Publications

2014+ (all publications are available in hal after 2014)

2007

I. Andriyanova and J.P. Tillich. A family of non-binary TLDPC codes: density evolution, convergence and thresholds. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 1216-1220, ISIT 07, Nice, FRANCE, june 2007.

F. Arnault, T.P. Berger, C. Lauradoux and M. Minier. X-FCSR: a new software oriented stream cipher based upon FCSRs. In Proceedings of INDOCRYPT 2007, Chennai (INDIA), volume 4859 of LNCS, pages 341-350. Springer-Verlag, 2007.

D. Augot. Décodage des codes algébriques et cryptographie . Habilitation à diriger les recherches, Université Paris 6, 7 Juin 2007.

D. Augot. On the Newton's identities for decoding cyclic codes with Grobner basis . The Claude Shannon workshop on Coding and Cryptography. May 2007, Cork, Ireland. Invited talk.

D. Augot. Multivariate Generalizations of the Guruswami-Sudan list decoding algorithm . Oberwolfach workshop on Coding Theory. OWR 2007,, pp. 47-50, Invited talk.

D. Augot, M. Bardet and J.C Faugère. On formulas for decoding binary cyclic codes. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 2646-2650, ISIT 07, Nice, FRANCE, june 2007.

D. Augot, R. Bhaskar, V. Issarny, D. Sacchetti. A Three Round Authenticated Group Key Agreement Protocol for Ad hoc Networks. Elsevier Journal on Pervasive and Mobile Computing, Volume 3, Issue 1, January 2007, Pages 36-52.

D. Augot, N. Sendrier, J.P. Tillich. Workshop on Coding and Cryptography - WCC 2007. INRIA, 2007.

S. Babbage, C. de Cannière, A. Canteaut, C. Cid, H. Gilbert, T. Johansson, C. Paar, M. Parker, B. Preneel, V. Rijmen, M. Robshaw, H. Wu. eSTREAM - Short Report on the End of the Second Phase. ECRYPT Report, Mars 2007. [pdf]

F. Banat-Berger and A. Canteaut. Intégrité, signature et processus d'archivage. La Sécurité aujourd'hui dans la société de l'information, S. Lacour Ed., edition L'Harmattan, 213--235, 2007.

I. Ben Slimen. Les problèmes de réconciliation dans les protocoles quantiques d' échange de clés . Rapport de stage de Master de l'ENIT, Mai 2007. Direction : J.P. Tillich.

T. Camara, H. Ollivier and J.P. Tillich. A class of quantum LDPC codes: construction and performances under iterative decoding. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 811-815, ISIT 07, Nice, FRANCE, june 2007.

A. Canteaut. Boolean Functions for cryptography ECRYPT PhD SUMMER SCHOOL , Emerging Topics in Cryptographic Design and Cryptanalysis, 30 April - 4 May 2007, Samos, Greece. Invited talk.

A. Canteaut (ed.), D. Augot, C. Cid, H. Englund, H. Gilbert, M. Hell, T. Johansson, M. Parker, T. Pornin, B. Preneel, M. Robshaw. D.STVL.5 -- Ongoing Research Areas in Symmetric Cryptography. ECRYPT Report, Mars 2007, 93 pages.

C. Chabot. Recognition of a code in a noisy environment. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 221-2215, ISIT 07, Nice, FRANCE, june 2007.

P. Charpin. Hyperbent functions . Helleseth Symposium , on the Occasion of Tor Helleseth's $60$th Birthday . November 2007, Bergen, Norway. Invited talk

P. Charpin, T. Helleseth, V. Zinoviev. On binary primitive BCH codes with minimum distance 8 and exponential sums. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 1976-1980, ISIT 07, Nice, FRANCE, june 2007.

P. Charpin, T. Helleseth, V. Zinoviev. The divisibility modulo 24 of Kloosterman sums on GF(2^m), m odd. Jour. Comb. Theory, Series A 114(2007), Issue 2, pp. 322-338.

P. Charpin, T. Helleseth, V. Zinoviev. Propagation characteristics of x --> 1/x and Kloosterman sums. In Finite Fields and Applications, 13 (2007), Issue 2, 366-381.

M. Cluzeau. Reconstruction of a Linear Scrambler. IEEE Transactions on Computers, vol. 56, n. 9, pp. 1283-1291, September 2007.

D. Dalai and S. Maitra. Balanced Boolean functions with (more than) maximum algebraic immunity. In Proceedings of the Workshop on Coding and Cryptography , WCC 07, pp 99-108, April 2007, Versailles, France.

F. Didier. Attacking the filter generator by finding zero inputs of the filtering function, In Proceedings of INDOCRYPT 2007, Chennai (INDIA), volume 4859 of LNCS, pages 404--413. Springer-Verlag, 2007.

F. Didier. Codes de Reed-Muller et cryptanalyse du registre filtré Thèse de doctorat, Ecole Polytechnique, 28 Novembre 2007.

F. Didier and Y. Laigle-Chapuy . Finding low-weight polynomial multiples using discrete logarithms. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 1036-1040, ISIT 07, Nice, FRANCE, june 2007.

M. Finiasz, Ph. Gaborit and N. Sendrier. Improved fast syndrome based cryptographic hash function . In Proceedings of ECRYPT Hash Workshop 2007, Barcelona, SPAIN, May 2007.

Ph. Gaborit, C. Laudaroux, N. Sendrier. SYND: a Very Fast Code-Based Cipher Stream with a Security Reduction. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 186-190, ISIT 07, Nice, FRANCE, june 2007.

