Publications 
   
      
        Books    
       
        Proceedings of ISC 2017: 20th International Conference on Information Security  (Springer, LNCS 10599, 2017)
         Proceedings of EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques  (Springer, LNCS 8441, 2014)
         Proceedings of EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques  (Springer, LNCS 7881, 2013)
	     Proceedings of PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography  (Springer, LNCS 6056, 2010)
         The LLL Algorithm:
Survey and Applications  (Springer, Series: Information Security and Cryptography, 2009)
         Proceedings of VIETCRYPT: First International Conference on Cryptology in Vietnam  (Springer, LNCS 4341, 2006)
         
      
  Surveys and Lecture Notes    
      
      
 "Vulgarisation" in French  
  
   La cryptographie de demain (Pour la Science , 2016)
     Calculer avec des données cryptées (Mensuel La Recherche , n°437 , janvier 2010)
     Une géométrie pour les codes secrets (Les dossiers de la Recherche , n°37, trimestriel novembre 2009)
	  Le calcul en toute discrétion (Mensuel La Recherche , n°434, octobre 2009)
        Les logiciels libres aussi ont des failles de sécurité  (Mensuel La Recherche , n°423, octobre 2008)
        Une géométrie pour les prochains codes  (Mensuel La Recherche , n°420, juin 2008)
	    La cryptologie : Enjeux et perspectives  (2005)
        La géométrie des nombres : de Gauss aux codes secrets (Hors série n° 36 de Pour la Science , juillet 2002) 
        
 
       Journal Papers  
      
 Counting Co-cyclic Lattices  (2016) *SIAM Journal on Discrete Mathematics*, 30-3, pp. 1358-1370
  An LLL Algorithm with Quadratic Complexity  (2009) *SIAM Journal on Computing*, Vol. 39, No. 3, pp. 874–903
   Low-Dimensional Lattice Basis Reduction Revisited  (2009) *ACM Transactions on Algorithms*, Vol. 5 Issue 4, October 2009 
  Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
  (2009) *Journal of Cryptology*, Volume 22, Number 2
  Sieve Algorithms for the Shortest Vector Problem Are Practical  (2008) *Journal of Mathematical Cryptology*, Vol 2, Number 2
  Testing Set Proportionality and the Adam Isomorphism of Circulant Graphs  (2005) *Journal of Discrete Algorithms*
  Hidden number problem with hidden multipliers, timed-release crypto and noisy exponentiation  (2003) *Mathematics of computation*, Vol 72, Number 243, Pages 1473-1485
   The Insecurity of the Elliptic Curve Digital Signature
Algorithm with Partially Known Nonces   (2003) *Design, Codes and Cryptography*, Vol 30, Number 2, Pages 201-217
   The Insecurity of the Digital Signature
Algorithm with Partially Known Nonces   (2002) *J. of Cryptology*, Vol. 15, Number 3, Pages 151-176   
      
 
       International Conference Papers 
 
       
    
             
      MISCELLANEOUS