Publications

2014+ (all publications are available in hal after 2014)

2008

F. Arnault, T. Berger and C. Lauradoux. F-FCSR stream ciphers, In New Stream Cipher Designs - The eSTREAM finalists, LNCS 4986, pp. 170--178, Springer, 2008.

D. Augot, E. Betti and E. Orsini. An introduction to linear and cyclic codes, In Grobner Bases, Coding, and Cryptography , Sala, M., Mora, T., Perret, L., Sakata, S. and Traverso, C (Eds.), RISC Book Series, Heidelberg, Springer, to appear.

D. Augot, J.-C. Faugère and L. Perret (Eds). Gröbner Bases Techniques in Cryptography and Coding Theory, Springer-Verlag, To appear.

D. Augot, M. Finiasz, P. Gaborit, S. Manuel and N. Sendrier. SHA-3 proposal: FSB. Submission to NIST, Octobre 2008.

D. Augot and M. Stepanov. A note on the generalisation of the Guruswami-Sudan list decoding algorithm to Reed-Muller codes. In Grobner Bases, Coding, and Cryptography, Sala, M., Mora, T., Perret, L., Sakata, S. and Traverso, C (Eds.), RISC Book Series, Heidelberg, Springer, to appear.

D. Augot and A. Zeh. On the Roth and Ruckenstein Equations for the Guruswami-Sudan Algorithm. In Proceedings of the 2008 IEEE International Symposium on Information Theory, ISIT 08, Toronto, Canada, july 2008.

D. Augot and A. Zeh. Key Equations for the Guruswami-Sudan Decoding Algorithm. In Proceedings of the Workshop on Coding and Systems,, Alicante, Spain, March 2008.

J.P. Aumasson, W. Meier, M. Naya-Plasencia and T. Peyrin. Inside the Hypercube. Cryptology ePrint Archive, Report 2008/486, Novembre 2008.

J.P. Aumasson and M. Naya-Plasencia. Second preimages on MCSSHA-3. Available online, Novembre 2008.

C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. {\sc Sosemanuk}: a fast software-oriented stream cipher, In New Stream Cipher Designs - The eSTREAM finalists, LNCS 4986, pp. 98--118, Springer, 2008.

C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Decim v2, In New Stream Cipher Designs - The eSTREAM finalists, LNCS 4986, pp. 140--151, Springer, 2008.

B. Biswas et N. Sendrier. Cryptosystème de McEliece: sécurité et implémentation. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

B. Biswas and N. Sendrier. McEliece cryptosystem in real life: theory and practice. In Proceedings of PQCrypto 2008, J. Buchmann and J. Ding (Eds.), LNCS 5299, pp. 47-62.

C. Blondeau. La cryptanalyse différentielle tronquée. Rapport de Mastère, Université de Limoges, Septembre 2008, 64 pages. Direction: Pascale Charpin.

A. Canteaut. Approximation of a combining function by functions of fewer variables. ESC 2008 - Echternach Symmetric Cryptography seminar , January 2008, Echternach, Luxembourg. Invited talk.

A. Canteaut. La cryptographie symétrique : comment protéger la confidentialité des données à moindre coût. Le modèle et l'algorithme, INRIA Paris-Rocquencourt, Novembre 2008.

A. Canteaut (ed.), D. Augot, C. Cid, H. Gilbert, M. Hell, T. Johansson, M. Parker, T. Pornin, B. Preneel, C. Rechberger, M. Robshaw. D.STVL.9 -- Ongoing Research Areas in Symmetric Cryptography. ECRYPT Report, July 2008, 108 pages.

A. Canteaut, P. Charpin and G. Kyureghyan. A new class of monomial bent functions, Finite Fields and Application , 14(1):221--241, January 2008.

A Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.F. Misarsky, M. Naya-Plasencia, J.R. Reinhard, C. Thuillet and M. Videau . Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, , Submission to NIST, Octobre 2008.

A Canteaut et M. Naya-Plasencia. Approximation d'une fonction à l'aide de "moins" de variables. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

A. Cid (ed.), M. Albrecht, D. Augot, A. Canteaut and R.-P. Weinmann. D.STVL.7 -- Algebraic cryptanalysis of symmetric primitives. ECRYPT Report, July 2008, 42 pages.

P. Charpin and G. Gong. Hyperbent functions, Kloosterman sums and Dickson polynomials , In Proceedings of the 2008 IEEE International Symposium on Information Theory, ISIT 08, Toronto, Canada, july 2008.

P. Charpin and G. Gong. Hyperbent functions, Kloosterman sums and Dickson polynomials , Regular paper in IEEE Trans. Inform. Theory, 54(9):4230--4238, September 2008.

P. Charpin, T. Helleseth, V. Zinoviev. Divisibility properties of Kloosterman sums over finite fields of characteristic two, In Proceedings of the 2008 IEEE International Symposium on Information Theory, ISIT 08, Toronto, Canada, july 2008.

P. Charpin, T. Helleseth, V. Zinoviev. On cosets of weight 4 of BCH(2m,8), m even, and exponential sums, SIAM Journal of Discrete Math., Vol. 23, N. 1, pp. 59-78, 2008.

P. Charpin and T. Helleseth (Eds), D. Augot, G. Leander and N. Sendrier (Ass. Eds) . Special issue in Coding and Cryptography, In memory of Hans Dobbertin, in Designs, Codes and Cryptography , Vol. 49, Issue 1--3, December 2008, Springer-Verlag.