B. Gérard. Utilisation de techniques de codage correcteur d'erreurs pour la cryptanalyse de systèmes de chiffrement à clé secrète . Rapport de stage de Master d'Algèbre Appliquée, Université de Versailles-St Quentin, Avril-Juin 2007. Direction : J.P. Tillich.

F. Giton. Etude de l'algorithme cyclotomique de transformée de Fourier de Sidorenko . Rapport de stage de Master "Cryptographie et Codage", Université de Limoges, Septembre 2007. Direction : D. Augot.

Y. Laigle-Chapuy. Permutation Polynomials and applications to coding theory. Finite Fields and Applications , 13 (2007), Issue 1, 58-70.

Y. Laigle-Chapuy. A note on a class of quadratic permutations over F2n, In Proceedings of AAECC 17, Bangalore, INDIA, volume 4851 of LNCS, pages 130--137. Springer-Verlag, 2007. Bangalore, INDIA.

C. Lauradoux. Throughput/code size tradeoff for stream ciphers In Proceedings of SASC 2007 - ECRYPT Workshop on stream ciphers, January 2007, Bochum, Germany.

C. Lauradoux. From Hardware to Software Synthesis of Linear Feedback  Shift Registers. In Proceedings of Workshop on Performance Optimization for High-Level Languages and  Libraries - POHLL 2007 , March, 2007, Long Beach, USA

C. Lauradoux. Conception et synthèse en cryptographie symétrique. Thèse de doctorat, Ècole Polytechnique, Palaiseau, Juin 2007.

C. Lauradoux, É. Filiol. L'apocalypse du commerce en ligne aura-t-elle lieu ? MISC - Le journal de la sécurité informatique, n. 29, Mars 2007.

P. Loidreau. Métrique rang et cryptographie . [.pdf] . Habilitation à diriger les recherches, Université Paris 6, Janvier 2007.

S. Maitra, S. Sarkar, D.K. Dalai. On Dihedral Group Invariant Boolean Functions, Workshop on Boolean Functions :Cryptography and Applications, (BFCA07), May 2-3, 2007, Paris, FRANCE.

S. Manuel and N. Sendrier. XOR-Hash : A Hash Function Based on XOR, In Proceedings of WeWork 2007, Western European Workshop on Research in Cryptology, July 4-6, 2007, Ruhr-University, Bochum, Germany.

M. Naya-Plasencia. Cryptanalysis of Achterbahn-128/80 In Proceedings of SASC 2007 - ECRYPT Workshop on stream ciphers, January 2007, Bochum, Germany.

M. Naya-Plasencia. Cryptanalysis of Achterbahn-128/80 In Proceedings of Fast Software Encryption, FSE~2007, Lecture Notes in Computer Science, n. 4593, pp. 73-86, 2007.

M. Naya-Plasencia. Cryptanalysis of Achterbahn-128/80 with a new Keystream Limitation In Proceedings of WeWork 2007, Western European Workshop on Research in Cryptology, July 4-6, 2007, Ruhr-University, Bochum, Germany.

M. Naya-Plasencia. Cryptanalyse de Achterbahn-128/80 avec une nouvelle limitation de suite chiffrante, MajecSTIC 2007, , 29-31 Octobre, 2007, Caen, France.

A. Otmani, J.P. Tillich and I. Andriyanova. On the Minimum Distance of Generalized LDPC Codes. In Proceedings of the 2007 IEEE International Symposium on Information Theory, pp. 751-755, ISIT 07, Nice, FRANCE, june 2007.

A. Röck. The Impact of Entropy Loss Caused by Random Functions, In Proceedings of WeWork 2007, Western European Workshop on Research in Cryptology, July 4-6, 2007, Ruhr-University, Bochum, Germany.

A. Röck. Attaques par collision basées sur la perte d'entropie causée par des fonctions aléatoires, MajecSTIC 2007, , 29-31 Octobre, 2007, Caen, France.

B. Sakkour. Étude et amélioration du décodage des codes de Reed-Muller d'ordre deux. Thèse de doctorat, Ècole Polytechnique, Palaiseau, Avril 2007.

N. Sendrier. Codes based One-way functions ECRYPT PhD SUMMER SCHOOL , Emerging Topics in Cryptographic Design and Cryptanalysis, 30 April - 4 May 2007, Samos, Greece. Invited talk.

J.P Tillich. Quantum codes suitable for iterative decoding . Oberwolfach workshop on Coding Theory. OWR 2007,, pp. 50-51, Invited talk.


People

Head of project-team

  • Anne Canteaut
  • Vice-leader

  • Nicolas Sendrier
  • Administrative assistant

  • Christelle Guiziou
  • Research scientists

  • André Chailloux
  • Pascale Charpin
  • Gaëtan Leurent
  • Anthony Leverrier
  • María Naya-Plasencia
  • Jean-Pierre Tillich
  • Other researchers

  • Christina Boura
  • Post-doc researchers

  • Léo Perrin
  • Ph.D. students

  • Xavier Bonnetain
  • Rémi Bricout
  • Kevin Carrier
  • Rodolfo Canto Torres
  • Kaushik Chakraborty
  • Thomas Debris
  • Sébastien Duval
  • Shouvik Ghorai
  • Antoine Grospellier
  • Adrien Hauteville
  • Matthieu Lequesne
  • Vivien Londe
  • Andrea Olivo
  • Yann Rotella
  • André Schrottenloher
  • Ferdinand Sibleyras
  • Valentin Vasseur
  • External collaborators

    Former members