What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Pierre-Alain Fouque
Google Scholar
ORCID:
0000-0003-4997-2276
135
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Faster Quantum Algorithms for MQ2 and Applications.
Quentin Edme
Pierre-Alain Fouque
André Schrottenloher
2025
conf/dsn
GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses.
Pierrick Philippe
Mohamed Sabt
Pierre-Alain Fouque
2025
conf/crypto
Reducing the Number of Qubits in Quantum Factoring.
Clémence Chevignard
Pierre-Alain Fouque
André Schrottenloher
2025
journals/tches
Avengers assemble! Supervised learning meets lattice reduction A single power trace attack against CRYSTALS-Kyber Key Generation.
Pierre-Alain Fouque
Damien Marion
Quyen Nguyen
Alexandre Wallet
2024
journals/tosc
Key Committing Attacks against AES-based AEAD Schemes.
Patrick Derbez
Pierre-Alain Fouque
Takanori Isobe
Mostafizar Rahman
André Schrottenloher
2024
journals/joc
Masking the GLP Lattice-Based Signature Scheme at Any Order.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Benjamin Grégoire
Mélissa Rossi
Mehdi Tibouchi
2024
conf/uss
"These results must be false": A usability evaluation of constant-time analysis tools.
Marcel Fourné
Daniel De Almeida Braga
Jan Jancar
Mohamed Sabt
Peter Schwabe
Gilles Barthe
Pierre-Alain Fouque
Yasemin Acar
2024
conf/asiacrypt
Reducing the Number of Qubits in Quantum Information Set Decoding.
Clémence Chevignard
Pierre-Alain Fouque
André Schrottenloher
2023
journals/popets
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME.
Gwendal Patat
Mohamed Sabt
Pierre-Alain Fouque
2023
conf/eurosp
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.
Daniel De Almeida Braga
Natalia Kulatova
Mohamed Sabt
Pierre-Alain Fouque
Karthikeyan Bhargavan
2023
conf/pkc
A Generic Transform from Multi-round Interactive Proof to NIZK.
Pierre-Alain Fouque
Adela Georgescu
Chen Qian
Adeline Roux-Langlois
Weiqiang Wen
2023
conf/asiacrypt
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve.
Charles Bouillaguet
Ambroise Fleury
Pierre-Alain Fouque
Paul Kirchner
2022
journals/tches
BAT: Small and Fast KEM over NTRU Lattices.
Pierre-Alain Fouque
Paul Kirchner
Thomas Pornin
Yang Yu
2022
conf/sp
"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks.
Jan Jancar
Marcel Fourné
Daniel De Almeida Braga
Mohamed Sabt
Peter Schwabe
Gilles Barthe
Pierre-Alain Fouque
Yasemin Acar
2022
conf/sp
Exploring Widevine for Fun and Profit.
Gwendal Patat
Mohamed Sabt
Pierre-Alain Fouque
2022
conf/acns
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
Ghada Arfaoui
Pierre-Alain Fouque
Thibaut Jacques
Pascal Lafourcade
Adina Nedelcu
Cristina Onete
Léo Robert
2022
conf/dsn
WideLeak: How Over-the-Top Platforms Fail in Android.
Gwendal Patat
Mohamed Sabt
Pierre-Alain Fouque
2022
conf/eurocrypt
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon.
Thomas Espitau
Pierre-Alain Fouque
François Gérard
Mélissa Rossi
Akira Takahashi
Mehdi Tibouchi
Alexandre Wallet
Yang Yu
2022
conf/asiacrypt
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool.
Patrick Derbez
Marie Euler
Pierre-Alain Fouque
Phuong Hoa Nguyen
2021
conf/ccs
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild.
Daniel De Almeida Braga
Pierre-Alain Fouque
Mohamed Sabt
2021
conf/crypto
Towards Faster Polynomial-Time Lattice Reduction.
