Publications

2014+ (all publications are available in hal after 2014)

2009

C. Aguilar, P. Gaborit, F. Laguillaumie et A. Otmani. Amélioration de la probabilité de tricher de 2/3 à 1/2 pour le schéma d'authentification de Stern. Journées "Codage et Cryptographie" 2009, C2 Octobre 2009, Fréjus, Var.

D. Augot, M. Bardet and J.-C. Faugère On the decoding of cyclic codes with the newton's identities. Journal of Symbolic Computation, Vol. 44,Issue 12, pp. 1608--1625, December 2009.

I. Andriyanova and V. Rathi and J.P. Tillich. Binary Weight Distribution of Non-Binary LDPC Codes, In Proceedings of the 2009 IEEE International Symposium on Information Theory, ISIT 09, pp 65-69, Seoul, Korea, July 2009.

J.-Ph. Aumasson, E. Brier, W. Meier, M. Naya-Plasencia and T. Peyrin. Inside the hypercube. In Proceedings of ACISP 2009, Brisbane, Australia, Lecture Notes in Computer Science , to appear.

J.-P. Aumasson, Y. Laigle-Chapuy, G. Leurent, W. Meier, M. Naya-Plasencia, T. Peyrin et A. Röck. Cryptanalyse de la fonction de hachage ESSENCE. Journées "Codage et Cryptographie" 2009, C2 Octobre 2009, Fréjus, Var.

J.-Ph. Aumasson and M. Naya-Plasencia. Second preimages on MCSSHA-3. In Proceedings of Western European Workshop on Research in Cryptology - WEWoRC 2009 , Graz, Autriche, July 7-9, 2009. On SHA-3 Zoo . LNCS, Springer-Verlag.To appear.

B. Biswas and V. Herbert. Efficient root finding of polynomials over fields of characteristic 2. In Proceedings of Western European Workshop on Research in Cryptology, WEWoRC 2009, LNCS, Springer-Verlag.To appear.

C. Blondeau and B. Gerard. On the data complexity of statistical attacks against block ciphers. In proceedings of Workshop on Coding and Cryptography , WCC 09, pp. 469-488, May 10-15, 2009, Ullensvang, Norway.

C. Blondeau et B. Gérard. Complexité en données et probabilité de succès des cryptanalyses statistiques. Journées "Codage et Cryptographie" 2009, C2 Octobre 2009, Fréjus, Var.

E. Bresson, A. Canteaut, B. Chevallier-Mames , C. Clavier, T. Fuhr, A. Gouget, T. Icart, J.Misarsky, M. Naya-Plasencia, P. Paillier, T. Pornin, J. Reinhard, C. Thuillet, M. Videau. Shabal The first SHA-3 candidate conference , Leuven, Belgique, 2009.

E. Bresson, A. Canteaut, B. Chevallier-Mames , C. Clavier, T. Fuhr, A. Gouget, T. Icart, J.Misarsky, M. Naya-Plasencia, P. Paillier, T. Pornin, J. Reinhard, C. Thuillet, M. Videau. Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers Cryptology ePrint Archive, , Report 2009/199.

A. Canteaut. Shabal, a submission to NIST for their cryptographic hash algorithm competition , Fundamentals of Communications and Networking - INRIA - Bell Labs Workshop II , Rocquencourt, France, Octobre 2009.

A. Canteaut. La cryptographie symétrique , Journées Nationales de l'Association des Professeurs de Mathématiques de l'enseignement public, Rouen, France, Octobre 2009.

A. Canteaut. La Revanche de la Cryptographie Symétrique , Exposé au lycée Faidherbe, Lille , Février 2009.

A. Canteaut and M. Naya-Plasencia. Structural weaknesses of differentially uniform mappings, Finite Fields and Applications - Fq9, July 13-17 2009, Dublin, Ireland.

A. Canteaut and M. Naya-Plasencia. Computing the bias of parity-check relations, In Proceedings of the 2009 IEEE International Symposium on Information Theory, ISIT 09, pp. 290-94, Seoul, Korea, July 2009.

A. Canteaut and M. Naya-Plasencia. Internal collision attack on Maraca, Dagstuhl Seminar Proceedings 09031, Schloss Dagstuhl, Germany, January 2009. Invited talk.

