404
Nothing found, but this random article might interest you!
  • Masking the GLP Lattice-Based Signature Scheme at Any Order.
    Gilles Barthe, portrait ofSonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi.
    In J. Cryptol., 2024.
  • Building MPCitH-Based Signatures from MQ, MinRank, and Rank SD.
    In ACNS (1) 2024, pp. 403-431, 2024. Best Student Paper Award
  • High Order Side-Channel Security for Elliptic-Curve Implementations.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023.
  • Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature.
    In Des. Codes Cryptogr., 2023.
  • VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations.
    Quentin L. Meunier, Abdul Rahman Taleb.
    In SECRYPT 2023, pp. 520-527, 2023.
  • Short Signatures from Regular Syndrome Decoding in the Head.
    Eliana Carozza, Geoffroy Couteau, Antoine Joux.
    In EUROCRYPT (5) 2023, pp. 532-563, 2023.
  • On the Hardness of the Finite Field Isomorphism Problem.
    Dipayan Das, Antoine Joux.
    In EUROCRYPT (5) 2023, pp. 343-359, 2023.
  • Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings
    Shlomi Dolev, Ehud Gudes, portrait ofPascal Paillier.
    Lecture Notes in Computer Science, Springer, 2023. (ISBN: 978-3-031-34670-5.)
  • Unifying Freedom and Separation for Tight Probing-Secure Composition.
    portrait ofSonia Belaïd, Gaëtan Cassiers, portrait ofMatthieu Rivain, Abdul Rahman Taleb.
    In CRYPTO (3) 2023, pp. 440-472, 2023.
  • Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head.
    In ASIACRYPT (1) 2023, pp. 441-473, 2023.
  • IronMask: Versatile Verification of Masking Security.
    portrait ofSonia Belaïd, Darius Mercadier, portrait ofMatthieu Rivain, Abdul Rahman Taleb.
    In IEEE Symposium on Security and Privacy 2022, pp. 142-160, 2022.
  • Useful work: a new protocol to ensure usefulness of PoW-based consensus for blockchain.
    Ambre Toulemonde, Loïc Besson, portrait ofLouis Goubin, Jacques Patarin.
    In GoodIT 2022, pp. 308-314, 2022.
  • Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
    Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo.
    In EUROCRYPT (3) 2022, pp. 582-612, 2022.
  • Classical and Quantum Algorithms for Variants of Subset-Sum via Dynamic Programming.
    Jonathan Allcock, Yassine Hamoudi, Antoine Joux, Felix Klingelhöfer, Miklos Santha.
    In ESA 2022, pp. 6:1-6:18, 2022.
  • Blind Rotation in Fully Homomorphic Encryption with Extended Keys.
    Marc Joye, portrait ofPascal Paillier.
    In CSCML 2022, pp. 1-18, 2022.
  • Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
    In CRYPTO (2) 2022, pp. 541-572, 2022.
  • Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.
    portrait ofThibauld Feneuil, Jules Maire, portrait ofMatthieu Rivain, Damien Vergnaud.
    In ASIACRYPT (2) 2022, pp. 371-402, 2022.
  • Speeding-up verification of digital signatures.
    Abdul Rahman Taleb, Damien Vergnaud.
    In J. Comput. Syst. Sci., 2021.
  • Probing Security through Input-Output Separation and Revisited Quasilinear Masking.
    Dahmun Goudarzi, Thomas Prest, portrait ofMatthieu Rivain, Damien Vergnaud.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021.
  • Dummy Shuffling Against Algebraic Attacks in White-Box Implementations.
    Alex Biryukov, Aleksei Udovenko.
    In EUROCRYPT (2) 2021, pp. 219-248, 2021.
  • On the Power of Expansion: More Efficient Constructions in the Random Probing Model.
    portrait ofSonia Belaïd, portrait ofMatthieu Rivain, Abdul Rahman Taleb.
    In EUROCRYPT (2) 2021, pp. 313-343, 2021.
  • Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups.
    Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto.
    In CT-RSA 2021, pp. 276-298, 2021.
  • Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks.
    Ilaria Chillotti, Marc Joye, portrait ofPascal Paillier.
    In CSCML 2021, pp. 1-19, 2021.
  • Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.
    portrait ofSonia Belaïd, portrait ofMatthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud.
    In ASIACRYPT (2) 2021, pp. 157-188, 2021.
  • Convexity of Division Property Transitions: Theory, Algorithms and Compact Models.
    Aleksei Udovenko.
    In ASIACRYPT (1) 2021, pp. 332-361, 2021.
  • Preface for the Number-Theoretic Methods in Cryptology conferences.
    Antoine Joux, Jacek Pomykala.
    In J. Math. Cryptol., 2020.
  • How to reveal the secrets of an obscure white-box implementation.
    portrait ofLouis Goubin, portrait ofPascal Paillier, portrait ofMatthieu Rivain, Junwei Wang.
    In J. Cryptogr. Eng., 2020.
  • Improving side-channel attacks against pairing-based cryptography.
    Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In J. Cryptogr. Eng., 2020.
  • Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
    Gilles Barthe, portrait ofSonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub.
    In J. Cryptogr. Eng., 2020.
  • Cryptanalysis of the Legendre PRF and Generalizations.
    Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto.
    In IACR Trans. Symmetric Cryptol., 2020.
  • Lightweight AEAD and Hashing using the Sparkle Permutation Family.
    Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang.
    In IACR Trans. Symmetric Cryptol., 2020.
  • Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
    Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, portrait ofMatthieu Rivain, Yu Sasaki, Siang Meng Sim.
    In IACR Trans. Symmetric Cryptol., 2020.
  • Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020.
  • On degree-d zero-sum sets of full rank.
    Christof Beierle, Alex Biryukov, Aleksei Udovenko.
    In Cryptogr. Commun., 2020.
  • Age estimation from faces using deep learning: A comparative analysis.
    Alice Othmani, Abdul Rahman Taleb, Hazem Abdelkawy, Abdenour Hadid.
    In Comput. Vis. Image Underst., 2020.
  • Certified lattice reduction.
    Thomas Espitau, Antoine Joux.
    In Adv. Math. Commun., 2020.
  • On a Dual/Hybrid Approach to Small Secret LWE - A Dual/Enumeration Technique for Learning with Errors and Application to Security Estimates of FHE Schemes.
    Thomas Espitau, Antoine Joux, Natalia Kharchenko.
    In INDOCRYPT 2020, pp. 440-462, 2020.
  • Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations.
    portrait ofSonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, portrait ofMatthieu Rivain, Raphaël Wintersdorff.
    In EUROCRYPT (3) 2020, pp. 311-341, 2020.
  • Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
    Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang.
    In CRYPTO (3) 2020, pp. 419-448, 2020.
  • Random Probing Security: Verification, Composition, Expansion and New Constructions.
    portrait ofSonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, portrait ofMatthieu Rivain, Abdul Rahman Taleb.
    In CRYPTO (1) 2020, pp. 339-368, 2020.
  • Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks.
    Pantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont.
    In COSADE 2020, pp. 221-253, 2020.
  • Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers
    portrait ofSonia Belaïd, Tim Güneysu.
    Lecture Notes in Computer Science, Springer, 2020. (ISBN: 978-3-030-42067-3.)
  • Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations.
    portrait ofMatthieu Rivain, Junwei Wang.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019.
  • A simplified approach to rigorous degree 2 elimination in discrete logarithm algorithms.
    Faruk Göloglu, Antoine Joux.
    In Math. Comput., 2019.
  • Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition.
    Patrick Derbez, Virginie Lallemand, Aleksei Udovenko.
    In SAC 2019, pp. 124-145, 2019.
  • Usuba: high-throughput and constant-time ciphers, by construction.
    Darius Mercadier, Pierre-Évariste Dagand.
