What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jean-Pierre Tillich
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
Assessing the Impact of a Variant of MATZOV's Dual Attack on Kyber.
Kévin Carrier
Charles Meyer-Hilfiger
Yixin Shen
Jean-Pierre Tillich
2025
conf/crypto
Error Floor Prediction with Markov Models for QC-MDPC Codes.
Sarah Arpin
Jun Bo Lau
Antoine Mesnard
Ray A. Perlner
Angela Robinson
Jean-Pierre Tillich
Valentin Vasseur
2024
conf/acns
Projective Space Stern Decoding and Application to SDitH.
Kévin Carrier
Valérian Hatey
Jean-Pierre Tillich
2024
conf/eurocrypt
Reduction from Sparse LPN to LPN, Dual Attack 3.0.
Kévin Carrier
Thomas Debris-Alazard
Charles Meyer-Hilfiger
Jean-Pierre Tillich
2023
conf/asiacrypt
A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem.
Alain Couvreur
Rocco Mora
Jean-Pierre Tillich
2023
conf/tcc
Rigorous Foundations for Dual Attacks in Coding Theory.
Charles Meyer-Hilfiger
Jean-Pierre Tillich
2022
conf/asiacrypt
Statistical Decoding 2.0: Reducing Decoding to LPN.
Kévin Carrier
Thomas Debris-Alazard
Charles Meyer-Hilfiger
Jean-Pierre Tillich
2021
conf/sacrypt
A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem.
Pierre Briaud
Jean-Pierre Tillich
Javier A. Verbel
2020
conf/eurocrypt
An Algebraic Attack on Rank Metric Code-Based Cryptosystems.
Magali Bardet
Pierre Briaud
Maxime Bros
Philippe Gaborit
Vincent Neiger
Olivier Ruatta
Jean-Pierre Tillich
2020
conf/asiacrypt
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Magali Bardet
Maxime Bros
Daniel Cabarcas
Philippe Gaborit
Ray A. Perlner
Daniel Smith-Tone
Jean-Pierre Tillich
Javier A. Verbel
2019
conf/asiacrypt
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes.
Thomas Debris-Alazard
Nicolas Sendrier
Jean-Pierre Tillich
2018
conf/asiacrypt
Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE Scheme.
Thomas Debris-Alazard
Jean-Pierre Tillich
2017
conf/crypto
Identity-Based Encryption from Codes with Rank Metric.
Philippe Gaborit
Adrien Hauteville
Duong Hieu Phan
Jean-Pierre Tillich
2015
conf/pkc
A Polynomial-Time Attack on the BBCRS Scheme.
Alain Couvreur
Ayoub Otmani
Jean-Pierre Tillich
Valérie Gauthier-Umaña
2014
conf/eurocrypt
Polynomial Time Attack on Wild McEliece over Quadratic Extensions.
Alain Couvreur
Ayoub Otmani
Jean-Pierre Tillich
2010
conf/eurocrypt
Algebraic Cryptanalysis of McEliece Variants with Compact Keys.
Jean-Charles Faugère
Ayoub Otmani
Ludovic Perret
Jean-Pierre Tillich
2009
conf/ctrsa
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
Christophe Petit
Jean-Jacques Quisquater
Jean-Pierre Tillich
Gilles Zémor
2008
conf/eurocrypt
Collisions for the LPS Expander Graph Hash Function.
Jean-Pierre Tillich
Gilles Zémor
2006
conf/fse
Computing the Algebraic Immunity Efficiently.
Frédéric Didier
Jean-Pierre Tillich
2001
conf/ih
Automatic Detection of a Watermarked Document Using a Private Key.
Julien P. Stern
Jean-Pierre Tillich
1994
conf/crypto
Hashing with SL_2.
Jean-Pierre Tillich
Gilles Zémor
Coauthors
Adrien Hauteville
(1)
Alain Couvreur
(3)
Angela Robinson
(1)
Antoine Mesnard
(1)
Ayoub Otmani
(3)
Charles Meyer-Hilfiger
(4)
Christophe Petit
(1)
Daniel Cabarcas
(1)
Daniel Smith-Tone
(1)
Duong Hieu Phan
(1)
Frédéric Didier
(1)
Gilles Zémor
(3)
Javier A. Verbel
(2)
Jean-Charles Faugère
(1)
Jean-Jacques Quisquater
(1)
Jean-Pierre Tillich
(21)
Julien P. Stern
(1)
Jun Bo Lau
(1)
Kévin Carrier
(4)
Ludovic Perret
(1)
Magali Bardet
(2)
Maxime Bros
(2)
Nicolas Sendrier
(1)
Olivier Ruatta
(1)
Philippe Gaborit
(3)
Pierre Briaud
(2)
Ray A. Perlner
(2)
Rocco Mora
(1)
Sarah Arpin
(1)
Thomas Debris-Alazard
(4)
Valentin Vasseur
(1)
Valérian Hatey
(1)
Valérie Gauthier-Umaña
(1)
Vincent Neiger
(1)
Yixin Shen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to