Paul Kirchner
Thomas Espitau
Pierre-Alain Fouque
2021
conf/crypto
SSE and SSD: Page-Efficient Searchable Symmetric Encryption.
Angèle Bossuat
Raphael Bost
Pierre-Alain Fouque
Brice Minaud
Michael Reichle
2021
conf/esorics
How to (Legally) Keep Secrets from Mobile Operators.
Ghada Arfaoui
Olivier Blazy
Xavier Bultel
Pierre-Alain Fouque
Thibaut Jacques
Adina Nedelcu
Cristina Onete
2021
conf/esorics
MLS Group Messaging: How Zero-Knowledge Can Secure Updates.
Julien Devigne
Céline Duguey
Pierre-Alain Fouque
2020
journals/tches
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10.
Daniel De Almeida Braga
Pierre-Alain Fouque
Mohamed Sabt
2020
journals/tosc
Fake Near Collisions Attacks.
Patrick Derbez
Pierre-Alain Fouque
Victor Mollimard
2020
journals/tosc
Increasing Precision of Division Property.
Patrick Derbez
Pierre-Alain Fouque
2020
conf/crypto
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Martin R. Albrecht
Shi Bai
Pierre-Alain Fouque
Paul Kirchner
Damien Stehlé
Weiqiang Wen
2020
conf/crypto
Fast Reduction of Algebraic Lattices over Cyclotomic Fields.
Paul Kirchner
Thomas Espitau
Pierre-Alain Fouque
2020
conf/acns
Multi-Device for Signal.
Sébastien Campion
Julien Devigne
Céline Duguey
Pierre-Alain Fouque
2020
conf/esorics
Designing Reverse Firewalls for the Real World.
Angèle Bossuat
Xavier Bultel
Pierre-Alain Fouque
Cristina Onete
Thyla van der Merwe
2020
conf/eurocrypt
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.
Pierre-Alain Fouque
Paul Kirchner
Mehdi Tibouchi
Alexandre Wallet
Yang Yu
2020
conf/acsac
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild.
Daniel De Almeida Braga
Pierre-Alain Fouque
Mohamed Sabt
2019
journals/tosc
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks.
Patrick Derbez
Pierre-Alain Fouque
Baptiste Lambin
Victor Mollimard
2019
journals/popets
The privacy of the TLS 1.3 protocol.
Ghada Arfaoui
Xavier Bultel
Pierre-Alain Fouque
Adina Nedelcu
Cristina Onete
2019
journals/popets
Security-Efficiency Tradeoffs in Searchable Encryption.
Raphael Bost
Pierre-Alain Fouque
2019
conf/ccs
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Mélissa Rossi
Mehdi Tibouchi
2019
conf/acns
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation.
Vincent Migliore
Benoît Gérard
Mehdi Tibouchi
Pierre-Alain Fouque
2019
conf/eurosp
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Olivier Blazy
Angèle Bossuat
Xavier Bultel
Pierre-Alain Fouque
Cristina Onete
Elena Pagnin
2019
conf/esorics
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Gilles Barthe
Sonia Belaïd
Gaëtan Cassiers
Pierre-Alain Fouque
Benjamin Grégoire
François-Xavier Standaert
2018
journals/tches
On Recovering Affine Encodings in White-Box Implementations.
Patrick Derbez
Pierre-Alain Fouque
Baptiste Lambin
Brice Minaud
2018
journals/tosc
Revisiting and Improving Algorithms for the 3XOR Problem.
Charles Bouillaguet
Claire Delaplace
Pierre-Alain Fouque
2018
journals/joc
Key-Recovery Attacks on ASASA.
Brice Minaud
Patrick Derbez
Pierre-Alain Fouque
Pierre Karpman
2018
conf/sp
A Formal Treatment of Accountable Proxying Over TLS.