    In PLDI 2019, pp. 157-173, 2019.
  • maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
    Gilles Barthe, portrait ofSonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert.
    In ESORICS (1) 2019, pp. 300-318, 2019.
  • Lightweight instruction-level encryption for embedded processors using stream ciphers.
    Thomas Hiscock, Olivier Savry, portrait ofLouis Goubin.
    In Microprocess. Microsystems, 2019.
  • Higher-Order DCA against Standard Side-Channel Countermeasures.
    Andrey Bogdanov, portrait ofMatthieu Rivain, Philip S. Vejre, Junwei Wang.
    In COSADE 2019, pp. 118-141, 2019.
  • GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
    Gilles Barthe, portrait ofSonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi.
    In CCS 2019, pp. 2147-2164, 2019.
  • Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, portrait ofPascal Paillier, Renaud Sirdey.
    In J. Cryptol., 2018.
  • Preface to TCHES 2018.
    Daniel Page, portrait ofMatthieu Rivain.
    In IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018.
  • Usuba: Optimizing & Trustworthy Bitslicing Compiler.
    Darius Mercadier, Pierre-Évariste Dagand, Lionel Lacassagne, Gilles Muller.
    In WPMVP@PPoPP 2018, pp. 4:1-4:8, 2018.
  • Excalibur Key-Generation Protocols for DAG Hierarchic Decryption.
    portrait ofLouis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado.
    In ICISC 2018, pp. 103-120, 2018.
  • Masking the GLP Lattice-Based Signature Scheme at Any Order.
    Gilles Barthe, portrait ofSonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi.
    In EUROCRYPT (2) 2018, pp. 354-384, 2018.
  • On the Design of a Processor Working Over Encrypted Data.
    Thomas Hiscock, Olivier Savry, portrait ofLouis Goubin.
    In DSD 2018, pp. 577-580, 2018.
  • Fast Homomorphic Evaluation of Deep Discretized Neural Networks.
    Florian Bourse, Michele Minelli, Matthias Minihold, portrait ofPascal Paillier.
    In CRYPTO (3) 2018, pp. 483-512, 2018.
  • A New Public-Key Cryptosystem via Mersenne Numbers.
    Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha.
    In CRYPTO (3) 2018, pp. 459-482, 2018.
  • Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
    Dahmun Goudarzi, Anthony Journault, portrait ofMatthieu Rivain, François-Xavier Standaert.
    In COSADE 2018, pp. 3-22, 2018.
  • Attacks and Countermeasures for White-box Designs.
    Alex Biryukov, Aleksei Udovenko.
    In ASIACRYPT (2) 2018, pp. 373-402, 2018.
  • How to Securely Compute with Noisy Leakage in Quasilinear Complexity.
    Dahmun Goudarzi, Antoine Joux, portrait ofMatthieu Rivain.
    In ASIACRYPT (2) 2018, pp. 547-574, 2018.
  • Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
    portrait ofSonia Belaïd, Dahmun Goudarzi, portrait ofMatthieu Rivain.
    In ASIACRYPT (2) 2018, pp. 343-372, 2018.
  • Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings
    Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi.
    Lecture Notes in Computer Science, Springer, 2018. (ISBN: 978-3-319-89338-9.)
  • Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances (Invited Talk).
    Antoine Joux.
    In STACS 2017, pp. 3:1-3:1, 2017.
  • First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography.
    Damien Jauvart, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In SECRYPT 2017, pp. 104-115, 2017.
  • A Crossbred Algorithm for Solving Boolean Polynomial Systems.
    Antoine Joux, Vanessa Vitse.
    In NuTMiC 2017, pp. 3-21, 2017.
  • Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack.
    Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In ICETE (Selected Papers) 2017, pp. 150-172, 2017.
  • How Fast Can Higher-Order Masking Be in Software?
    Dahmun Goudarzi, portrait ofMatthieu Rivain.
    In EUROCRYPT (1) 2017, pp. 567-597, 2017.
  • Lightweight Software Encryption for Embedded Processors.
    Thomas Hiscock, Olivier Savry, portrait ofLouis Goubin.
    In DSD 2017, pp. 213-220, 2017.
  • Private Multiplication over Finite Fields.
    portrait ofSonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud.
    In CRYPTO (3) 2017, pp. 397-426, 2017.
  • Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures.
    Dahmun Goudarzi, portrait ofMatthieu Rivain, Damien Vergnaud, Srinivas Vivek.
    In CHES 2017, pp. 154-171, 2017.
  • Optimal First-Order Boolean Masking for Embedded IoT Devices.
    Alex Biryukov, Daniel Dinu, Yann Le Corre, Aleksei Udovenko.
    In CARDIS 2017, pp. 22-41, 2017.
  • NFLlib: NTT-based Fast Lattice Library.
    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint.
    In CT-RSA 2016, 2016.
  • Technical history of discrete logarithms in small characteristic finite fields - The road from subexponential to quasi-polynomial complexity.
    Antoine Joux, Cécile Pierrot.
    In Des. Codes Cryptogr., 2016.
  • Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog.
    Léo Perrin, Aleksei Udovenko.
    In IACR Trans. Symmetric Cryptol., 2016.
  • Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication
    Dahmun Goudarzi, portrait ofMatthieu Rivain, Damien Vergnaud.
    In Selected Areas in Cryptography 2016, 2016.
  • Defeating MBA-based Obfuscation.
    Ninon Eyrolles, portrait ofLouis Goubin, Marion Videau.
    In SPRO@CCS 2016, pp. 27-38, 2016.
  • Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.
    Dahmun Goudarzi, portrait ofMatthieu Rivain, Damien Vergnaud.
    In SAC 2016, pp. 120-139, 2016.
  • Blending FHE-NTRU Keys - The Excalibur Property.
    portrait ofLouis Goubin, Francisco José Vial Prado.
    In INDOCRYPT 2016, pp. 3-24, 2016.
  • Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, portrait ofPascal Paillier, Renaud Sirdey.
    In FSE 2016, pp. 313-333, 2016.
  • Algebraic Insights into the Secret Feistel Network.
    Léo Perrin, Aleksei Udovenko.
    In FSE 2016, pp. 378-398, 2016.
  • Randomness Complexity of Private Circuits for Multiplication.
    portrait ofSonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud.
    In EUROCRYPT (2) 2016, pp. 616-648, 2016.
  • Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
    Alex Biryukov, Léo Perrin, Aleksei Udovenko.
    In EUROCRYPT (1) 2016, pp. 372-402, 2016.
  • NFLlib: NTT-Based Fast Lattice Library.
    Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint.
    In CT-RSA 2016, pp. 341-356, 2016.
  • Improving Side-Channel Attacks Against Pairing-Based Cryptography.
    Damien Jauvart, Jacques J. A. Fournier, Nadia El Mrabet, portrait ofLouis Goubin.
    In CRiSIS 2016, pp. 199-213, 2016.
  • Cryptanalysis of GGH15 Multilinear Maps.
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (2) 2016, pp. 607-628, 2016.
  • Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
    Léo Perrin, Aleksei Udovenko, Alex Biryukov.
    In CRYPTO (2) 2016, pp. 93-122, 2016.
  • On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking.
    Dahmun Goudarzi, portrait ofMatthieu Rivain.
    In CHES 2016, pp. 457-478, 2016.
  • Strong Non-Interference and Type-Directed Higher-Order Masking.
    Gilles Barthe, portrait ofSonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini.
    In CCS 2016, pp. 116-129, 2016.
  • Design Strategies for ARX with Provable Bounds: Sparx and LAX.
    Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov.
    In ASIACRYPT (1) 2016, pp. 484-513, 2016.
  • Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance.
    Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld.
    In ASIACRYPT (1) 2015, 2015. Best Paper Award
  • Trap Me If You Can - Million Dollar Curve
    Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, portrait ofLouis Goubin, Tancrède Lepoint, portrait ofMatthieu Rivain.
