number Generation With Fewer Random Bits.
IEEE Trans. Information Theory 65(2), pp. 1307--1317, 2019. - R. Bost and P.A. Fouque
Security-Efficiency Tradeoffs in Searchable Encryption
PoPETS 2019, pp. 132-151, Springer, 2019. - G. Arfaoui, X. Bultel, P.A. Fouque, A. Nedelcu and C. Onete
The Privacy of TLS 1.3 Protocol
PoPETS 2019, pp. 190--210, Springer, 2019. - P. Derbez, P.A. Fouque, B. Lambin, and V. Mollimard
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
TOSC/FSE 2019, pp. 218--240, Springer, 2019. - G. Barthe, S. Belaid, F. Dupressoir, P.A. Fouque, B. Grégoire, F.X. Standaert, and P.Y. Strub
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
J. CEn 2020, pp. 17--26, Springer, 2020. - B. Lambin, P. Derbez, and P.A. Fouque
Linearly equivalent S-boxes and the division property
Design, Codes Cryptography 2020, pp. 2207--2231, Springer, 2020. - P. Derbez, P.A. Fouque, and V. Mollimard
Fake Near Collisions Attacks
TOSC/FSE 2020, pp. 88--103, Springer, 2020. - P. Derbez and P.A. Fouque
Increasing Precision of Division Property
TOSC/FSE 2020, pp. 173--194, Springer, 2020. - D. Braga, P.A. Fouque, and M. Sabt
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
TCHES 2020, pp. 196--218, Springer, 2020. - P.A. Fouque, P. Kirchner, T. Pornin, and Y. Yu
BAT: Small and Fast KEM over NTRU Lattices
TCHES 2022, pp. 240--265, Springer, 2022. - G. Patat, M. Sabt, and P.A. Fouque
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME
PoPETS 2023, pp. 306--321, Springer, 2023. - G. Barthe, S. Belaid, T. Espitau, P.A. Fouque, B. Grégoire, M. Rossi, and M. Tibouchi
Masking the GLP Lattice-Based Signature Scheme at Any Order
Journal of Cryptology 37(1), pp. 5, 2024.
Workshop and Proposal for NIST competitions
- J. Patarin, B. Cogliati, J.C. Faugere, P.A. Fouque, L. Goubin, R. Larrieu, G. Macario-Rat, and B. Minaud
VOX specifications
Proposal for the NIST additional call for signature, 2023. - L. Goubin, B. Cogliati, J.C Faugere, P.A. Fouque, R. Larrieu, G. Macario-Rat, B. Minaud, and J. Patarin
PROV specifications
Proposal for the NIST additional call for signature, 2023. - P.A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T. Ricosset, G. Seiler, W. Whyte, and Z. Zhang
FALCON: Fast-Fourier Lattice-based Compact Signatures over NTRU
Falcon specifications
Proposal for the NIST Post-Quantum Competition, 2017. - G. Leurent, C. Bouillaguet, and P.A. Fouque
SIMD - Hash Function Candidate to the NIST SHA-3 competition
NIST HASH Workshop
Proposal for the NIST SHA-3 competition, 2009. - P.A. Fouque, G. Leurent and P. Nguyen
Automatic Search of Differential Path in MD4
ECRYPT HASH Workshop 2007 - B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, and J. Traoré
On Some Incompatible Properties of Voting Schemes
WOTE '06.
Preprints
- P. Kirchner and P.A. Fouque
Getting Rid of Linear Algebra in Number Theory Problems - P. Kirchner and P.A. Fouque
Time-Memory Trade-Off for Lattice Enumeration in a Ball - J. Plut, P.A. Fouque and G. Macario-Rat
Solving the "Isomorphism of Polynomials with Two Secrets" Problem for All Pairs of Quadratic Forms - R. Bost, P.A. Fouque and D. Pointcheval
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
Conférences
- O. Bernard, P.A. Fouque, and A. Lesavourey
Computing e-th roots in number fields
ALENEX 2024, pp. 207--219, SIAM, 2024. - C. Bouillaguet, A. Fleury, P.A. Fouque, and P. Kirchner
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve.