Karthikeyan Bhargavan
Ioana Boureanu
Antoine Delignat-Lavaud
Pierre-Alain Fouque
Cristina Onete
2018
conf/eurocrypt
Masking the GLP Lattice-Based Signature Scheme at Any Order.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Benjamin Grégoire
Mélissa Rossi
Mehdi Tibouchi
2018
conf/asiacrypt
Pattern Matching on Encrypted Streams.
Nicolas Desmoulins
Pierre-Alain Fouque
Cristina Onete
Olivier Sanders
2018
conf/asiacrypt
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
Jonathan Bootle
Claire Delaplace
Thomas Espitau
Pierre-Alain Fouque
Mehdi Tibouchi
2018
conf/sacrypt
Variants of the AES Key Schedule for Better Truncated Differential Bounds.
Patrick Derbez
Pierre-Alain Fouque
Jérémy Jean
Baptiste Lambin
2017
conf/ccs
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Thomas Espitau
Pierre-Alain Fouque
Benoît Gérard
Mehdi Tibouchi
2017
conf/eurosp
Content delivery over TLS: a cryptographic analysis of keyless SSL.
Karthikeyan Bhargavan
Ioana Boureanu
Pierre-Alain Fouque
Cristina Onete
Benjamin Richard
2017
conf/eurocrypt
Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L<sub>|Δ𝕂|</sub>(½) and Application to the Cryptanalysis of a FHE Scheme.
Jean-François Biasse
Thomas Espitau
Pierre-Alain Fouque
Alexandre Gélin
Paul Kirchner
2017
conf/eurocrypt
Revisiting Lattice Attacks on Overstretched NTRU Parameters.
Paul Kirchner
Pierre-Alain Fouque
2016
journals/popets
Achieving Better Privacy for the 3GPP AKA Protocol.
Pierre-Alain Fouque
Cristina Onete
Benjamin Richard
2016
journals/joc
Tightly Secure Signatures From Lossy Identification Schemes.
Michel Abdalla
Pierre-Alain Fouque
Vadim Lyubashevsky
Mehdi Tibouchi
2016
journals/joc
New Second-Preimage Attacks on Hash Functions.
Elena Andreeva
Charles Bouillaguet
Orr Dunkelman
Pierre-Alain Fouque
Jonathan J. Hoch
John Kelsey
Adi Shamir
Sébastien Zimmer
2016
conf/ccs
Strong Non-Interference and Type-Directed Higher-Order Masking.
Gilles Barthe
Sonia Belaïd
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Pierre-Yves Strub
Rébecca Zucchini
2016
conf/ccs
Fault Attacks on Efficient Pairing Implementations.
Pierre-Alain Fouque
Chen Qian
2016
conf/crypto
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
Patrick Derbez
Pierre-Alain Fouque
2016
conf/acns
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing.
Pierre Lestringant
Frédéric Guihéry
Pierre-Alain Fouque
2016
conf/acns
A Cryptographic Analysis of UMTS/LTE AKA.
Stéphanie Alt
Pierre-Alain Fouque
Gilles Macario-Rat
Cristina Onete
Benjamin Richard
2016
conf/ctrsa
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
Pierre Belgarric
Pierre-Alain Fouque
Gilles Macario-Rat
Mehdi Tibouchi
2016
conf/eurocrypt
Cryptanalysis of the New CLT Multilinear Map over the Integers.
Jung Hee Cheon
Pierre-Alain Fouque
Changmin Lee
Brice Minaud
Hansol Ryu
2016
conf/asiacrypt
Efficient and Provable White-Box Primitives.
Pierre-Alain Fouque
Pierre Karpman
Paul Kirchner
Brice Minaud
2016
conf/sacrypt
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures.
Thomas Espitau
Pierre-Alain Fouque
Benoît Gérard
Mehdi Tibouchi
2015
conf/ccs
Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism.
Pierre Lestringant
Frédéric Guihéry
Pierre-Alain Fouque
2015
conf/crypto
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.