    In Cryptology ePrint Archive, 2015.
  • Cryptanalysis of SHA-0 and Reduced SHA-1.
    Eli Biham, Rafi Chen, Antoine Joux.
    In J. Cryptol., 2015.
  • Masking and leakage-resilient primitives: One, the other(s) or both?
    portrait ofSonia Belaïd, Vincent Grosso, François-Xavier Standaert.
    In Cryptogr. Commun., 2015.
  • A survey of fault attacks in pairing based cryptography.
    Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin, Ronan Lashermes.
    In Cryptogr. Commun., 2015.
  • 🇫🇷 Quatre millions d'échanges de clés par seconde.
    Carlos Aguilar-Melchor, Serge Guelton, Adrien Guinet, Tancrède Lepoint.
    In SSTIC 2015, 2015.
  • Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR.
    Tancrède Lepoint, Mehdi Tibouchi.
    In Financial Cryptography Workshops 2015, pp. 184-193, 2015.
  • Verified Proofs of Higher-Order Masking.
    Gilles Barthe, portrait ofSonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub.
    In EUROCRYPT (1) 2015, pp. 457-485, 2015.
  • Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
    Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu.
    In CT-RSA 2015, pp. 181-198, 2015.
  • New Multilinear Maps Over the Integers.
    Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (1) 2015, pp. 267-286, 2015.
  • Algebraic Decomposition for Probing Security.
    Claude Carlet, Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche.
    In CRYPTO (1) 2015, pp. 742-763, 2015.
  • Cryptanalysis of the Co-ACD Assumption.
    Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (1) 2015, pp. 561-580, 2015.
  • Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
    Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi.
    In CRYPTO (1) 2015, pp. 247-266, 2015.
  • Improved Side-Channel Analysis of Finite-Field Multiplication.
    portrait ofSonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff.
    In CHES 2015, pp. 395-415, 2015.
  • Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
    Michel Abdalla, portrait ofSonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud.
    In ACNS 2015, pp. 635-654, 2015.
  • Recovering a sum of two squares decomposition.
    Jaime Gutierrez, Álvar Ibeas, Antoine Joux.
    In J. Symb. Comput., 2014.
  • Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
    portrait ofSonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich.
    In J. Cryptogr. Eng., 2014.
  • Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
    Antoine Joux, Amr M. Youssef.
    Lecture Notes in Computer Science, Springer, 2014. (ISBN: 978-3-319-13050-7.)
  • Scale-Invariant Fully Homomorphic Encryption over the Integers.
    Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
    In Public Key Cryptography 2014, pp. 311-328, 2014.
  • Toward efficient, privacy-aware media classification on public databases.
    Giulia C. Fanti, Matthieu Finiasz, Gerald Friedland, Kannan Ramchandran.
    In ICMR 2014, pp. 49, 2014.
  • Design and Implementation of Lattice-Based Cryptography.
    Tancrède Lepoint.
    Phd Thesis, 2014.
  • Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
    portrait ofSonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre.
    In ICETE (Selected Papers) 2014, pp. 363-379, 2014.
  • Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes.
    Daniel Augot, Matthieu Finiasz.
    In FSE 2014, pp. 3-17, 2014. Best Paper Award
  • Practical Validation of Several Fault Attacks against the Miller Algorithm.
    Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In FDTC 2014, pp. 115-122, 2014.
  • Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
    Jean-Charles Faugère, Louise Huot, Antoine Joux, Guénaël Renault, Vanessa Vitse.
    In EUROCRYPT 2014, pp. 40-57, 2014.
  • A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
    Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé.
    In EUROCRYPT 2014, pp. 1-16, 2014. Best Paper Award
  • On the Practical Security of a Leakage Resilient Masking Scheme.
    Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche.
    In CT-RSA 2014, pp. 169-182, 2014.
  • On Double Exponentiation for Securing RSA against Fault Analysis.
    Duc-Phong Le, portrait ofMatthieu Rivain, Chik How Tan.
    In CT-RSA 2014, pp. 152-168, 2014.
  • How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
    Victor Lomné, Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche, Adrian Thillard.
    In CHES 2014, pp. 35-54, 2014.
  • Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
    portrait ofSonia Belaïd, Pierre-Alain Fouque, Benoît Gérard.
    In ASIACRYPT (2) 2014, pp. 306-325, 2014.
  • Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields.
    Antoine Joux, Cécile Pierrot.
    In ASIACRYPT (1) 2014, pp. 378-397, 2014.
  • Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
    Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati.
    In ASIACRYPT (1) 2014, pp. 420-438, 2014.
  • A Comparison of the Homomorphic Encryption Schemes FV and YASHE.
    Tancrède Lepoint, Michael Naehrig.
    In AFRICACRYPT 2014, pp. 318-335, 2014.
  • Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on \(E(\mathbb{F}_{q^{5}})\).
    Antoine Joux, Vanessa Vitse.
    In J. Cryptol., 2013.
  • Formal verification of a CRT-RSA implementation against fault attacks.
    Maria Christofi, Boutheina Chetali, portrait ofLouis Goubin, David Vigilant.
    In J. Cryptogr. Eng., 2013.
  • One-Way Private Media Search on Public Databases: The Role of Signal Processing.
    Giulia C. Fanti, Matthieu Finiasz, Kannan Ramchandran.
    In IEEE Signal Process. Mag., 2013.
  • Pairing the volcano.
    Sorina Ionica, Antoine Joux.
    In Math. Comput., 2013.
  • White-Box Security Notions for Symmetric Encryption Schemes.
    Cécile Delerablée, Tancrède Lepoint, portrait ofPascal Paillier, portrait ofMatthieu Rivain.
    In Selected Areas in Cryptography 2013, pp. 247-264, 2013.
  • A New Index Calculus Algorithm with Complexity \(L(1/4+o(1))\) in Small Characteristic.
    Antoine Joux.
    In Selected Areas in Cryptography 2013, pp. 355-379, 2013.
  • Two Attacks on a White-Box AES Implementation.
    Tancrède Lepoint, portrait ofMatthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel.
    In Selected Areas in Cryptography 2013, pp. 265-285, 2013.
  • Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
    portrait ofSonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre.
    In SECRYPT 2013, pp. 230-241, 2013.
  • The Special Number Field Sieve in 𝔽pn - Application to Pairing-Friendly Constructions.
    Antoine Joux, Cécile Pierrot.
    In Pairing 2013, pp. 45-61, 2013.
  • Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions.
    Daniel Augot, Matthieu Finiasz.
    In ISIT 2013, pp. 1551-1555, 2013.
  • Security Ranking Among Assumptions Within the Uber Assumption Framework.
    Antoine Joux, Antoine Rojat.
    In ISC 2013, pp. 391-406, 2013.
  • On the Minimal Number of Bootstrappings in Homomorphic Circuits.
    Tancrède Lepoint, portrait ofPascal Paillier.
    In Financial Cryptography Workshops 2013, pp. 189-200, 2013.
  • Higher-Order Side Channel Security and Mask Refreshing.
    Jean-Sébastien Coron, Emmanuel Prouff, portrait ofMatthieu Rivain, Thomas Roche.
    In FSE 2013, pp. 410-424, 2013.
  • Batch Fully Homomorphic Encryption over the Integers.
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun.
    In EUROCRYPT 2013, pp. 315-335, 2013.
  • Masking against Side-Channel Attacks: A Formal Security Proof.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In EUROCRYPT 2013, pp. 142-159, 2013.
  • Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields.
    Antoine Joux.
    In EUROCRYPT 2013, pp. 177-193, 2013.
  • Practical Multilinear Maps over the Integers.
    Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
    In CRYPTO (1) 2013, pp. 476-493, 2013.
  • Lattice Signatures and Bimodal Gaussians.
    Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky.
    In CRYPTO (1) 2013, pp. 40-56, 2013.
  • Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults.
    Ronan Lashermes, Jacques J. A. Fournier, portrait ofLouis Goubin.
    In CHES 2013, pp. 365-382, 2013.
  • Leakage-Resilient Symmetric Encryption via Re-keying.
    Michel Abdalla, portrait ofSonia Belaïd, Pierre-Alain Fouque.
    In CHES 2013, pp. 471-488, 2013.
  • SCARE of Secret Ciphers with SPN Structures.
    portrait ofMatthieu Rivain, Thomas Roche.
    In ASIACRYPT (1) 2013, pp. 526-544, 2013.
  • Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design.
    portrait ofLouis Goubin, Ange Martinelli, Matthieu Walle.
    In AFRICACRYPT 2013, pp. 240-259, 2013.
  • Injective Encodings to Elliptic Curves.
    Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi.
    In ACISP 2013, pp. 203-218, 2013.
  • A family of weak keys in HFE and the corresponding practical key-recovery.
    Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger.
    In J. Math. Cryptol., 2012.
  • Private Stream Search at Almost the Same Communication Cost as a Regular Search.
    Matthieu Finiasz, Kannan Ramchandran.
    In Selected Areas in Cryptography 2012, pp. 372-389, 2012.
  • Generating Provable Primes Efficiently on Embedded Devices.
    Christophe Clavier, Benoit Feix, Loïc Thierry, portrait ofPascal Paillier.
    In Public Key Cryptography 2012, pp. 372-389, 2012.
  • Private Stream Search at the same communication cost as a regular search: Role of LDPC codes.
    Matthieu Finiasz, Kannan Ramchandran.
    In ISIT 2012, pp. 2556-2560, 2012.
  • Higher-Order Masking Schemes for S-Boxes.
    Claude Carlet, portrait ofLouis Goubin, Emmanuel Prouff, Michaël Quisquater, portrait ofMatthieu Rivain.
    In FSE 2012, pp. 366-384, 2012.
  • Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding.
    Anja Becker, Antoine Joux, Alexander May, Alexander Meurer.
    In EUROCRYPT 2012, pp. 520-536, 2012.
  • Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over \(\mathbb{F}_{p^6}\).
    Antoine Joux, Vanessa Vitse.
    In EUROCRYPT 2012, pp. 9-26, 2012. Best Paper Award
  • A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract).
    Antoine Joux.
    In EUROCRYPT 2012, pp. 1-7, 2012.
  • Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems.
    Alexandre Berzati, Cécile Canovas-Dumas, portrait ofLouis Goubin.
    In Cryptography and Security 2012, pp. 233-247, 2012.
  • Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.
    Jean-Sébastien Coron, Aline Gouget, Thomas Icart, portrait ofPascal Paillier.
    In Cryptography and Security 2012, pp. 207-232, 2012.
  • Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
    Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, portrait ofMatthieu Rivain, Praveen Kumar Vadnala.
    In COSADE 2012, pp. 69-81, 2012.
  • Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
    Marcel Medwed, François-Xavier Standaert, Antoine Joux.
    In CHES 2012, pp. 193-212, 2012.
  • Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.
    Ronny Bjones, Ioannis Krontiris, portrait ofPascal Paillier, Kai Rannenberg.
    In APF 2012, pp. 111-124, 2012.
  • Mutual Information Analysis: a Comprehensive Study.
    Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, portrait ofMatthieu Rivain, François-Xavier Standaert, Nicolas Veyrat-Charvillon.
    In J. Cryptol., 2011.
  • Univariate side channel attacks and leakage modeling.
    Julien Doget, Emmanuel Prouff, portrait ofMatthieu Rivain, François-Xavier Standaert.
    In J. Cryptogr. Eng., 2011.
  • Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic.
    Raveen R. Goundar, Marc Joye, Atsuko Miyaji, portrait ofMatthieu Rivain, Alexandre Venelli.
    In J. Cryptogr. Eng., 2011.
  • Cryptanalysis of the RSA Subgroup Assumption from TCC 2005.
    Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi.
    In Public Key Cryptography 2011, pp. 147-155, 2011.
  • Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers
    Antoine Joux.
    Lecture Notes in Computer Science, Springer, 2011. (ISBN: 978-3-642-21701-2.)
  • Improved Generic Algorithms for Hard Knapsacks.
    Anja Becker, Jean-Sébastien Coron, Antoine Joux.
    In EUROCRYPT 2011, pp. 364-385, 2011.
  • A Variant of the F4 Algorithm.
    Antoine Joux, Vanessa Vitse.
    In CT-RSA 2011, pp. 356-375, 2011.
  • Protecting AES with Shamir's Secret Sharing Scheme.
    portrait ofLouis Goubin, Ange Martinelli.
    In CHES 2011, pp. 79-94, 2011.
  • Theoretical and practical aspects of mutual information-based side channel analysis.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In Int. J. Appl. Cryptogr., 2010.
  • On the security of blockwise secure modes of operation beyond the birthday bound.
    Antoine Joux.
    In IEEE Trans. Inf. Theory, 2010.
  • Affine Masking against Higher-Order Side Channel Analysis.
    Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, portrait ofMatthieu Rivain.
    In Selected Areas in Cryptography 2010, pp. 262-280, 2010.
  • Distinguishing Distributions Using Chernoff Information.
    Thomas Baignères, Pouyan Sepehrdad, Serge Vaudenay.
    In ProvSec 2010, pp. 144-165, 2010.
  • Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree.
    Sorina Ionica, Antoine Joux.
    In Pairing 2010, pp. 435-449, 2010.
  • Cryptanalysis of the Hidden Matrix Cryptosystem.
    Jean-Charles Faugère, Antoine Joux, Ludovic Perret, Joana Treger.
    In LATINCRYPT 2010, pp. 241-254, 2010.
  • SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.
    Jean-Sébastien Coron, Aline Gouget, portrait ofPascal Paillier, Karine Villegas.
    In Financial Cryptography Workshops 2010, pp. 107-122, 2010.
  • New Generic Algorithms for Hard Knapsacks.
    Nick Howgrave-Graham, Antoine Joux.
    In EUROCRYPT 2010, pp. 235-256, 2010.
  • Public Key Perturbation of Randomized RSA Implementations.
    Alexandre Berzati, Cécile Canovas-Dumas, portrait ofLouis Goubin.
    In CHES 2010, pp. 306-319, 2010. Best Paper Award
  • Provably Secure Higher-Order Masking of AES.
    portrait ofMatthieu Rivain, Emmanuel Prouff.
    In CHES 2010, pp. 413-427, 2010.
  • Pairing the Volcano.
    Sorina Ionica, Antoine Joux.
    In ANTS 2010, pp. 201-218, 2010.
  • Statistical Analysis of Second Order Differential Power Analysis.
    Emmanuel Prouff, portrait ofMatthieu Rivain, Régis Bevan.
    In IEEE Trans. Computers, 2009.
  • On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
    Emmanuelle Dottax, Christophe Giraud, portrait ofMatthieu Rivain, Yannick Sierra.
    In WISTP 2009, pp. 68-83, 2009.
  • Fault Analysis of Rabbit: Toward a Secret Key Leakage.
    Alexandre Berzati, Cécile Canovas-Dumas, portrait ofLouis Goubin.
    In INDOCRYPT 2009, pp. 72-87, 2009.
  • Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms.
    Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé.
    In IMACC 2009, pp. 351-367, 2009.
  • Fault Analysis of Grain-128.
    Guilhem Castagnos, Alexandre Berzati, Cécile Canovas, Blandine Debraize, portrait ofLouis Goubin, Aline Gouget, portrait ofPascal Paillier, Stephanie Salgado.
    In HOST 2009, pp. 7-14, 2009.
  • Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
    Antoine Joux.
    Lecture Notes in Computer Science, Springer, 2009. (ISBN: 978-3-642-01000-2.)
  • Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.
    Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, portrait ofLouis Goubin.
    In CT-RSA 2009, pp. 414-428, 2009.
  • Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
    In CT-RSA 2009, pp. 459-480, 2009.
  • Fault Attacks on RSA Signatures with Partially Unknown Messages.
    Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, portrait ofPascal Paillier.
    In CHES 2009, pp. 444-456, 2009.
  • Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers.
    portrait ofMatthieu Rivain, Emmanuel Prouff, Julien Doget.
    In CHES 2009, pp. 171-188, 2009.
  • Differential Fault Analysis on DES Middle Rounds.
    In CHES 2009, pp. 457-469, 2009.
  • Improved Generic Algorithms for 3-Collisions.
    Antoine Joux, Stefan Lucks.
    In ASIACRYPT 2009, pp. 347-363, 2009. Best Paper Award
  • Factoring pq2 with Quadratic Forms: Nice Cryptanalyses.
    Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen.
    In ASIACRYPT 2009, pp. 469-486, 2009.
  • Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In ACNS 2009, pp. 499-518, 2009.
  • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, portrait ofPascal Paillier, Haixia Shi.
    In J. Cryptol., 2008.
  • Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers.
    Côme Berbain, Henri Gilbert, Antoine Joux.
    In Selected Areas in Cryptography 2008, pp. 184-198, 2008.
  • On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.
    In Selected Areas in Cryptography 2008, pp. 165-183, 2008.
  • How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
    Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, portrait ofPascal Paillier, Thomas Peyrin.
    In ProvSec 2008, pp. 241-253, 2008.
  • Another Approach to Pairing Computation in Edwards Coordinates.
    Sorina Ionica, Antoine Joux.
    In INDOCRYPT 2008, pp. 400-413, 2008.
  • Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
    portrait ofMatthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff.
    In FSE 2008, pp. 127-143, 2008.
  • Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator.
    Blandine Debraize, portrait ofLouis Goubin.
    In FSE 2008, pp. 235-252, 2008.
  • In(security) Against Fault Injection Attacks for CRT-RSA Implementations.
    Alexandre Berzati, Cécile Canovas, portrait ofLouis Goubin.
    In FDTC 2008, pp. 101-107, 2008.
  • Dynamic Threshold Public-Key Encryption.
    Cécile Delerablée, David Pointcheval.
    In CRYPTO 2008, pp. 317-334, 2008.
  • Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
    Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, portrait ofMatthieu Rivain.
    In CHES 2008, pp. 1-14, 2008. Best Paper Award
  • Perturbating RSA Public Keys: An Improved Attack.
    Alexandre Berzati, Cécile Canovas, portrait ofLouis Goubin.
    In CHES 2008, pp. 380-395, 2008.
  • Yet Another Attack on Vest.
    Pascal Delaunay, Antoine Joux.
    In AFRICACRYPT 2008, pp. 221-235, 2008.
  • A Generic Method for Secure SBox Implementation.
    Emmanuel Prouff, portrait ofMatthieu Rivain.
    In WISA 2007, pp. 227-244, 2007.
  • Cryptanalysis of White Box DES Implementations.
    portrait ofLouis Goubin, Jean-Michel Masereel, Michaël Quisquater.
    In Selected Areas in Cryptography 2007, pp. 278-295, 2007.
  • Decryptable Searchable Encryption.
    Thomas Fuhr, portrait ofPascal Paillier.
    In ProvSec 2007, pp. 228-236, 2007.
  • Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys.
    Cécile Delerablée, portrait ofPascal Paillier, David Pointcheval.
    In Pairing 2007, pp. 39-59, 2007.
  • Overtaking VEST.
    Antoine Joux, Jean-René Reinhard.
    In FSE 2007, pp. 58-72, 2007.
  • Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables.
    Aurélie Bauer, Antoine Joux.
    In EUROCRYPT 2007, pp. 361-378, 2007.
  • Impossibility Proofs for RSA Signatures in the Standard Model.
    portrait ofPascal Paillier.
    In CT-RSA 2007, pp. 31-48, 2007.
  • Hash Functions and the (Amplified) Boomerang Attack.
    Antoine Joux, Thomas Peyrin.
    In CRYPTO 2007, pp. 244-263, 2007.
  • Side Channel Cryptanalysis of a Higher Order Masking Scheme.
    Jean-Sébastien Coron, Emmanuel Prouff, portrait ofMatthieu Rivain.
    In CHES 2007, pp. 28-44, 2007. Best Paper Award
  • Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings
    portrait ofPascal Paillier, Ingrid Verbauwhede.
    Lecture Notes in Computer Science, Springer, 2007. (ISBN: 978-3-540-74734-5.)
  • When e-th Roots Become Easier Than Factoring.
    Antoine Joux, David Naccache, Emmanuel Thomé.
    In ASIACRYPT 2007, pp. 13-28, 2007.
  • Encoding-Free ElGamal Encryption Without Random Oracles.
    Benoît Chevallier-Mames, portrait ofPascal Paillier, David Pointcheval.
    In Public Key Cryptography 2006, pp. 91-104, 2006.
  • Galois LFSR, Embedded Devices and Side Channel Weaknesses.
    Antoine Joux, Pascal Delaunay.
    In INDOCRYPT 2006, pp. 436-451, 2006.
  • Chosen-Ciphertext Attacks Against MOSQUITO.
    Antoine Joux, Frédéric Muller.
    In FSE 2006, pp. 390-404, 2006.
  • The Function Field Sieve in the Medium Prime Case.
    Antoine Joux, Reynald Lercier.
    In EUROCRYPT 2006, pp. 254-270, 2006.
  • Inverting HFE Is Quasipolynomial.
    Louis Granboulan, Antoine Joux, Jacques Stern.
    In CRYPTO 2006, pp. 345-356, 2006.
  • The Number Field Sieve in the Medium Prime Case.
    Antoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren.
    In CRYPTO 2006, pp. 326-344, 2006.
  • Fast Generation of Prime Numbers on Portable Devices: An Update.
    Marc Joye, portrait ofPascal Paillier.
    In CHES 2006, pp. 160-173, 2006.
  • Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings
    portrait ofLouis Goubin, Mitsuru Matsui.
    Lecture Notes in Computer Science, Springer, 2006. (ISBN: 3-540-46559-6.)
  • Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.
    portrait ofPascal Paillier, Jorge Luis Villar.
    In ASIACRYPT 2006, pp. 252-266, 2006.
  • Cryptanalysis of the Tractable Rational Map Cryptosystem.
    Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel.
    In Public Key Cryptography 2005, pp. 258-274, 2005.
  • An Algebraic Masking Method to Protect AES Against Power Attacks.
    Nicolas T. Courtois, portrait ofLouis Goubin.
    In ICISC 2005, pp. 199-209, 2005.
  • Two Attacks Against the HBB Stream Cipher.
    Antoine Joux, Frédéric Muller.
    In FSE 2005, pp. 330-341, 2005.
  • Collisions of SHA-0 and Reduced SHA-1.
    Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby.
    In EUROCRYPT 2005, pp. 36-57, 2005.
  • Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
    Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, portrait ofPascal Paillier, Haixia Shi.
    In CRYPTO 2005, pp. 205-222, 2005.
  • On Second-Order Differential Power Analysis.
    Marc Joye, portrait ofPascal Paillier, Berry Schoenmakers.
    In CHES 2005, pp. 293-308, 2005.
  • Universally Convertible Directed Signatures.
    Fabien Laguillaumie, portrait ofPascal Paillier, Damien Vergnaud.
    In ASIACRYPT 2005, pp. 682-701, 2005.
  • Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.
    portrait ofPascal Paillier, Damien Vergnaud.