C. Chabot. Reconstruction of families of codes, application to cyclic codes. In proceedings of Workshop on Coding and Cryptography , WCC 09, pp. 311-325, May 10-15, 2009, Ullensvang, Norway.

C. Chabot. Reconnaissance de codes, structure des codes quasi-cycliques . Thèse de doctorat, Université de Limoges, 24 Septembre 2009.

P. Charpin, T. Helleseth, V. Zinoviev. Divisibility properties of classical binary Kloosterman sums, Discrete Mathematics, 309 (2009) 3975-3984.

P. Charpin and G. Kyureghyan. On a class of permutation polynomials, Finite Fields and Applications - Fq9, July 13-17 2009, Dublin, Ireland.

P. Charpin and G. Kyureghyan. When does G(x) + a Tr(H(x)) permute GF(p^n) ?, Finite Fields and Their Applications , n. 5, 15(2009), pp. 615-632

M. Cluzeau and M. Finiasz. Recovering a Code's Length and Synchronization from a Noisy Intercepted Bitstream, In Proceedings of the 2009 IEEE International Symposium on Information Theory, ISIT 09, pp 2737-41, Seoul, Korea, July 2009.

M. Cluzeau and M. Finiasz. Reconstruction of Punctured Convolutional Codes, In Proceedings of the 2009 IEEE Information Theory Workshop, ITW 09,Taormina, Italy, Octobre 2009.

M. Cote and N. Sendrier. Reconstruction of Convolutional Codes from Noisy Observation, In Proceedings of the 2009 IEEE International Symposium on Information Theory, ISIT 09, pp. 546-550, Seoul, Korea, July 2009.

X. Dahan and J.P. Tillich. Ramanujan graphs of larger girth, In Proceedings of The Joint Conference of ASCM2009 and MACIS2009, December 2009, 5 pages.

F. Didier and Y. Laigle-Chapuy. Attacking the combination generator, Research-report 2009.

C. Faure. Etude de systèmes cryptographiques construits a l'aide de codes correcteurs, en métrique de Hamming et en métrique rang . Thèse de doctorat, École Polytechnique, 17 Mars 2009.

M. Finiasz and N. Sendrier. Security Bounds for the Design of Code-based Cryptosystems, Advances in Cryptology - ASIACRYPT 2009, LNCS 5912, pp. 88-105, Springer.

S. Gangopadhyay and S. Sarkar . On the second order nonlinearity of a cubic Maiorana-McFarland bent function, Finite Fields and Applications - Fq9, July 13-17 2009, Dublin, Ireland.

Y. Guo et S. Jacob. Confidentialité et intégrité des grandes bases de données. Journées "Codage et Cryptographie" 2009, C2 Octobre 2009, Fréjus, Var.

B. Gerard and J.P. Tillich. On Linear Cryptanalysis with Many Linear Approximations. In proceedings of Twelfth IMA International Conference on Coding and Cryptography , Cirencester (UK), December 2009, LNCS 5921, pp.112-132, Springer.

V. Herbert. Recherche efficace de racines de polynômes dans les corps de caractéristique 2. Journées "Codage et Cryptographie" 2009, C2 Octobre 2009, Fréjus, Var.

Y. Laigle-Chapuy. Polynômes de permutation et applications en cryptographie. Cryptanalyse des registres filtrés. Thèse de doctorat, Université Paris 6, 19 Juin 2009.

C. Lauradoux and A. Roeck. Parallel Generation of l-Sequences, Dagstuhl Seminar Proceedings 09031, Schloss Dagstuhl, Germany, January 2009. Invited talk.

K. Matusiewicz, M. Naya-Plasencia, I. Nikolic, Y. Sasaki and M. Schlaffer. Rebound Attack on the full LANE Compression Function, Advances in Cryptology - ASIACRYPT 2009, LNCS 5912, pp. 106-125, Springer.

S. Manuel. Classification and generation of disturbance vectors for collision attacks against SHA-1. In proceedings of Workshop on Coding and Cryptography , WCC 09, pp. 224-233, May 10-15, 2009, Ullensvang, Norway.