ASIACRYPT 2023, pp. 138--166, Springer, 2023. - D. De Almeida Braga, N. Kulatova, M. Sabt, P.A. Fouque, and K. Bhargavan
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake
EuroSP 2023, pp. 707--723, IEEE, 2023. - P.A. Fouque, A. Georgescu, C. Qian, A. Roux-Langlois, W. Wen
A Generic Transform from Multi-round interactive Proof to NIZK
PKC 2023, pp. 461--481, Springer, 2023. - T. Espitau, P.A. Fouque, F. Gérard, M. Rossi, A. Takahashi, M. Tibouchi, A. Wallet, and Y. Yu
Mitaka: a simpler, parallelizable, maskable variant of Falcon
EUROCRYPT 2022, pp. 222--253, Springer, 2022. - J. Jancar, M. Fourné, D. De Almeida Braga, M. Sabt, P. Schwabe, G. Barthe, P.A. Fouque, and Y. Acar
"They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
IEEE Symposium on Security and Privacy, pp. 632--649, IEEE, 2022. - G. Arfaoui, P.A. Fouque, T. Jacques, P. Lafourcade, A. Nedelcu, C. Onete, and L. Robert
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
ACNS 2022, pp. 399--418, Springer, 2022. - G. Patat, M. Sabt, and P.A. Fouque
WideLeak: How Over-the-Top Platforms Fail in Android.
DSN 2022, pp. 501-508, Springer, 2022. - G. Patat, M. Sabt, and P.A. Fouque
Exploring Widevine for Fun and Profit.
SP Workshops 2022, pp. 277--288, 2022. - O. Blazy, P.A. Fouque, T. Jacques, P. Lafourcade, C. Onete, and L. Robert
MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing.
SAC 2022, pp. 1666--1673, Springer, 2022. - P. Derbez, M. Euler, P.A. Fouque, and H. Nguyen
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.
ASIACRYPT 2022, pp. Springer, 2022. - D. De Almeida Braga, P.A. Fouque, and M. Sabt
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
CCS 2021, pp. 2497--2512, ACM, 2021. - A. Bossuat, R. Bost, P.A. Fouque, B. Minaud, and M. Reichle
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
CRYPTO 2021, pp. 157--184, Springer, 2021. - P. Kichner, T. Espitau, and P.A. Fouque
Towards Faster Polynomial-Timme Lattice Reduction
CRYPTO 2021, pp. 760--790, Springer, 2021. - J. Devigne, C. Duguey, and P.A. Fouque
MLS Group Messaging: How Zero-Knowledge Can Secure Updates
ESORICS 2021, pp. 587--607, Springer, 2021. - G. Arfaoui, O. Blazy, X. Bultel, P.A. Fouque, T. Jacques, A. Nedelcu, and C. Onete
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE)
ESORICS 2021, pp. 23--43, Springer, 2021. - A. Siffer, P.A. Fouque, A. Termiet, and C. Largouet
Netspot: a simple Intrusion Detection System with statistical learning
TrustCom 2020, pp. 911--918, IEEE, 2020. - D. De Almeida Braga, P.A. Fouque, and M. Sabt
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
ACSAC 2020, pp. 291--303, ACM, 2020. - M. Albrecht, S. Bai, P.A. Fouque, P. Kirchner, D. Stehlé, and W. Wen
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
CRYPTO 2020, pp. 186--212, Springer, 2020. - P. Kirchner, T. Espitau, P.A. Fouque
Fast reduction of algebraic lattices over cyclotomic fields
CRYPTO 2020, pp. 155--185, Springer, 2020. - A. Bossuat, X. Bultel, P.A. Fouque, C. Onete, and T. van der Merwe
Designing Reverse Firewalls for the Real World