P. Charpin and G. Kyureghyan. Cubic monomial bent functions: a subclass of M , SIAM J. of Discrete Math. , 22(2):650--665, 2008.

P. Charpin and G. Kyureghyan. On a class of permutation polynomials over GF(2n) , In Proceedings of Sequences and Their Applications, SETA 2008, Lecture Notes in Computer Science, number 5203, pages 368--376. Springer-Verlag, 2008.

M. Cluzeau and J.P. Tillich. On the code reverse engineering problem, In Proceedings of the 2008 IEEE International Symposium on Information Theory, ISIT 08, Toronto, Canada, july 2008.

D.K. Dalai. On 3-to-1 and Power APN S-boxes , In Proceedings of Sequences and Their Application, SETA 2008, Lecture Notes in Computer Science, number 5203, pages 377--389. Springer-Verlag, 2008.

F. Didier et Y. Laigle-Chapuy. Cryptanalyse de LFSRs combinés. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

C. Faure and L. Minder. Cryptanalysis of the McEliece cryptosystem over hyperelliptic codes. Proceedings of the 11th international workshop on Algebraic and Combinatorial Coding Theory,, ACCT 2008, L. Bassalygo and S. Dodunekov (Eds.), June 2008, Bulgaria.

B. Gérard. Codage et cryptanalyse linéaire. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

V. Herbert. Systèmes d'authentification basés sur les codes correcteurs d'erreurs. Rapport de Mastère, Université de Grenoble, Septembre 2008, 60 pages. Direction: Nicolas Sendrier.

C. Laudaroux and A. Röck. Synthèse des l-séquences décimées. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

C. Laudaroux and A. Röck. Parallel Generation of l-sequences. In Proceedings of Sequences and Their Applications, SETA 2008, Lecture Notes in Computer Science, number 5203, pages 299-312. Springer-Verlag, 2008.

C. Laudaroux and A. Röck. Parallel Generation of l-sequences. In Proceedings of KryptowochenendeSETA, Tabarz, Germany, June 2008.

S. Manuel. Produire une collision pour SHA-0 en une heure. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

S. Manuel and T. Peyrin. Collisions on SHA-0 in One Hour In Proceedings of Fast Software Encryption, FSE 2008, Lecture Notes in Computer Science 5086, pp. 16--35, Springer-Verlag.

M. Naya-Plasencia. Second preimage attack on Ponic. Available online, Novembre 2008.

A. Otmani, J.P. Tillich and L. Dallot. Cryptanalyse d'un cryptosystème de McEliece utilisant des codes LDPC quasi-cycliques. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

R. Overbeck and N. Sendrier. Code-based cryptography. In Post-Quantum Cryptography , Springer-Verlag, to appear.

D. Poulin, J.P. Tillich and H. Ollivier. Quantum serial turbo-codes, In Proceedings of the 2008 IEEE International Symposium on Information Theory, ISIT 08, Toronto, Canada, july 2008.

A. Röck. Entropy of the Internal State of an FCSR in Galois representation In Proceedings of Fast Software Encryption, FSE 2008, Lecture Notes in Computer Science 5086, pp. 343-362.

A. Röck. Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State In Proceedings of AFRICACRYPT 2008, Lecture Notes in Computer Science 5023, pp. 258-275.

N. Sendrier. Codage des mots de poids constant. Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde.

J.P. Tillich. Une introduction aux codes correcteurs quantiques Journées "Codage et Cryptographie" 2008, C2 Mars 2008, Carcans Gironde. Conférence invitée.

J.P. Tillich and G. Zémor. Collisions for the LPS expander graph hash function In Proceedings of , EUROCRYPT 2008, Lecture Notes in Computer Science, number 4965, pp. 254-269.

A. Zeh. A Key Equation for the Guruswami-Sudan Algorithm. Rapport de Mastère, Télécom Paris, Février 2008. Direction: Daniel Augot.


on In Proceedings of , EUROCRYPT 2008, Lecture Notes in Computer Science, number 4965, pp. 254-269.

A. Zeh. A Key Equation for the Guruswami-Sudan Algorithm. Rapport de Mastère, Télécom Paris, Février 2008. Direction: Daniel Augot.


. A Key Equation for the Guruswami-Sudan Algorithm. Rapport de Mastère, Télécom Paris, Février 2008. Direction: Daniel Augot.


People

Head of project-team

  • Anne Canteaut
  • Vice-leader

  • Nicolas Sendrier
  • Administrative assistant

  • Christelle Guiziou
  • Research scientists

  • André Chailloux
  • Pascale Charpin
  • Gaëtan Leurent
  • Anthony Leverrier
  • María Naya-Plasencia
  • Jean-Pierre Tillich
  • Other researchers

  • Christina Boura
  • Post-doc researchers

  • Léo Perrin
  • Ph.D. students

  • Xavier Bonnetain
  • Rémi Bricout
  • Kevin Carrier
  • Rodolfo Canto Torres
  • Kaushik Chakraborty
  • Thomas Debris
  • Sébastien Duval
  • Shouvik Ghorai
  • Antoine Grospellier
  • Adrien Hauteville
  • Matthieu Lequesne
  • Vivien Londe
  • Andrea Olivo
  • Yann Rotella
  • André Schrottenloher
  • Ferdinand Sibleyras
  • Valentin Vasseur
  • External collaborators

    Former members