    In ASIACRYPT 2005, pp. 1-20, 2005. Best Paper Award
  • A One Round Protocol for Tripartite Diffie-Hellman.
    Antoine Joux.
    In J. Cryptol., 2004.
  • Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
    Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard.
    In Selected Areas in Cryptography 2004, pp. 212-226, 2004.
  • Two Power Analysis Attacks against One-Mask Methods.
    Mehdi-Laurent Akkar, Régis Bevan, portrait ofLouis Goubin.
    In FSE 2004, pp. 332-347, 2004.
  • Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
    Antoine Joux.
    In CRYPTO 2004, pp. 306-316, 2004.
  • How to Disembed a Program?
    Benoît Chevallier-Mames, David Naccache, portrait ofPascal Paillier, David Pointcheval.
    In CHES 2004, pp. 441-454, 2004.
  • Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method.
    Antoine Joux, Reynald Lercier.
    In Math. Comput., 2003.
  • Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups.
    Antoine Joux, Kim Nguyen.
    In J. Cryptol., 2003.
  • Authenticated On-Line Encryption.
    Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette.
    In Selected Areas in Cryptography 2003, pp. 145-159, 2003.
  • A Chosen IV Attack Against Turing.
    Antoine Joux, Frédéric Muller.
    In Selected Areas in Cryptography 2003, pp. 194-207, 2003.
  • A Fast and Secure Implementation of Sflash.
    Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, portrait ofLouis Goubin.
    In Public Key Cryptography 2003, pp. 267-278, 2003.
  • A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.
    In Public Key Cryptography 2003, pp. 199-210, 2003.
  • A Generic Protection against High-Order Differential Power Analysis.
    Mehdi-Laurent Akkar, portrait ofLouis Goubin.
    In FSE 2003, pp. 192-205, 2003.
  • Loosening the KNOT.
    Antoine Joux, Frédéric Muller.
    In FSE 2003, pp. 87-99, 2003.
  • New Attacks against Standardized MACs.
    Antoine Joux, Guillaume Poupard, Jacques Stern.
    In FSE 2003, pp. 170-181, 2003.
  • Cryptanalysis of the EMD Mode of Operation.
    Antoine Joux.
    In EUROCRYPT 2003, pp. 1-16, 2003.
  • Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.
    Jean-Charles Faugère, Antoine Joux.
    In CRYPTO 2003, pp. 44-60, 2003.
  • GCD-Free Algorithms for Computing Modular Inverses.
    Marc Joye, portrait ofPascal Paillier.
    In CHES 2003, pp. 243-253, 2003.
  • Faster Double-Size Modular Multiplication from Euclidean Multipliers.
    Benoît Chevallier-Mames, Marc Joye, portrait ofPascal Paillier.
    In CHES 2003, pp. 214-227, 2003.
  • Solving Underdefined Systems of Multivariate Quadratic Equations.
    Nicolas T. Courtois, portrait ofLouis Goubin, Willi Meier, Jean-Daniel Tacier.
    In Public Key Cryptography 2002, pp. 211-227, 2002.
  • Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
    Jean-Sébastien Coron, Helena Handschuh, Marc Joye, portrait ofPascal Paillier, David Pointcheval, Christophe Tymen.
    In Public Key Cryptography 2002, pp. 17-33, 2002.
  • Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings
    David Naccache, portrait ofPascal Paillier.
    Lecture Notes in Computer Science, Springer, 2002. (ISBN: 3-540-43168-3.)
  • On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction.
    Éliane Jaulmes, Antoine Joux, Frédéric Valette.
    In FSE 2002, pp. 237-251, 2002.
  • Fast Correlation Attacks: An Algorithmic Point of View.
    Philippe Chose, Antoine Joux, Michel Mitton.
    In EUROCRYPT 2002, pp. 209-221, 2002.
  • GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
    Jean-Sébastien Coron, Helena Handschuh, Marc Joye, portrait ofPascal Paillier, David Pointcheval, Christophe Tymen.
    In CT-RSA 2002, pp. 263-276, 2002.
  • Universal Padding Schemes for RSA.
    Jean-Sébastien Coron, Marc Joye, David Naccache, portrait ofPascal Paillier.
    In CRYPTO 2002, pp. 226-241, 2002.
  • Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC.
    Antoine Joux, Gwenaëlle Martinet, Frédéric Valette.
    In CRYPTO 2002, pp. 17-30, 2002.
  • Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.
    Helena Handschuh, David Naccache, portrait ofPascal Paillier, Christophe Tymen.
    In CARDIS 2002, 2002.
  • The Function Field Sieve Is Quite Special.
    Antoine Joux, Reynald Lercier.
    In ANTS 2002, pp. 431-445, 2002.
  • The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems.
    Antoine Joux.
    In ANTS 2002, pp. 20-32, 2002.
  • "Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm.
    Antoine Joux, Reynald Lercier.
    In Math. Comput., 2001.
  • Cryptanalysis of PKP: A New Approach.
    Éliane Jaulmes, Antoine Joux.
    In Public Key Cryptography 2001, pp. 165-172, 2001.
  • QUARTZ, 128-Bit Long Digital Signatures.
    Jacques Patarin, Nicolas T. Courtois, portrait ofLouis Goubin.
    In CT-RSA 2001, pp. 282-297, 2001.
  • FLASH, a Fast Multivariate Signature Algorithm.
    Jacques Patarin, Nicolas T. Courtois, portrait ofLouis Goubin.
    In CT-RSA 2001, pp. 298-307, 2001.
  • A Sound Method for Switching between Boolean and Arithmetic Masking.
    In CHES 2001, pp. 3-15, 2001.
  • A Statistical Attack on RC6.
    Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay.
    In FSE 2000, pp. 64-74, 2000.
  • A NICE Cryptanalysis.
    Éliane Jaulmes, Antoine Joux.
    In EUROCRYPT 2000, pp. 382-391, 2000.
  • New Attacks on PKCS#1 v1.5 Encryption.
    Jean-Sébastien Coron, Marc Joye, David Naccache, portrait ofPascal Paillier.
    In EUROCRYPT 2000, pp. 369-381, 2000.
  • A Chosen-Ciphertext Attack against NTRU.
    Éliane Jaulmes, Antoine Joux.
    In CRYPTO 2000, pp. 20-35, 2000.
  • On Boolean and Arithmetic Masking against Differential Power Analysis.
    Jean-Sébastien Coron, portrait ofLouis Goubin.
    In CHES 2000, pp. 231-237, 2000.
  • Efficient Generation of Prime Numbers.
    Marc Joye, portrait ofPascal Paillier, Serge Vaudenay.
    In CHES 2000, pp. 340-354, 2000.
  • Why Textbook ElGamal and RSA Encryption Are Insecure.
    Dan Boneh, Antoine Joux, Phong Q. Nguyen.
    In ASIACRYPT 2000, pp. 30-43, 2000.
  • Trapdooring Discrete Logarithms on Elliptic Curves over Rings.
    portrait ofPascal Paillier.
    In ASIACRYPT 2000, pp. 573-584, 2000.
  • Cryptanalysis of the TTM Cryptosystem.
    portrait ofLouis Goubin, Nicolas T. Courtois.
    In ASIACRYPT 2000, pp. 44-57, 2000.
  • A One Round Protocol for Tripartite Diffie-Hellman.
    Antoine Joux.
    In ANTS 2000, pp. 385-394, 2000.
  • Evaluating Differential Fault Analysis of Unknown Cryptosystems.
    portrait ofPascal Paillier.
    In Public Key Cryptography 1999, pp. 235-244, 1999.
  • Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor.
    portrait ofPascal Paillier.
    In Public Key Cryptography 1999, pp. 223-234, 1999.
  • A Trapdoor Permutation Equivalent to Factoring.
    portrait ofPascal Paillier.