ESORICS 2020, pp. 193--213, Springer, 2020. - S. Campion, J. Devigne, C. Duguey, and P.A. Fouque
Multi-Device for Signal
ACNS 2020, pp. 167--187, Springer, 2020. - P.A. Fouque, P. Kirchner, M. Tibouchi, A. Wallet, and Y. Yu
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
EUROCRYPT 2020, pp. 34--63, Springer, 2020. - G. Barthe, S. Belaid, T. Espitau, P.A. Fouque, M. Rossi, and M. Tibouchi
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
CCS 2019, pp. 2147--2164, ACM, 2019. - G. Barthe, S. Belaid, G. Cassiers, P.A. Fouque, B. Grégoire, F.X. Standaert
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
ESORICS 2019, pp. 300-318, Springer, 2019. - V. Migliore, B. Gérard, M. Tibouchi and P.A. Fouque
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation
ACNS 2019, pp. 344--362, Springer, 2019. - O. Blazy, A. Bossuat, X. Bultel, P.A. Fouque, C. Onete and E. Pagnin
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
EUROSP 2019, pp., IEEE, 2019. - N. Desmoulins, P.A. Fouque, C. Onete and O. Sanders
Pattern Matching on Encrypted Streams.
ASIACRYPT 2018, pp. 121--148, Springer, 2018. - J. Bootle, C. Delaplace, T. Espitau, P.A. Fouque and M. Tibouchi
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
ASIACRYPT 2018, pp. 494--524, Springer, 2018. - C. Baritel-Ruet, F. Dupressoir, P.A. Fouque and B. Grégoire
Formal Security Proof of CMAC and Its Variants.
CSF 2018, pp. 91--104, 2018. - G. Barthe, S. Belaid, T. Espitau, P.A. Fouque, B. Grégoire, M. Rossi and M. Tibouchi
Masking the GLP Lattice-Based Signature Scheme at Any Order.
EUROCRYPT 2018, pp. 354--384, Springer, 2018. - A. Siffer, P.A. Fouque, A. Termier and C. Largouet
Are your data gathered?
SIGKDD 2018, pp. 2210--2218, 2018. - P. Bert, P.A. Fouque, A. Roux-Langlois and M. Sabt
Practical Implementation of Ring-SIS/LWE Based Signature and IBE.
PQ Crypto 2018, pp. 271--291, Springer, 2018. - P. Derbez, P.A. Fouque, J. Jean and B. Lambin
Variants of the AES Key Schedule for Better Truncated Differential Bounds.
SAC 2018, pp. 27--49, Springer, 2018. - K. Bhargavan, I. Boureanu, A. Delignat-Lavaud, P.A. Fouque and C. Onete
A Formal Treatment of Accountable Proxying Over TLS.
IEEE Symposium on Security and Privacy 2018, pp. 799--816, IEEE Press, 2018. - T. Espitau, P.A. Fouque, B. Gérard and M. Tibouchi
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
CCS 2017, pp. 1857--1874, ACM Press, 2017. - A. Siffer, P.A. Fouque, A. Termier and C. Largouet
Anomaly Detection in Streams with Extreme Value Theory
SIGKDD 2017, pp. 1067--1075, 2017. - C. Bouillaguet, C. Delaplace, P.A. Fouque and P. Kirchner
Fast Lattice-Based Encryption: Stretching Spring
PQCrypto 2017, pp. 125--142, 2017. - P. Kirchner and P.A. Fouque
Revisiting Lattice Attacks on overstretched NTRU parameters
EUROCRYPT 2017, pp. 3--26, Springer-Verlag, 2017. - J.F. Biasse, T. Espitau, P.A. Fouque, A. Gélin and P. Kirchner
Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L(1/2) and Application to the Cryptanalysis of a FHE Scheme.
