Publications

2014+ (all publications are available in hal after 2014)

2006

I. Andriyanova, J.-P. Tillich, J.-C. Carlach. A new family of codes with high iterative decoding performances. In Proceedings of ICC 2006 - IEEE International Conference on Communications, June 2006, Istambul, Turquie.

F. Armknecht, C. Carlet, P. Gaborit, S. Künzli, W. Meier, O. RuattaL. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. In Advances in Cryptology - EUROCRYPT 2006, LNCS , Springer-Verlag, 2006.

F. Arnault, T.P. Berger, C. Lauradoux. Update on F-FCSR Stream Cipher. In Proceedings of SASC 2006 - ECRYPT Workshop on stream ciphers, February 2006, Leuwen, Belgium.

D. Augot, Mikhail Stepanov Interpolation based decoding of Reed-Muller codes , Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics , RICAM, University of Linz, Austria, May 2006. Invited talk.

D. Augot, M. El-Khamy, R.J. McEliece, F. Parvaresh, M. Stepanov, A. Vardy. Algebraic List Decoding of Reed-Solomon product codes . In Proceedings of Algebraic and Combinatorial Coding Theory, ACCT-10, Zvenigorod, Russia, September 2006.

D. Augot, A. Biryukov, A. Canteaut, C. Cid, N. Courtois, C. De Cannière, H. Gilbert, C. Lauradoux, M. Parker, B. Preneel, M. Robshaw and Y. Seurin. D.STVL.2 -- AES Security Report. ECRYPT Report, Janv. 2006. [pdf]

C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. DECIM v2. [pdf] In proceedings of SASC 2006 - ECRYPT Workshop on stream ciphers, Feb 2006, Leuven, Belgium.

T.P. Berger, A. Canteaut, P. Charpin, Y. Laigle-Chapuy. On Almost Perfect Nonlinear mappings. IEEE Trans. Inform. Theory, vol. 52, n. 9, pp.4160-70, September 2006.

R. Bhaskar. Protocoles Cryptographiques pour les réseaux Ad hoc. Thèse de doctorat, Ecole Polytechnique, 26 Juin 2006.

R. Bhaskar, J. Herranz, F. Laguillaumie. Efficient Authentication for Reactive Routing Protocols. In Proc. of Second International Workshop on Security in Networks and Distributed Systems , Vienna, Austria , April 2006.

R. Bhaskar, J. Herranz, F. Laguillaumie. Aggregate Designated Verifier Signatures and Application to Secure Routing. International Journal of Security and Networks , Special Issue on Cryptography in Networks, to appear.

L. Budaghyan, C. Carlet, P. Felke, G. Leander. An infinite class of quadratic APN functions which are not equivalent to power mappings. In Proceedings of the 2006 IEEE International Symposium on Information Theory, ISIT 06, Seattle, USA, july 2006.

A. Canteaut. Open problems related to algebraic attacks on stream ciphers . In Workshop on Coding and Cryptography - WCC 2005, number 3969 in Lecture Notes in Computer Science, pp. 120-134, Springer, 2006, invited paper.

A. Canteaut. Analyse et conception de chiffrements à clef secrète . Habilitation à diriger les recherches, Université Paris 6, Septembre, 2006.

A. Canteaut. Parcours et fiches sur les générateurs pseudo-aléatoires et le chiffrement à flot , Portail Internet Cryptologie et Sécurité de l'Information}, 2006.

A. Canteaut (Ed.), D. Augot, A. Biryukov, A. Braeken, C. Cid, H. Dobbertin, H. Englund, H. Gilbert, L. Granboulan, H. Handschuh, M. Hell, T. Johansson, A. Maximov, M. Parker, T. Pornin, B. Preneel, M. Robshaw, M. Ward. D.STVL.4 -- Ongoing Research Areas in Symmetric Cryptography. ECRYPT Report, January 2006. [pdf]

A. Canteaut, P. Charpin and G. Kyureghyan. A new class of monomial bent functions . In Proceedings of the 2006 IEEE International Symposium on Information Theory, ISIT 06, Seattle, USA, july 2006.