    In Public Key Cryptography 1999, pp. 219-222, 1999.
  • Self-Escrowed Public-Key Infrastructures.
    portrait ofPascal Paillier, Moti Yung.
    In ICISC 1999, pp. 257-268, 1999.
  • Unbalanced Oil and Vinegar Signature Schemes.
    Aviad Kipnis, Jacques Patarin, portrait ofLouis Goubin.
    In EUROCRYPT 1999, pp. 206-222, 1999.
  • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.
    portrait ofPascal Paillier.
    In EUROCRYPT 1999, pp. 223-238, 1999.
  • Probing Attacks on Tamper-Resistant Devices.
    Helena Handschuh, portrait ofPascal Paillier, Jacques Stern.
    In CHES 1999, pp. 303-315, 1999.
  • DES and Differential Power Analysis (The "Duplication" Method).
    portrait ofLouis Goubin, Jacques Patarin.
    In CHES 1999, pp. 158-172, 1999.
  • Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries.
    portrait ofPascal Paillier, David Pointcheval.
    In ASIACRYPT 1999, pp. 165-179, 1999.
  • Lattice Reduction: A Toolbox for the Cryptanalyst.
    Antoine Joux, Jacques Stern.
    In J. Cryptol., 1998.
  • Improved Algorithms for Isomorphisms of Polynomials.
    Jacques Patarin, portrait ofLouis Goubin, Nicolas T. Courtois.
    In EUROCRYPT 1998, pp. 184-200, 1998.
  • Differential Collisions in SHA-0.
    Florent Chabaud, Antoine Joux.
    In CRYPTO 1998, pp. 56-71, 1998.
  • Smart Card Crypto-Coprocessors for Public-Key Cryptography.
    Helena Handschuh, portrait ofPascal Paillier.
    In CARDIS 1998, pp. 372-379, 1998.
  • Reducing the Collision Probability of Alleged Comp128.
    Helena Handschuh, portrait ofPascal Paillier.
    In CARDIS 1998, pp. 366-371, 1998.
  • The action of a few permutations on r-tuples is quickly transitive.
    Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich.
    In Random Struct. Algorithms, 1998.
  • C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.
    Jacques Patarin, portrait ofLouis Goubin, Nicolas T. Courtois.
    In ASIACRYPT 1998, pp. 35-49, 1998.
  • Asymmetric cryptography with S-Boxes.
    Jacques Patarin, portrait ofLouis Goubin.
    In ICICS 1997, pp. 369-380, 1997.
  • On Ideal Non-perfect Secret Sharing Schemes.
    portrait ofPascal Paillier.
    In Security Protocols Workshop 1997, pp. 207-216, 1997.
  • Trapdoor one-way permutations and multivariate polynominals.
    Jacques Patarin, portrait ofLouis Goubin.
    In ICICS 1997, pp. 356-368, 1997.
  • The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography.
    Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich.
    In STACS 1996, pp. 375-386, 1996.
  • A Practical Attack against Knapsack based Hash Functions (Extended Abstract).
    Antoine Joux, Louis Granboulan.
    In EUROCRYPT 1994, pp. 58-66, 1994.
  • Improved Low-Density Subset Sum Algorithms.
    Matthijs J. Coster, Antoine Joux, Brian A. LaMacchia, Andrew M. Odlyzko, Claus-Peter Schnorr, Jacques Stern.
    In Comput. Complex., 1992.
  • Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems.
    Antoine Joux, Jacques Stern.
    In FCT 1991, pp. 258-264, 1991.
  • The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
    Yeow Meng Chee, Antoine Joux, Jacques Stern.
    In CRYPTO 1991, pp. 204-212, 1991.
  • Cryptanalysis of Another Knapsack Cryptosystem.
    Antoine Joux, Jacques Stern.
    In ASIACRYPT 1991, pp. 470-476, 1991.

    Featured Presentations & Talks

  • Building MPCitH-based Signatures from MQ, MinRank, and Rank SD
    ACNS 2024, Abu Dhabi, UAE, March 06, 2024.
  • Threshold Computation in the Head: More Efficient Signatures from MPCitH
    Workshop NAC, Paris, France, February 29, 2024.
  • Post-Quantum Signatures from Secure Multiparty Computation
    Winter Research School, Rennes, France, February 20, 2024.
  • Introduction to Zero-Knowledge Proofs
    Winter Research School, Rennes, France, February 20, 2024.
  • Optimized Homomorphic Evaluation of Boolean Functions
    Versailles Crypto Seminar, France, December 14, 2023.
  • IronMask: Versatile Verification of Masking Security
    Abdul Rahman Taleb.
    Journée Thématique Sécurité Matérielle 2023, November 13, 2023.
  • A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations
    Abdul Rahman Taleb.
    Journées C2, Najac, France, October 19, 2023.
  • Optimized Homomorphic Evaluation of Boolean Functions
    Journées C2, Najac, France, October 17, 2023.
  • Post-Quantum Signatures from Secure Multiparty Computation
    Journées C2, Najac, France, October 16, 2023.
  • Towards Achieving Provable Side-Channel Security in Practice
    Abdul Rahman Taleb.
    Mathematics of Security Analysis for Modern Cryptography 2023, September 20, 2023.
  • High Order Side-Channel Security for Elliptic-Curve Implementations
    CHES 2023, Prague, Czech Republic, September 13, 2023.
  • MQOM & SD in the Head Signature Schemes
    Second Oxford Post-Quantum Cryptography Summit 2023, September 04, 2023.
  • RYDE & MIRA Signature Schemes
    Second Oxford Post-Quantum Cryptography Summit 2023, September 04, 2023.
  • Unifying Freedom and Separation for Tight Probing-Secure Composition
    Abdul Rahman Taleb.
    Crypto 2023, Santa Barbara, USA, August 21, 2023.
  • Post-Quantum Signatures from Multiparty Computation: Recent Advances (invited talk)
    PQC 2023, College Park, USA, August 17, 2023.
  • Code-Based Signatures from Secure Multiparty Computation
    2023 SIAM Conference on Applied Algebraic Geometry, Eindhoven, Netherlands, July 12, 2023.
  • Post-Quantum Signatures from Secure Multiparty Computation
    Quantum PEPR PQ-TLS project days 2023, Paris, France, June 29, 2023.
  • CRY.ME: a Cryptographic Challenge on a Messaging Application
    Abdul Rahman Taleb, portrait ofThibauld Feneuil.
    Journées Nationales 2023 du GDR Sécurité Informatique, Paris, France, June 28, 2023.
  • Zero-Knowledge Proofs from Multiparty Computation: Recent Advances
    WRACH 2023, Roscoff, France, June 14, 2023.
  • Post-Quantum Signatures from Secure Multiparty Computation
    WRACH 2023, Roscoff, France, June 14, 2023.
  • CRY.ME: a Cryptographic Challenge on a Messaging Application
    Chrysanthi Mavromati, Abdul Rahman Taleb.
    SSTIC 2023, Rennes, France, June 07, 2023.
  • Randomness of random in Cisco ASA
    portrait ofRyad Benadjila, Arnaud Ebalard.
    SSTIC 2023, Rennes, France, June 07, 2023.
  • Randomness of random in Cisco ASA
    portrait ofRyad Benadjila, Arnaud Ebalard.
    RWC 2023, Tokyo, March 28, 2023.
  • Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
    Asiacrypt 2022, Taipei, Taiwan, December 07, 2022.
  • Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
    ENSL/CWI/RHUL Joint Seminar, Virtual, November 14, 2022.
  • Random Probing Security: Towards bridging the gap between theory and practice
    Abdul Rahman Taleb.
    VeriSiCC Seminar 2022, September 22, 2022.
  • Presentation of the VeriSiCC Project
    VeriSiCC Seminar, September 22, 2022.