EUROCRYPT 2017, pp. 60--88, Springer-Verlag, 2017. - K. Bhargavan, I. Boureanu Carlson, P.A. Fouque, C. Onete, B. Richard
Content delivery over TLS: a cryptographic analysis of Keyless SSL
EUROSP 2017, pp., IEEE, 2017. - G . Barthe, S. Belaid, F. Dupressoir, P.A. Fouque, B. Grégoire and P.Y. Strub
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
ACM CCS 2016, pp. 116--129, ACM, 2016. - P.A. Fouque, P. Karpman, P. Kirchner and B. Minaud
Efficient and Provable White-Box Primitives
ASIACRYPT 2016, pp. 159--188, Springer-Verlag, 2016. - T. Espitau, P.A. Fouque, B. Gérard and M. Tibouchi
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures
SAC 2016, pp., Springer-Verlag, 2016. - P. Derbez and P.A. Fouque
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
CRYPTO 2016, pp. 157--184, Springer-Verlag, 2016. - P. A. Fouque, B. Hadjibeyli and P. Kirchner
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
COCOON 2016, pp. 269--280, Springer-Verlag, 2016. - P. Lestringant, P.A. Fouque and F. Guihéry
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing
ACNS 2016, pp. 561--579, Springer-Verlag, 2016. - S. Alt, P.A. Fouque, G. Macario-Rat, C. Onete and B. Richard
A Cryptographic Analysis of UMTS/LTE AKA
ACNS 2016, pp. 18--35, Springer-Verlag, 2016. - P.A. Fouque and C. Qian
Fault Attacks on Efficient Pairing Implementations
AsiaCCS 2016, pp. 641--650, ACM, 2016. - J.H. Cheon, P.A. Fouque, C. Lee, B. Minaud and H. Ryu
Cryptanalysis of the New CLT Multilinear Map over the Integers
Eurocrypt 2016, pp. 509--536, Springer-Verlag, 2016. - P. Belgarric, P.A. Fouque, G. Macario-Rat and M. Tibouchi
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
CT-RSA 2016, pp. 236--252, Springer-Verlag, 2016. - B. Minaud, P. Derbez, P.A. Fouque and P. Karpman
Key-Recovery Attacks on ASASA
Asiacrypt 2015, pp. 3--27, Springer-Verlag, 2015. - P. Lestringant, F. Guihéry and P.A. Fouque
Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism
AsiaCCS 2015, pp. 203--214, ACM Press, 2015. - S. Belaid, J.-S. Coron, P.A. Fouque, B. Gérard, J.-G. Kammerer, E. Prouff
Improved Side-Channel Analysis of Finite-Field Multiplication
CHES 2015, pp. 395--415, Springer-Verlag, 2015. - P. Kirchner and P.A. Fouque
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
CRYPTO 2015, pp. 43--62, Springer-Verlag, 2015. - P.A. Fouque, M.S. Lee, T. Lepoint and M. Tibouchi
Cryptanalysis of the Co-ACD Assumption
CRYPTO 2015, pp. 561--580, Springer-Verlag, 2015. - T. Espitau, P.A. Fouque and P. Karpman
Higher-Order Differential Meet-in-the-Middle Preimage Attacks on SHA-1 and BLAKE
CRYPTO 2015, pp. 683--701, Springer-Verlag, 2015. - G. Barthe, S. Belaid, F. Dupressoir, P.A. Fouque, B. Grégoire, P.Y. Strub
Verified Proofs of Higher-Order Masking
EUROCRYPT 2015, pp. 457--485, Springer-Verlag, 2015. - P.A. Fouque, A. Joux and C. Mavromati
Multi-user collisions: Applications to Discrete-Logs, Even-Mansour and Prince
Asiacrypt 2014, pp. 420--438, Springer-Verlag, 2014. - D.F. Aranha, P.A. Fouque, B. Gerard, J.G. Kammerer, M. Tibouchi and
J.C. Zapalowicz