A. Canteaut, M. Daum, G. Leander and H. Dobbertin. Normal and non normal bent functions. In Discrete Applied Mathematics , Special issue in Coding and Cryptology, Vol. 154, Issue 2, pp. 202-18, February 2006.

A. Canteaut, C. Lauradoux and A. Seznec. Understanding cache attacks. INRIA Research-report RR-5881, Avril 2006.

C. Carlet, C. Ding, H. Niederreiter. Authentication Schemes from Highly Nonlinear Functions. Designs, Codes and Cryptography, Volume 40, Number 1, pp. 71-79, July 2006.

C. Carlet, D.K. Dalai, K.C. Gupta, S. Maitra. Algebraic immunity for cryptographically significant Boolean functions: analysis and construction , IEEE Transactions on Information Theory, Vol. 52, N. 7, pp. 3105-3121, July 2006.

C. Carlet, P. Gaborit. Hyper-bent functions and cyclic codes. Jour. Comb. Theory Series A 113(2006), 466-482.

P. Charpin, T. Helleseth, V. Zinoviev. The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes. IEEE Transactions on Information Theory, Vol. 52, N. 4, pp. 1727-1732, 2006.

P. Charpin, G. Kabatiansky,(Eds). Special issue in Coding and Cryptology, in Discrete Applied Mathematics, Vol. 154, Issue 2, February 2006. Éditeurs associés : A. Barg (U. of Maryland, USA), H. Gilbert (France Telecam R\&D), T. Klove (Bergen, Norvège), J. Massey (U. of Lund, Suède), G. Zémor (ENST, Paris).

P. Charpin and G. Kyureghyan. On cubic bent functions in the class M . In Proceedings of Algebraic and Combinatorial Coding Theory, ACCT-10, Zvenigorod, Russia, September 2006.

M. Cluzeau. Block code reconstruction using iterative decoding techniques. In Proceedings of the 2006 IEEE International Symposium on Information Theory, ISIT 06, Seattle, USA, july 2006.

M. Cluzeau. Reconnaissance d'un schema de codage, Thèse de doctorat, Ecole Polytechnique, 28 Novembre 2006.

I. Dumer G. Kabatiansky, C. Tavernier. List decoding of second order Reed-Muller codes up to the Johnson bound with almost linear complexity . In Proceedings of the 2006 IEEE International Symposium on Information Theory, ISIT 06, pp. 138-142, Seattle, USA, july 2006.

M. Diarra. Analyse de la sécurité d'un protocole d'identification pour les RFID. Stage d'option, Ecole Polytechnique, Juillet 2006. Direction : N. Sendrier.

F. Didier. A new bound on the block error probability after over the erasure channel. IEEE Transactions on Information Theory, vol. 52, n. 10, pp. 4496-4503, October 2006.

F. Didier. Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks. Proceedings of Indocrypt 2006, LNCS 4329, December 2006, pp. 236-250.

F. Didier, J.P. Tillich. Computing the Algebraic Immunity Efficiently. Proceedings of Fast Software Encryption, FSE~2006, LNCS 4047, 2006, pp. 359-374.

H. Dobbertin, G. Leander, A. Canteaut, C. Carlet, P. Felke, P. Gaborit. Construction of bent functions via Niho power functions. Jour. Comb. Theory Series A, Vol. 113, Issue 5, pp. 779-798, July 2006.

C. Faure. Average number of Gabidulin codewords within a sphere . In Proceedings of Algebraic and Combinatorial Coding Theory, ACCT-10, Zvenigorod, Russia, September 2006.

C. Faure, P. Loidreau. A new public-key cryptosystem based on the problem of reconstruction of p-polynomials . In Workshop on Coding and Cryptography - WCC 2005, number 3969 in Lecture Notes in Computer Science, pp. 304-315, Springer, 2006.