  • Tutorial on White-Box Cryptography
    CHES 2022, Leuven, Belgium, September 18, 2022.
  • Random Probing Security: Towards bridging the gap between theory and practice
    Abdul Rahman Taleb.
    IWSEC 2022, Virtual, August 31, 2022.
  • Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
    Crypto 2022, Santa Barbara, USA, August 16, 2022.
  • A Quest for Provable Security against Side-Channel Attacks
    Keynote talk at AFRICACRYPT 2022, Fes, Morocco, July 19, 2022.
  • A Quest for Provable Security against Side-Channel Attacks
    Keynote talk at Cyber in Nancy, Nancy, France, July 07, 2022.
  • IronMask: Versatile Verification of Masking Security
    Abdul Rahman Taleb.
    IEEE Symposium on Security and Privacy 2022, Virtual, June 24, 2022.
  • On the Provable Security of Cryptographic Implementations
    Habilitation defense, ENS, Paris, June 21, 2022.
  • Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
    Seminar C2, Rennes, France, June 10, 2022.
  • Secure and Verified Cryptographic Implementations in The Random Probing Model
    Abdul Rahman Taleb.
    Journées C2 2022, France, April 14, 2022.
  • IronMask: Versatile Verification of Masking Security
    Abdul Rahman Taleb.
    ALMASTY LIP6 seminar 2022, Paris, France, February 10, 2022.
  • Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
    Abdul Rahman Taleb.
    AsiaCrypt 2021, Virtual, December 07, 2021.
  • Secure and Verified Cryptographic Implementations in the Random Probing Model
    Abdul Rahman Taleb.
    CWI Seminar 2021, Virtual, December 03, 2021.
  • On the road to building formally verified side-channel countermeasures
    CrossFyre Workshop (virtual), December 02, 2021.
  • Higher-Order Masking of Lattice-Based Signatures
    European Cyber Week, Workshop "Implementing Post-Quantum Cryptography", November 18, 2021.
  • On the Power of Expansion: More Efficient Constructions in the Random Probing Model
    Abdul Rahman Taleb.
    EuroCrypt 2021, Virtual, October 19, 2021.
  • Probing Security through Input-Output Separation and Revisited Quasilinear Masking
    CHES 2021 (virtual), September 13, 2021.
  • Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
    Junwei Wang.
    CHES 2020, Virtual, September 16, 2020.
  • Random Probing Security: Verification, Composition, Expansion and New Constructions
    Abdul Rahman Taleb.
    Crypto 2020, Virtual, August 13, 2020.
  • From tightPROVE to Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
    Threshold Schemes for NIST-approved Symmetric Block Ciphers in a Single-Device Setting (virtual), July 08, 2020.
  • Security of Masked Implementations (invited talk)
    LatinCrypt 2019, Santiago de Chile, Chile, October 02, 2019.
  • Side-Channel Attacks and Countermeasures (school)
    ASCrypto 2019, Santiago de Chile, Chile, October 01, 2019.
  • Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
    Junwei Wang.
    CHES 2019, Atlanta, August 26, 2019.
  • Higher-Order DCA against Standard Side-Channel Countermeasures
    Junwei Wang.
    COSADE 2019, Darmstadt, May 18, 2019.
  • Securing Cryptographic Modules: A Shades of Gray Story
    International Cryptographic Module Conference, ICMC'19, Vancouver, May 16, 2019.
  • Secure Masked Implementations with the Least Refreshing
    Journée GT Méthodes Formelles pour la Sécurité, CNRS, Paris, France., March 18, 2019.
  • Recent Progress on White-Box Attacks
    Junwei Wang.
    Journée Protection du Code et des Données 2018, Paris Saclay, December 13, 2018.
  • Secure Computation in the Presence of Noisy Leakage
    Journées C2, Aussois (France), October 10, 2018.
  • Formal Verification of Masked Implementations (tutorial)
    portrait ofSonia Belaïd, Benjamin Grégoire.
    CHES 2018, Amsterdam, Netherlands, September 09, 2018.
  • Formal Verification of Side-Channel Countermeasures.
    Ecole de cybersécurité, Sophia Antipolis, France, June 05, 2018.
  • Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
    Dahmun Goudarzi.
    COSADE 2018, Singapore., April 23, 2018.
  • Masking the GLP Lattice-Based Signature Scheme at Any Order.
    Quantum-Safe Cryptography Seminar, Sorbonne University, Paris, France, March 30, 2018.
  • On the Security of Composed Masked Implementations with Least Refreshing.
    Séminaire CCA (Codage, Cryptologie, Algorithmes), INRIA Paris, France, March 16, 2018.
  • How to Reveal the Secrets of an Obscure White-Box Implementation.
    Junwei Wang.
    Real World Crypto 2018, Zurich, Switzerland, January 12, 2018.
  • White-Box Cryptography
    CARDIS 2017, Lugano (Switzerland), November 14, 2017.
  • Reveal Secrets in Adoring Poitras: A generic attack on white-box cryptography.
    Junwei Wang.
    ECRYPT-NET School on Correct and Secure Implementation, Grete, Greece, October 11, 2017.
  • Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
    Dahmun Goudarzi.
    CHES 2017, Taipei, Taiwan., April 24, 2017.
  • How Fast Can Higher-Order Masking Be in Software?
    Dahmun Goudarzi.
    Eurocrypt 2017, Paris, France., April 24, 2017.
  • White-Box Cryptography
    PHISIC 2016, École des Mines de Saint-Étienne, Provence (France), October 04, 2016.
  • On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
    Dahmun Goudarzi.
    CHES 2016, Santa-Barbara, U.S.A., August 16, 2016.
  • From Obfuscation to White-Box Crypto: Relaxation and Security Notions
    WhibOx Ecrypt workshop, Santa Barbara, August 14, 2016.
  • Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication
    SAC 2016, St John's (Newfoundland, Canada), August 12, 2016.
  • The importance of rigidity in cryptographic standards
    Thomas Baignères.
    AWACS 2016, A Workshop About Cryptographic Standards. Vienna, Austria (co-located with Eurocrypt 2016), May 08, 2016.
  • CLT: Construction(s) and Attacks
    Tancrède Lepoint.
    Summer school on Fully Homomorphic Encryption and Multilinear Maps, Paris, France, October 14, 2015.
  • Zeroizing Attacks on Multilinear Maps.
    Tancrède Lepoint.
    Workshop on Tools for Asymmetric Cryptanalysis, Bochum, Germany, October 08, 2015.
  • Multilinear Maps over the Integers: From Design to Security.
    Tancrède Lepoint.
    The Mathematics of Modern Cryptography Workshop, Berkeley, U.S.A., July 10, 2015.
  • The ins and outs of programming cryptography in smart cards.
    portrait ofPascal Paillier.
    Real World Cryptography, London, U.K., January 08, 2015.
  • 🇫🇷 Chiffrement (complètement) homomorphe : de la théorie à la pratique.
    Tancrède Lepoint.
    Séminaire confiance numérique, Clermont-Ferrand, France, October 09, 2014.
  • Provable Security against Side-Channel Attacks
    MCrypt Seminar, Les Deux Alpes (France), August 11, 2014.
  • Homomorphic Encryption: From Theory to Practice.
    Tancrède Lepoint.
    CryptoBG International Summer School 2014, Bulgaria, July 23, 2014.
  • SCARE of Secret Ciphers with SPN Structures
    ASIACRYPT 2013, Bangalore, December 03, 2013.
  • Masking against Side-Channel Attacks: a Formal Security Proof.
    EUROCRYPT 2013, Athens, May 27, 2013.
  • Higher-Order Masking Schemes for S-boxes.
    FSE 2012, Washington DC, March 21, 2012.
  • Provably Secure Higher-Order Masking of AES.
    CHES 2010, Santa Barbara, August 20, 2010.