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias
Asiacrypt 2014, pp. 262--281, Springer-Verlag, 2014. - S. Belaid, P.A. Fouque and B. Gérard
Side-Channel Analysis of the authentication of AES-GCM
Asiacrypt 2014, pp. 306--325, Springer-Verlag, 2014. - G. Barthe, F. Dupressoir, P.A. Fouque, B. Gregoire and
J.C. Zapalowicz
Synthesis of Fault Attacks on Cryptographic Implementations
ACM CCS 2014, pp. 1016--1027, ACM, 2014. - P.A. Fouque and M. Tibouchi
Close to Uniform Prime Number Generation With Fewer Random Bits
ICALP 2014, pp. 991--1002, Springer-Verlag, 2014. - P.A. Fouque and J.C. Zapalowicz
Statistical Properties of Short RSA Distribution and their Cryptographic Applications
COCOON 2014, pp. 525--536, Springer-Verlag, 2014. - D. Augot, P.A. Fouque and P. Karpman
Diffusion matrices from algebraic-geometry codes with efficient constant-time software implementation
SAC 2014, pp. 243--260, Springer-Verlag, 2014. - D.F. Aranha, Q. Chen, P.A. Fouque, M. Tibouchi and J.C. Zapalowicz
Binary Elligator Squared
SAC 2014, pp. 20--37, Springer-Verlag, 2014. - G. Barthe, F. Dupressoir, P.A. Fouque, B. Gregoire, M. Tibouchi and J.C. Zapalowicz
Making RSA-PSS Provably Secure Against Non-Random Faults
CHES 2014, pp. 206--222, Springer-Verlag, 2014. - P.A. Fouque and P. Karpman
Security Amplification against Meet-in-the-Middle Attacks using Whitening
IMACC 2013, pp. 252--269, Springer-Verglag, 2013. - P.A. Fouque, M. Tibouchi and J.C. Zapalowicz
Recovering Private Keys Generated with Weak PRNGs
IMACC 2013, pp 158--172., Springer-Verlag, 2013. - P.A. Fouque, J. Jean and T. Peyrin
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
CRYPTO 2013, pp. 183--203, Springer-Verlag, 2013. - M. Abdalla, S. Belaid, P.A. Fouque
Leakage-Resilient Symmetric Encryption via Re-Keying
CHES 2013, pp. 471--488, Springer-Verlag, 2013. - P.A. Fouque, A. Joux and M. Tibouchi
Injective Encodings to Elliptic Curves
ACISP 2013, pp. 203--218, Springer-Verlag, 2013. - P.A. Fouque, D. Vergnaud and J.C. Zapalowicz
Time/Memory/Data Tradeoffs for Variants of the RSA Problem
COCOON 2013, pp. 651--662, Springer-Verlag, 2013. - P.A. Fouque and T. Vannet
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
FSE 2013, pp. 502--517, Springer-Verlag, 2013. - P. Derbez and P.A. Fouque
Exhausting Demirci-Selcuk Meet-in-the-Middle Attacks against Reduced-Round AES
FSE 2013, pp. 541--560, Springer-Verlag, 2013. - P. Derbez, P.A. Fouque and J. Jean
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
EUROCRYPT 2013, pp. 371--387, Springer-Verlag, 2013. - C. Bouillaguet, P.A. Fouque and A. Veber
Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem
EUROCRYPT 2013, pp. 211--227, Springer-Verlag, 2013. - C. Arnaud and P.A. Fouque
Timing Attack against protected RSA-CRT implementation used in PolarSSL
CT RSA 2013, pp. 18--33, Springer-Verlag, 2013. - J. Lu, Wei, P.A. Fouque and E. Pasalic
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
IWSEC 2012, pp. 197--215, Springer-Verlag, 2012. - P. Derbez, P.A. Fouque, and J. Jean
Faster Chosen-Key Distinguishers on Reduced-Round AES
