Publications

Dernière mise à jour : Mars 2014 (Pascale Charpin).

2012

I. Andriyanova and J.-P. Tillich. Designing a Good Low-Rate Sparse-Graph Code. IEEE Transactions on Communications, vol. 60, N. 11, pp. 3181-3190, 2012.

I. Andriyanova, D. Maurice and J.-P. Tillich. Quantum LDPC codes obtained by non-binary constructions. In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT"12, Boston, USA, July 2012.

I. Andriyanova, D. Maurice and J.-P. Tillich. Spatially coupled quantum LDPC codes. In Proc. of Inf. Theor. Workshop ITW2012, Lausanne, Switzerland, pp. 327-331, 2012.

T. Baignères, A. Canteaut, Y. Seurin, T. Fuhr, M. Finiasz, and M. Minier . Security models. Delivrable 1 (Subtask 2.1) - Rapport pour le projet ANR BLOC (Conception et annalyse de chiffrements pas blocs) du programme Ingénierie Numérique & Sécurité. Novembre 2012.

M. Bellard. Reconstruction du "mapping" en présence d'un codage convolutif. Journées "Codage et Cryptographie" 2012, C2 Octobre 2012, Dinard, Bretagne.

M. Bellard and N. Sendrier. Reconstruction of Constellation Labeling with Convolutional Coded Data . In Proceedings of the 2012 IEEE International Symposium on Information Theory and its Applications , pp. 653-657, ISITA"2012, Honolulu, Hawaii, USA, October 2012.

J. Borghoff, A. Canteaut, T. Güneysu, E. Bilge Kavun, M. Knezevic, L.R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, P. Rombouts, S.S. Thomsen and T. Yalçin. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications. In Advances in Cryptology - ASIACRYPT 2012 , LNCS. To appear.
A full version in Cryptology ePrint Archive, Report 2012/529.

C. Boura. Intermediate results on physical analysis of phase 2 candidates. Livrable D2.1 - Rapport pour le projet ANR Saphir 2,
Mars 2012.

C. Boura. Sur la propagation de relations lin´aires au travers d'une S-box. Journées "Codage et Cryptographie" 2012, C2 Octobre 2012, Dinard, Bretagne.

C. Boura. Analyse de fonctions de hachage cryptographiques. Thèse de doctorat, Université Paris VI, Décembre 2012.

C. Boura and A. Canteaut. On the Influence of the Algebraic Degree of F -1 on the Algebraic Degree of G ο F .
IEEE Trans. Inform. Theory, In Press.

C. Boura and A. Canteaut. On the Algebraic Degree of some SHA-3 Candidates . In Proceedings of the Third SHA-3 Candidate Conference, Washington DC, USA, March 2012.

C. Boura, S. Lévêque and D. Vigilant. Side-channel Analysis of Grøstl and Skein. In Proceedings of the 2nd International Workshop on Trustworthy Embedded Devices, TrustED 2012, San Francisco, USA, May 2012.

A. Canteaut (ed.). Fast Software Encryption - FSE 2012, LNCS 7549, Springer 2012.

A. Canteaut and M. Naya-Plasencia. Parity-check relations on combination generators. IEEE Trans. Inform. Theory, vol. 58, n. 6, pp 3900-3911, 2012.

A. Canteaut and M. Naya-Plasencia. Correlation Attacks on the Combination Generator. Cryptography and Communications , vol. 4, number 3-4, pp 147-171, 2012.

A. Canteaut, T. Fuhr, M. Naya-Plasencia, P. Paillier, J.-R. Reinhard and M. Videau. A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions, Cryptology ePrint Archive, Report 2012/363, 2012.

T. Fritz, A. Leverrier and A. Belén Sainz. A Combinatorial Approach to Nonlocality and Contextuality , arXiv:1212:4084, 2012.

V. Gauthier, A. Otmani J.-P. Tillich. A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes. IACR Cryptology ePrint Archive, 168, 2012.

V. Gauthier, A. Otmani J.-P. Tillich. A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes. CoRR, abs/1204.6459, 2012.

V. Grosso, C. Boura, B. Gérard and F.-X. Standaert. A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks (with Application to Low Cost Ciphers LED and Piccolo) . In Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux , Boekelo, The Netherlands,May 2012.