Paul Kirchner
Pierre-Alain Fouque
2015
conf/crypto
Cryptanalysis of the Co-ACD Assumption.
Pierre-Alain Fouque
Moon Sung Lee
Tancrède Lepoint
Mehdi Tibouchi
2015
conf/crypto
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE.
Thomas Espitau
Pierre-Alain Fouque
Pierre Karpman
2015
conf/ches
Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd
Jean-Sébastien Coron
Pierre-Alain Fouque
Benoît Gérard
Jean-Gabriel Kammerer
Emmanuel Prouff
2015
conf/eurocrypt
Verified Proofs of Higher-Order Masking.
Gilles Barthe
Sonia Belaïd
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Pierre-Yves Strub
2015
conf/asiacrypt
Key-Recovery Attacks on ASASA.
Brice Minaud
Patrick Derbez
Pierre-Alain Fouque
Pierre Karpman
2014
conf/ccs
Synthesis of Fault Attacks on Cryptographic Implementations.
Gilles Barthe
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Jean-Christophe Zapalowicz
2014
conf/ches
Making RSA-PSS Provably Secure against Non-random Faults.
Gilles Barthe
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2014
conf/asiacrypt
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
Pierre-Alain Fouque
Antoine Joux
Chrysanthi Mavromati
2014
conf/asiacrypt
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Diego F. Aranha
Pierre-Alain Fouque
Benoît Gérard
Jean-Gabriel Kammerer
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2014
conf/asiacrypt
Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Sonia Belaïd
Pierre-Alain Fouque
Benoît Gérard
2014
conf/sacrypt
Binary Elligator Squared.
Diego F. Aranha
Pierre-Alain Fouque
Chen Qian
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2014
conf/sacrypt
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
Daniel Augot
Pierre-Alain Fouque
Pierre Karpman
2013
conf/fse
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.
Pierre-Alain Fouque
Thomas Vannet
2013
conf/fse
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.
Patrick Derbez
Pierre-Alain Fouque
2013
conf/acisp
Injective Encodings to Elliptic Curves.
Pierre-Alain Fouque
Antoine Joux
Mehdi Tibouchi
2013
conf/crypto
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128.
Pierre-Alain Fouque
Jérémy Jean
Thomas Peyrin
2013
conf/ches
Leakage-Resilient Symmetric Encryption via Re-keying.
Michel Abdalla
Sonia Belaïd
Pierre-Alain Fouque
2013
conf/ctrsa
Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.
Cyril Arnaud
Pierre-Alain Fouque
2013
conf/eurocrypt
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
Patrick Derbez
Pierre-Alain Fouque
Jérémy Jean
2013
conf/eurocrypt
Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem.
Charles Bouillaguet
Pierre-Alain Fouque
Amandine Véber
2012
conf/latincrypt
Indifferentiable Hashing to Barreto-Naehrig Curves.
Pierre-Alain Fouque
Mehdi Tibouchi
2012
conf/ches
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.
Pierre-Alain Fouque
Nicolas Guillermin
Delphine Leresteux
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2012
conf/iwsec
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher.
Jiqiang Lu
Yongzhuang Wei
Enes Pasalic
Pierre-Alain Fouque
2012
conf/eurocrypt
Tightly-Secure Signatures from Lossy Identification Schemes.
Michel Abdalla
Pierre-Alain Fouque
Vadim Lyubashevsky
Mehdi Tibouchi
2011
conf/fse
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
Jérémy Jean
Pierre-Alain Fouque
2011
conf/crypto
Automatic Search of Attacks on Round-Reduced AES and Applications.
Charles Bouillaguet
Patrick Derbez
Pierre-Alain Fouque
2011
conf/acns
Cache Timing Analysis of RC4.
Thomas Chardin
Pierre-Alain Fouque
Delphine Leresteux
2011
conf/ches
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES.