Indocrypt 2012, LNCS, pp. 225--243, Springer-Verlag, 2012. - P.A. Fouque, D. Leresteux, and F. Valette
Using faults for buffer overflow effects
SAC 2012, pp. 1638--1639, ACM, 2012. - P.A. Fouque and M. Tibouchi
Indifferentiable Hashing to Barreto-Naehrig Curves
Latincrypt 2012, LNCS, pp. 1--17, Springer-Verlag, 2012. - M. Daubignard, P.A. Fouque and Y. Lakhnech
Generic Indifferentiability Proofs of Hash Designs
CSF 2012, pp. 340--353, ACM, 2012. - P.A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.C. Zapalowicz
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
CHES 2012, LNCS, pp. 447--462, Springer-Verlag, 2012. - P.A. Fouque, D. Leresteux and F. Valette
Fault Attack like Buffer Overflow
ACM Symposium on Applied Computing, pp. 1638--1639, ACM, 2012. - M. Abdalla, P.A. Fouque, V. Lyubashevski and M. Tibouchi
Tightly-Secure Signatures from Lossy ID Schemes
Eurocrypt 2012, LNCS 7237, pp. 572--590, Springer-Verlag, 2012. - C. Bouillaguet, P.A. Fouque and G. Macario-Rat
New Insights on Impossible Differential Cryptanalysis
Asiacrypt 2011, LNCS 7073, pp. 667--685, Springer-Verlag, 2011. - C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
New Insights on Impossible Differential Cryptanalysis
SAC 2011, LNCS, pp., Springer-Verlag, 2011. - P. Derbez, P.A. Fouque and D. Leresteux
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
CHES 2011, LNCS 6917, pp. 274--291, Springer-Verlag, 2011. - C. Bouillaguet, P. Derbez and P.A. Fouque
Automatic Search of Attacks on Round-Reduced AES and Applications
CRYPTO 2011, LNCS 6841, pp. 169--187, Springer-Verlag, 2011. - T. Chardin, P.A. Fouque and D. Leresteux
Cache Timing Analysis of RC4
ACNS 2011, LNCS 6715, pp. 110-129, Springer-Verlag, 2011. - C. Bouillaguet, J.C. Faugère, P.A. Fouque and L. Perret
Practical Cryptanalysis of the Indentification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
PKC 2011, LNCS 6571, pp. 473-493, Springer-Verlag, 2011. - P.A. Fouque and J. Jean
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
FSE 2011, LNCS 6733, pp. 107-127, Springer-Verlag, 2011. - B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern and J. Traore
On Some Incompatible Properties of Voting Schemes
Trusted Trustworthy Elections 2010, LNCS 6000, pp. 191-199, Springer-Verlag, 2010. - C. Bouillaguet, O. Dunkelman, P.A. Fouque, and G. Leurent
Another Look at Complementation Properties
FSE '10, LNCS 6147, pp. 347-364, Springer-Verlag, 2010. - P.A. Fouque and M. Tibouchi
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
LATINCRYPT 2010, LNCS 6212, pp. 81-91, Springer-Verlag, 2010. - P.A. Fouque and M. Tibouchi
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pairing 2010, LNCS 6487, pp. 265-277, Springer-Verlag, 2010. - C. Bouillaguet, O. Dunkelman, P.A. Fouque and G. Leurent
Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
SAC 2010, LNCS 6544, pp. 18-35, Springer-Verlag, 2010. - C. Bouillaguet, P.A. Fouque and G. Leurent
Security Analysis of SIMD
SAC 2010, LNCS 6544, pp. 351-368 Springer-Verlag, 2010. - Chevalier, P.A. Fouque, D. Pointcheval, and S. Zimmer