S. Manuel. Attaques par Collision contre SHA-1. Journées "Codage et Cryptographie" 2009, C2 Octobre 2009, Fréjus, Var.

A. Marin. Borne inférieure sur la capacité d'un canal quantique. Mastère Cryptologie et Sécurité Informatique de l'Université de Bordeaux , Septembre 2009. Direction: J.-P. Tillich.

D. Maurice. Borne supérieure sur la capacité de correction des codes stabilisateurs. Mastère Parisien de Recherche en Informatique, Aout 2009. Direction: J.-P. Tillich.

M. Naya-Plasencia. Chiffrements à flot et fonctions de hachage: conception et cryptanalyse. Thèse de doctorat, Université Paris 6, 16 Novembre 2009.

M. Naya-Plasencia, A. Roeck, J.P. Aumasson, Y. Laigle-Chapuy, G. Leurent, W. Meier and T. Peyrin. Cryptanalysis of ESSENCE , On SHA-3 Zoo .

C. Petit, J.-J. Quisquater, J.-P. Tillich and G. Zémor. Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security, CT-RSA 2009, San Francisco, USA, LNCS 5473, pp. 182--194, Springer.

A. Röck. Quantifying studies of (pseudo)random number generation for cryptography . Thèse de doctorat, École Polytechnique, 18 Mai 2009.

A. Röck, V. Strubely et M. Videau. Étude du générateur d'aléa du noyau Linux. Journées "Codage et Cryptographie" 2009, C2 Octobre 2009, Fréjus, Var.

B. Roy and N. Sendrier (Eds). Progress in Cryptology - INDOCRYPT 2009. LNCS 5922, Decembre 2009 (New-Delhi, India).

S. Sarkar . On the Symmetric Negabent Boolean Functions, Progress in Cryptology - INDOCRYPT 2009, December 2009, LNCS 5922, pp. 136-143, Springer.

N. Sendrier. Code based cryptology . Academy Contact Forum Coding theory and cryptography III, Brussels, Belgium, September 2009, Invited talk.

N. Sendrier. A Fly over Code-Based Cryptography. QuantumComm, Vico Equense, Italy, October 2009, Invited talk.

J.P. Tillich. Contributions aux codes correcteurs d'erreurs, à la cryptologie et à la théorie des graphes . Habilitation à diriger les recherches, Université Paris 6, Mai 2009.

J.P. Tillich. Quantum tornado codes. In proceedings of Workshop on Quantum Information Processing - QIP 2009 pp. 12-13, Janvier 2009, Santa Fe, USA.

J.P. Tillich and G. Zémor. Quantum LDPC Codes with Positive Rate and Minimum Distance Proportional to n1/2, In Proceedings of the 2009 IEEE International Symposium on Information Theory, ISIT 09, 799-803, Seoul, Korea, July 2009.

A. Zeh. A Feng-Tzeng Approach for the Guruswami-Sudan Algorithm IEEE Information Theory Winter School. p. 77, Loen, Norway, April 2009.

A. Zeh, C. Gentner and M. Bossert . Efficient List-Decoding of Reed-Solomon codes with the FundamentalIterative Algorithm, In Proceedings of the 2009 Information Theory Workshop ITW 09, Taormina, Italy, 2009.


People

Head of project-team

  • Anne Canteaut
  • Vice-leader

  • Nicolas Sendrier
  • Administrative assistant

  • Christelle Guiziou
  • Research scientists

  • André Chailloux
  • Pascale Charpin
  • Gaëtan Leurent
  • Anthony Leverrier
  • María Naya-Plasencia
  • Jean-Pierre Tillich
  • Other researchers

  • Christina Boura
  • Post-doc researchers

  • Léo Perrin
  • Ph.D. students

  • Xavier Bonnetain
  • Rémi Bricout
  • Kevin Carrier
  • Rodolfo Canto Torres
  • Kaushik Chakraborty
  • Thomas Debris
  • Sébastien Duval
  • Shouvik Ghorai
  • Antoine Grospellier
  • Adrien Hauteville
  • Matthieu Lequesne
  • Vivien Londe
  • Andrea Olivo
  • Yann Rotella
  • André Schrottenloher
  • Ferdinand Sibleyras
  • Valentin Vasseur
  • External collaborators

    Former members