Patrick Derbez
Pierre-Alain Fouque
Delphine Leresteux
2011
conf/pkc
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem.
Charles Bouillaguet
Jean-Charles Faugère
Pierre-Alain Fouque
Ludovic Perret
2011
conf/asiacrypt
Practical Key-Recovery for All Possible Parameters of SFLASH.
Charles Bouillaguet
Pierre-Alain Fouque
Gilles Macario-Rat
2011
conf/sacrypt
New Insights on Impossible Differential Cryptanalysis.
Charles Bouillaguet
Orr Dunkelman
Pierre-Alain Fouque
Gaëtan Leurent
2010
conf/fse
Another Look at Complementation Properties.
Charles Bouillaguet
Orr Dunkelman
Gaëtan Leurent
Pierre-Alain Fouque
2010
conf/latincrypt
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
Pierre-Alain Fouque
Mehdi Tibouchi
2010
conf/sacrypt
<sub>512</sub>.
Charles Bouillaguet
Orr Dunkelman
Gaëtan Leurent
Pierre-Alain Fouque
2010
conf/sacrypt
Security Analysis of SIMD.
Charles Bouillaguet
Pierre-Alain Fouque
Gaëtan Leurent
2009
conf/ches
Practical Electromagnetic Template Attack on HMAC.
Pierre-Alain Fouque
Gaëtan Leurent
Denis Réal
Frédéric Valette
2009
conf/fdtc
Fault Attack on Schnorr Based Identification and Signature Schemes.
Pierre-Alain Fouque
Delphine Masgana
Frédéric Valette
2009
conf/eurocrypt
Optimal Randomness Extraction from a Diffie-Hellman Element.
Céline Chevalier
Pierre-Alain Fouque
David Pointcheval
Sébastien Zimmer
2008
conf/ccs
HMAC is a randomness extractor and applications to TLS.
Pierre-Alain Fouque
David Pointcheval
Sébastien Zimmer
2008
conf/acns
On the Security of the CCM Encryption Mode and of a Slight Variant.
Pierre-Alain Fouque
Gwenaëlle Martinet
Frédéric Valette
Sébastien Zimmer
2008
conf/ches
The Carry Leakage on the Randomized Exponent Countermeasure.
Pierre-Alain Fouque
Denis Réal
Frédéric Valette
M'hamed Drissi
2008
conf/pkc
-IC Signature Scheme.
Pierre-Alain Fouque
Gilles Macario-Rat
Ludovic Perret
Jacques Stern
2008
conf/ctrsa
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
Pierre-Alain Fouque
Gaëtan Leurent
2008
conf/fdtc
Fault Attack onElliptic Curve Montgomery Ladder Implementation.
Pierre-Alain Fouque
Reynald Lercier
Denis Réal
Frédéric Valette
2008
conf/eurocrypt
Second Preimage Attacks on Dithered Hash Functions.
Elena Andreeva
Charles Bouillaguet
Pierre-Alain Fouque
Jonathan J. Hoch
John Kelsey
Adi Shamir
Sébastien Zimmer
2008
conf/eurocrypt
Key Recovery on Hidden Monomial Multivariate Schemes.
Pierre-Alain Fouque
Gilles Macario-Rat
Jacques Stern
2008
conf/sacrypt
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques.
Charles Bouillaguet
Pierre-Alain Fouque
2008
conf/sacrypt
Cryptanalysis of Tweaked Versions of SMASH and Reparation.
Pierre-Alain Fouque
Jacques Stern
Sébastien Zimmer
2007
conf/crypto
Practical Cryptanalysis of SFLASH.
Vivien Dubois
Pierre-Alain Fouque
Adi Shamir
Jacques Stern
2007
conf/crypto
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Pierre-Alain Fouque
Gaëtan Leurent
Phong Q. Nguyen
2007
conf/eurocrypt
Cryptanalysis of SFLASH with Slightly Modified Parameters.