Optimal Randomness Extraction from a Diffie-Hellman Element
Eurocrypt '09, LNCS 5479, pp. 572-589, Springer-Verlag, 2009 - P.A. Fouque, G. Leurent, D. Réal and F. Valette
Practical Electromagnetic Template Attack on HMAC
CHES 2009, LNCS 5747, pp. 66-80, Springer-Verlag, 2009. - P.A. Fouque, D. Masgana and F. Valette
Fault Attack on Schnorr Based Identification and Signature Scheme
FDTC 2009, pp. 32-38, IEEE Computer Society, 2009. - P.A. Fouque, J. Stern, and S. Zimmer
Cryptanalysis of Tweaked Versions of SMASH and Reparation
SAC '08, LNCS 5381, pp. 136-150, Springer-Verlag, 2008. - C. Bouillaguet and P.A. Fouque
Analysis of the Radiogatun Hash Function
SAC '08, LNCS 5381, pp. 245-261, Springer-Verlag, 2008 - P.A. Fouque, G. Martinet, F. Valette and S. Zimmer
On the Security of the CCM Encryption Mode and of a Slight Variant
ACNS '08, LNCS 5037, pp. 411-428, Springer-Verlag, 2008. - M. Drissi, P.A. Fouque, D. Réal and F. Valette
The Carry Leakage on the Randomized Exponent Countermeasure
CHES '08, LNCS 5154, pp. 198-213, Springer-Verlag, 2008. - P.A. Fouque, R. Lercier, D. Réal, and F. Valette
Fault Attack on Elliptic Curve with Montgomery Ladder
FDTC '08, IEEE-CS , pp. 92-98, 2008. - E. Andreeva, C. Bouillaguet, P.A. Fouque, J.J. Hoch,
J. Kelsey, A. Shamir and S. Zimmer
Second Preimage Attacks on Dithered Hash Functions
Eurocrypt '08, LNCS 4965, pp. 270-288, Springer-Verlag, 2008. - P.A. Fouque, G. Macario-Rat and J. Stern
Key Recovery on Hidden Monomial Multivariate Schemes
Eurocrypt '08, LNCS 4965, pp. 19-30, Springer-Verlag, 2008. - P.A. Fouque, G. Macario-Rat, L. Perret and J. Stern
Total Break of the l-IC Signature Scheme
PKC '08, LNCS 4939, pp. 1-17, Springer-Verlag, 2008. - P.A. Fouque, D. Pointcheval and S. Zimmer
HMAC is a Randomness Extractor and Applications to TLS
AsiaCCS '08, pp. 21-32, ACM Press, 2008. - P.A. Fouque and G. Leurent
Cryptanalysis of a Hash Function Based on Quasi-Cyclic Codes
CTRSA '08, LNCS 4964, pp. 19-35, Springer-Verlag, 2008. - P.A. Fouque, G. Leurent and P.Q. Nguyen
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Crypto '07, LNCS 4622, pp. 13-30, Springer-Verlag, 2007. - V. Dubois, P.A. Fouque, A. Shamir and J. Stern
Practical Cryptanalysis of SFLASH
Crypto '07, LNCS 4622, pp. 1-12, Springer-Verlag, 2007. - V. Dubois, P.A. Fouque and J. Stern
Cryptanalysis of SFLASH with Slightly Modified Parameters
Eurocrypt '07, LNCS 4515, pp. 264-275, Springer-Verlag, 2007. - V. Dubois, P.A. Fouque, J. Stern and A. Shamir
Cryptanalysis of the SFLASH Signature Scheme
Inscrypt '07, LNCS 4990, pp. 1-4, Springer-Verlag, 2007. - P.A. Fouque, S. Kunz-Jacques, G. Martinet, F. Muller, and
F. Valette
Power Attack on Small RSA Public Exponent
CHES '06, LNCS 4249, pp. 339-353, Springer-Verlag, 2006. - P.A. Fouque and E. Levieil
An Improved LPN Algorithm
SCN '06, LNCS 4116, pp. 348-359, Springer-Verlag, 2006. - P.A. Fouque, D. Pointcheval, J. Stern, and S. Zimmer
Hardness of Distinguishing the MSB of LSB of Secret Keys in Diffie-Hellman Schemes