M. Finiasz. Syndrome decoding in the non-standard cases, In CLC 2006, September 2006, Darmstadt, Germany. Invited talk.

J. Friedman, R. Murty, J.P. Tillich. Spectral estimates for Abelian Cayley graphs. Journal of Combinatorial Theory Ser.B, vol. 96, n. 1, pp. 111-121, 2006.

F. Galand, Practical Construction Against Theoretical Approach in Fingerprinting. In Proceedings of the 2006 IEEE International Symposium on Information Theory, ISIT 06, Seattle, USA, july 2006.

G. Kabatiansky, C. Tavernier. List decoding of second order Reed-Muller codes, second part. . In Proceedings of Algebraic and Combinatorial Coding Theory, ACCT-10, pp. 131-135, Zvenigorod, Russia, September 2006.

I. de Lamberterie, M. Videau. Regards croisés de juristes et d'informaticiens sur la sécurité informatique, Actes du Symposium sur la Sécurité des Techologies de l'Information et des Communications, 2006, Article invité, A paraitre.

F. Levy-dit-Vehel, L. Perret. On Wagner-Magyarik cryptosystem . In Workshop on Coding and Cryptography - WCC 2005, number 3969 in Lecture Notes in Computer Science, pp. 316-29, Springer, 2006.

P. Loidreau. A Welch-Berlekamp like algorithm for decoding Gabidulin codes . In Workshop on Coding and Cryptography - WCC 2005, number 3969 in Lecture Notes in Computer Science, pp. 36-45, Springer, 2006.

P. Loidreau. How to reduce public-key size in McEliece-like public key cryptosystems, In CLC 2006, September 2006, Darmstadt, Germany. Invited talk.

P. Loidreau, R. Overbeck. Decoding rank errors beyond the error-correcting capacity. In Proceedings of Algebraic and Combinatorial Coding Theory, ACCT-10, Zvenigorod, Russia, September 2006.

M. Naya Plasencia. Cryptanalyse de systèmes de chiffrement à flot : étude de la sécurité d'Achterbahn. Rapport de stage de Master Recherche~II, Université de Versailles-St Quentin. Direction : N. A. Canteaut.

H. Ollivier, J.P. Tillich. Trellises for stabilizer codes : definition and uses. Phys. Rev. A, vol. 74, n. 3, September 2006.

N. Sendrier. Post-quantum code-based cryptography , In PQcrypto 2006, May 2006, Leuven, Belgium. Invited talk.

N. Sendrier. Key security of code-based public key cryptosystem, In CLC 2006, September 2006, Darmstadt, Germany. Invited talk.

N. Sendrier, C. Lauradoux. HAVEGE: true random number generator in software , In YACC 2006, June 2006, Porquerolles Island, France. Invited talk.

J.-P. Tillich and G. Zémor. On the minimum distance of structured LDPC codes with two variable nodes of degree 2 per parity-check equation. In Proceedings of the 2006 IEEE International Symposium on Information Theory, ISIT 06, pp. 1549-53, Seattle, USA, july 2006.


People

Head of project-team

  • Anne Canteaut
  • Vice-leader

  • Nicolas Sendrier
  • Administrative assistant

  • Christelle Guiziou
  • Research scientists

  • André Chailloux
  • Pascale Charpin
  • Gaëtan Leurent
  • Anthony Leverrier
  • María Naya-Plasencia
  • Jean-Pierre Tillich
  • Other researchers

  • Christina Boura
  • Post-doc researchers

  • Léo Perrin
  • Ph.D. students

  • Xavier Bonnetain
  • Rémi Bricout
  • Kevin Carrier
  • Rodolfo Canto Torres
  • Kaushik Chakraborty
  • Thomas Debris
  • Sébastien Duval
  • Shouvik Ghorai
  • Antoine Grospellier
  • Adrien Hauteville
  • Matthieu Lequesne
  • Vivien Londe
  • Andrea Olivo
  • Yann Rotella
  • André Schrottenloher
  • Ferdinand Sibleyras
  • Valentin Vasseur
  • External collaborators

    Former members