Vivien Dubois
Pierre-Alain Fouque
Jacques Stern
2006
conf/ches
Power Attack on Small RSA Public Exponent.
Pierre-Alain Fouque
Sébastien Kunz-Jacques
Gwenaëlle Martinet
Frédéric Muller
Frédéric Valette
2006
conf/pkc
The Twist-AUgmented Technique for Key Exchange.
Olivier Chevassut
Pierre-Alain Fouque
Pierrick Gaudry
David Pointcheval
2005
conf/pkc
Password-Based Authenticated Key Exchange in the Three-Party Setting.
Michel Abdalla
Pierre-Alain Fouque
David Pointcheval
2005
conf/eurocrypt
Differential Cryptanalysis for Multivariate Schemes.
Pierre-Alain Fouque
Louis Granboulan
Jacques Stern
2005
conf/asiacrypt
A Simple Threshold Authenticated Key Exchange from Short Secrets.
Michel Abdalla
Olivier Chevassut
Pierre-Alain Fouque
David Pointcheval
2004
conf/ches
Defeating Countermeasures Based on Randomized BSD Representations.
Pierre-Alain Fouque
Frédéric Muller
Guillaume Poupard
Frédéric Valette
2004
conf/sacrypt
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Pierre-Alain Fouque
Antoine Joux
Guillaume Poupard
2003
conf/fse
Practical Symmetric On-Line Encryption.
Pierre-Alain Fouque
Gwenaëlle Martinet
Guillaume Poupard
2003
conf/ches
.
Pierre-Alain Fouque
Frédéric Valette
2003
conf/ches
Attacking Unbalanced RSA-CRT Using SPA.
Pierre-Alain Fouque
Gwenaëlle Martinet
Guillaume Poupard
2003
conf/eurocrypt
On the Security of RDSA.
Pierre-Alain Fouque
Guillaume Poupard
2003
conf/asiacrypt
The Insecurity of Esign in Practical Implementations.
Pierre-Alain Fouque
Nick Howgrave-Graham
Gwenaëlle Martinet
Guillaume Poupard
2003
conf/sacrypt
Authenticated On-Line Encryption.
Pierre-Alain Fouque
Antoine Joux
Gwenaëlle Martinet
Frédéric Valette
2002
conf/fc
CryptoComputing with Rationals.
Pierre-Alain Fouque
Jacques Stern
Jan-Geert Wackers
2001
conf/pkc
One Round Threshold Discrete-Log Key Generation without Private Channels.
Pierre-Alain Fouque
Jacques Stern
2001
conf/asiacrypt
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.
Pierre-Alain Fouque
David Pointcheval
2001
conf/asiacrypt
Fully Distributed Threshold RSA under Standard Assumptions.
Pierre-Alain Fouque
Jacques Stern
2000
conf/fc
Sharing Decryption in the Context of Voting or Lotteries.