ICALP '06, LNCS 4052, pp. 240-251, Springer-Verlag, 2006. - O. Chevassut, P.A. Fouque, P. Gaudry, and D. Pointcheval
The Twist-Augmented Technique for Key Exchange
PKC '06, LNCS 3958, pp. 410-426, Springer-Verlag, 2006. - M. Abdalla, O. Chevassut, P.-A. Fouque, and D. Pointcheval
A Simple Threshold Authenticated Key Exchange from Short Secrets
Asiacrypt '05, LNCS 3788, pp. 566-588, Springer-Verlag, 2005. - P.-A. Fouque, L. Granboulan and J. Stern
Differential Cryptanalysis for Multivariate Schemes
Eurocrypt '05, LNCS 3494, pp. 341-353, Springer-Verlag, 2005. - M. Abdalla, P.-A. Fouque, and D. Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting
PKC '05, LNCS 3396, pp. 65-84, Springer-Verlag, 2005. - P.-A. Fouque, A. Joux and G. Poupard
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
SAC '04, LNCS 3357, pp. 212-226, Springer-Verlag, 2004. - P.-A. Fouque, F. Muller, G. Poupard, and F. Valette
Defeating Countermeasures Based on Randomized BSD Representations
CHES '04, LNCS 3156, pp. 312-327, Springer-Verlag, 2004. - P.-A. Fouque, N. Howgrave-Graham, G. Martinet, and G. Poupard
The Insecurity of Esign in Practical Implementations
Asiacrypt '03, LNCS 2894, pp. 492-506, Springer-Verlag, 2003. - P.-A. Fouque and F. Valette
The Doubling Attack : Why Upwards is Better Than Downwards
CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003. - P.-A. Fouque, G. Martinet, and G. Poupard
Attacking Unbalanced RSA-CRT Using SPA
CHES '03, LNCS 2779, pp. 269-280, Springer-Verlag, 2003. - P.-A. Fouque, A. Joux, G. Martinet, and F. Valette
Authenticated On-line Encryption
SAC '03, LNCS 3006, pp. 145-159, Springer-Verlag, 2003. - P.-A. Fouque and G. Poupard
On the security of RDSA
Eurocrypt '03, LNCS 2656, pp. 462-476, Springer-Verlag, 2003. - P.-A. Fouque, G. Martinet, and G. Poupard
Practical Symmetric On-line Encryption
FSE '03, LNCS 2887, pp. 362-375, Springer-Verlag, 2003. - P.-A. Fouque, J. Stern, and G. Wackers
CryptoComputing with rational Numbers
FC '02, LNCS 2357, pp. 136-146, Springer-Verlag, 2002. - P.-A. Fouque and D. Pointcheval
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Asiacrypt '01, LNCS 2248, pp. 351-368, Springer-Verlag, 2001. - P.-A. Fouque, and J. Stern
Fully Distributed Threshold RSA under Standard Assumptions
Asiacrypt '01, LNCS 2248, pp. 310-330, Springer-Verlag, 2001. - O. Baudron, P.-A. Fouque, D. Pointcheval, G. Poupard, and J. Stern
Practical Multi-Candidate Election System
PODC '01, pp. 274-283, ACM, 2001. - P.-A. Fouque and J. Stern
One Round Threshold Discrete-Log Key Generation without Private Channels
PKC '01, LNCS 1992, pp. 300-316, Springer-Verlag, 2001. - P.-A. Fouque, G. Poupard and J. Stern
Sharing Decryption in the Context of Voting or Lottery
FC '00, LNCS 1962, pp. 90-104, Springer-Verlag, 2000.
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
Thèse
Pierre-Alain FouqueLe partage de clés cryptographiques: Théorie et Pratique
Université Paris 7, Oct. 2001.
HDR
Pierre-Alain FouqueSur Quelques Méthodes Algébriques et Statistique en Cryptanalyse
École normale supérieure, Dec. 2010.