S. Jacob. Protection cryptographique des bases de données : Conception et cryptanalyse . Thèse de doctorat, Université Paris VI, Janvier 2012.

G. M. Kyureghyan. Special mappings of finite fields. In Finite Fields and Their Applications. Character Sums and Polynomials , Radon Series on Computational and Applied Mathematics, Degruyter, to appear.
and Invited talk at RICAM-Workshop on Finite Fields and Their Applications, plenary session, September 2nd-September 7th, 2012, Strobl, Austria.

G. M. Kyureghyan and F. Özbudak and A. Pott. Some planar maps and related function fields . Contemporary Mathematics: "Arithmetic, Geometry, Cryptography and Coding Theory", 574 (2012) pp.87-114.

G. M. Kyureghyan and F. Özbudak. Planarity of products of linearized polynomials . Finite Fields and Applications,
18(6) 2012, pp. 1076-1088.

G. M. Kyureghyan and V. Suder. On inverses of APN exponents . In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT"12, Boston, USA, July 2012.

C. Koukouvinos and D. E. Simos. Encryption Schemes from Williamson Matrices ,
Journal of Information Assurance and Security, 7 (2012), 252-258.

G. Landais. Implementation de CFS. Journées "Codage et Cryptographie" 2012, C2 Octobre 2012, Dinard, Bretagne.

G. Landais. CFS Software Implementation. CBC 2012, May 2012, DTU, Lyngby, Denmark.

G. Landais and N.Sendrier. Implementing CFS. In Progress in Cryptology - INDOCRYPT 2012 , pp. 474-488, LNCS, Springer-Verlag.

D. Maurice. Codes LDPC quantiques non binaires. Journées "Codage et Cryptographie" 2012, C2 Octobre 2012, Dinard, Bretagne.

R. Misoczki. Nouvelles variantes de McEliece à partir de codes de parité à densiét modéré. Journées "Codage et Cryptographie" 2012, C2 Octobre 2012, Dinard, Bretagne.

R. Misoczki. Improved LDPC and QC-LDPC McEliece variants. CBC 2012, May 2012, DTU, Lyngby, Denmark.

R. Misoczki, J.-P. Tillich,N. Sendrier and P.S.L.M. Barreto. MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes. IACR Cryptology ePrint Archive, 409, 2012.

C. Pelle. Chiffrement par blocs à bas coût , Rapport de stage (master), Septembre 2012. Co-direction: A. Canteaut et M. Naya-Plasencia.

S. Pironio, L. Masanes, A. Leverrier and A. Acin. Device-independent quantum key distribution secure against adversaries with no long-term quantum memory, arXiv:1211.1402, 2012.

J. Roué. Super Boites-S , Rapport de stage (master), Juillet 2012. Co-direction: A. Canteaut et P. Charpin.

N.Sendrier. Code-based Cryptography: Theory and Practice. ARES, MoCrySEn 2012 , Prague, Czech Republic, September 2012.
Invited talk.

N.Sendrier. Code-based Cryptography. Post-Quantum Cryptography and Quantum Algorithms , Lorentz Center, Leiden, The Netherlands, November 2012. Invited talk.

D.E. Simos. Families of Block Ciphers from Combinatorial Designs . In Cryptography and its Applications in the Armed Forces (CAIAF2012) , Hellenic Military Academy ``Evelpidon'', Vari, Greece, April 2012. Invited talk.

D.E. Simos (ed.). Workshop on Modern Cryptography and Security Engineering - MocrySen 2012, August 20-24, Prague, Czech Republic, 2012. IEEE CPS.

D.E. Simos. Quelle est la difficulté de l'équivalence de codes sur GF(q). Journées "Codage et Cryptographie" 2012, C2 Octobre 2012, Dinard, Bretagne.

D.E. Simos. The Support Splitting Algorithm and its application to Code-based Cryptography. CBC 2012, May 2012, DTU, Lyngby, Denmark.

V. Suder. Sur les inverses d'exposants APN. Journées "Codage et Cryptographie" 2012, C2 Octobre 2012, Dinard, Bretagne.