Pierre-Alain Fouque
Guillaume Poupard
Jacques Stern
Coauthors
Adela Georgescu
(1)
Adeline Roux-Langlois
(1)
Adi Shamir
(3)
Adina Nedelcu
(3)
Akira Takahashi
(1)
Alexandre Gélin
(1)
Alexandre Wallet
(3)
Amandine Véber
(1)
Ambroise Fleury
(1)
André Schrottenloher
(4)
Angèle Bossuat
(3)
Antoine Delignat-Lavaud
(1)
Antoine Joux
(4)
Baptiste Lambin
(3)
Benjamin Grégoire
(7)
Benjamin Richard
(3)
Benoît Gérard
(6)
Brice Minaud
(6)
Céline Chevalier
(1)
Céline Duguey
(2)
Changmin Lee
(1)
Charles Bouillaguet
(13)
Chen Qian
(3)
Chrysanthi Mavromati
(1)
Claire Delaplace
(2)
Clémence Chevignard
(2)
Cristina Onete
(10)
Cyril Arnaud
(1)
Damien Marion
(1)
Damien Stehlé
(1)
Daniel Augot
(1)
Daniel De Almeida Braga
(6)
David Pointcheval
(6)
Delphine Leresteux
(3)
Delphine Masgana
(1)
Denis Réal
(3)
Diego F. Aranha
(2)
Elena Andreeva
(2)
Elena Pagnin
(1)
Emmanuel Prouff
(1)
Enes Pasalic
(1)
François Dupressoir
(4)
François Gérard
(1)
François-Xavier Standaert
(1)
Frédéric Guihéry
(2)
Frédéric Muller
(2)
Frédéric Valette
(9)
Gaëtan Cassiers
(1)
Gaëtan Leurent
(7)
Ghada Arfaoui
(3)
Gilles Barthe
(10)
Gilles Macario-Rat
(5)
Guillaume Poupard
(7)
Gwenaëlle Martinet
(6)
Gwendal Patat
(3)
Hansol Ryu
(1)
Ioana Boureanu
(2)
Jacques Stern
(10)
Jan Jancar
(2)
Jan-Geert Wackers
(1)
Jean-Charles Faugère
(1)
Jean-Christophe Zapalowicz
(5)
Jean-François Biasse
(1)
Jean-Gabriel Kammerer
(2)
Jean-Sébastien Coron
(1)
Jérémy Jean
(4)
Jiqiang Lu
(1)
John Kelsey
(2)
Jonathan Bootle
(1)
Jonathan J. Hoch
(2)
Julien Devigne
(2)
Jung Hee Cheon
(1)
Karthikeyan Bhargavan
(3)
Léo Robert
(1)
Louis Granboulan
(1)
Ludovic Perret
(2)
M'hamed Drissi
(1)
Marcel Fourné
(2)
Marie Euler
(1)
Martin R. Albrecht
(1)
Mehdi Tibouchi
(20)
Mélissa Rossi
(4)
Michael Reichle
(1)
Michel Abdalla
(5)
Mohamed Sabt
(10)
Moon Sung Lee
(1)
Mostafizar Rahman
(1)
Natalia Kulatova
(1)
Nick Howgrave-Graham
(1)
Nicolas Desmoulins
(1)
Nicolas Guillermin
(1)
Olivier Blazy
(2)
Olivier Chevassut
(2)
Olivier Sanders
(1)
Orr Dunkelman
(4)
Pascal Lafourcade
(1)
Patrick Derbez
(14)
Paul Kirchner
(10)
Peter Schwabe
(2)
Phong Q. Nguyen
(1)
Phuong Hoa Nguyen
(1)
Pierre Belgarric
(1)
Pierre Karpman
(5)
Pierre Lestringant
(2)
Pierre-Alain Fouque
(135)
Pierre-Yves Strub
(2)
Pierrick Gaudry
(1)
Pierrick Philippe
(1)
Quentin Edme
(1)
Quyen Nguyen
(1)
Raphael Bost
(2)
Rébecca Zucchini
(1)
Reynald Lercier
(1)
Sébastien Campion
(1)
Sébastien Kunz-Jacques
(1)
Sébastien Zimmer
(6)
Shi Bai
(1)
Sonia Belaïd
(9)
Stéphanie Alt
(1)
Takanori Isobe
(1)
Tancrède Lepoint
(1)
Thibaut Jacques
(2)
Thomas Chardin
(1)
Thomas Espitau
(11)
Thomas Peyrin
(1)
Thomas Pornin
(1)
Thomas Vannet
(1)
Thyla van der Merwe
(1)
Vadim Lyubashevsky
(2)
Victor Mollimard
(2)
Vincent Migliore
(1)
Vivien Dubois
(2)
Weiqiang Wen
(2)
Xavier Bultel
(4)
Yang Yu
(3)
Yasemin Acar
(2)
Yongzhuang Wei
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to