Members
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 5M. Bardet, J.-C. Faugère, B. Salvy.
    On the complexity of the F5 Gröbner basis algorithm, in: Journal of Symbolic Computation, September 2014, pp. 1-24. [ DOI : 10.1016/j.jsc.2014.09.025 ]
    https://hal.inria.fr/hal-01064519
  • 6A. Bostan, K. Raschel, B. Salvy.
    Non-D-finite excursions in the quarter plane, in: Journal of Combinatorial Theory, Series A, January 2014, vol. 121, pp. 45-63. [ DOI : 10.1016/j.jcta.2013.09.005 ]
    https://hal.archives-ouvertes.fr/hal-00697386
  • 7S. Graillat, V. Lefèvre, J.-M. Muller.
    On the maximum relative error when computing integer powers by iterated multiplications in floating-point arithmetic, in: Numerical Algorithms, 2015, 15 p, forthcoming.
    https://hal-ens-lyon.archives-ouvertes.fr/ensl-00945033
  • 8A. Langlois, D. Stehlé.
    Worst-case to average-case reductions for module lattices, in: Designs, Codes and Cryptography, 2014, 35 p.
    https://hal.archives-ouvertes.fr/hal-01091291
  • 9C. Ling, L. Luzzi, J.-C. Belfiore, D. Stehlé.
    Semantically Secure Lattice Codes for the Gaussian Wiretap Channel, in: Information Theory, IEEE Transactions on, 2014, 18 p.
    https://hal.archives-ouvertes.fr/hal-01091295
  • 10É. Martin-Dorel, G. Hanrot, M. Mayero, L. Théry.
    Formally verified certificate checkers for hardest-to-round computation, in: Journal of Automated Reasoning, 2015, vol. 54, no 1, pp. 1-29. [ DOI : 10.1007/s10817-014-9312-2 ]
    https://hal.inria.fr/hal-00919498
  • 11J.-M. Muller.
    On the error of Computing ab + cd using Cornea, Harrison and Tang's method, in: ACM Transactions on Mathematical Software, January 2015, vol. 41, no 2, 8 p.
    https://hal-ens-lyon.archives-ouvertes.fr/ensl-00862910
  • 12N. Revol, P. Théveny.
    Numerical Reproducibility and Parallel Computations: Issues for Interval Algorithms, in: IEEE Transactions on Computers, 2014, vol. 63, no 8, pp. 1915-1924, forthcoming. [ DOI : 10.1109/TC.2014.2322593 ]
    https://hal.inria.fr/hal-00916931
  • 13S. M. Rump, C.-P. Jeannerod.
    Improved backward error bounds for LU and Cholesky factorizations, in: SIAM Journal on Matrix Analysis and Applications, 2014, vol. 35, no 2, pp. 684-698. [ DOI : 10.1137/130927231 ]
    https://hal.inria.fr/hal-00841361
  • 14D. Wang, J.-M. Muller, N. Brisebarre, M. Ercegovac.
    (M, p, k)-Friendly Points: A Table-based Method to Evaluate Trigonometric Function, in: IEEE Transactions on Circuits and Systems. Part II, Express Briefs, September 2014, vol. 61, no 9, pp. 711-715. [ DOI : 10.1109/TCSII.2014.2331094 ]
    https://hal-ens-lyon.archives-ouvertes.fr/ensl-01001673

Articles in National Peer-Reviewed Journals

  • 15F. Jézéquel, P. Langlois, N. Revol.
    First steps towards more numerical reproducibility, in: ESAIM: Proceedings, September 2014, vol. 45, pp. 229-238. [ DOI : 10.1051/proc/201445023 ]
    http://hal-lirmm.ccsd.cnrs.fr/lirmm-00872562

International Conferences with Proceedings

  • 16B. Boyer, J.-G. Dumas, P. Giorgi, C. Pernet, B. D. Saunders.
    Elements of Design for Containers and Solutions in the LinBox Library, in: 4th International Congress on Mathematical Software, Seoul, South Korea, Springer, August 2014, vol. 8592, 8 pages.
    https://hal.archives-ouvertes.fr/hal-01015138
  • 17J. Devigne, E. Guerrini, F. Laguillaumie.
    Proxy Re-Encryption Scheme Supporting a Selection of Delegatees, in: 7th International Conference on Cryptology AFRICACRYPT 2014, Marrakech, Morocco, LNCS, Springer, May 2014.
    https://hal.inria.fr/hal-00982549
  • 18J.-G. Dumas, T. Gautier, C. Pernet, Z. Sultan.
    Parallel computation of echelon forms, in: EuroPar-2014, Porto, Portugal, August 2014, 12 p.
    https://hal.archives-ouvertes.fr/hal-00947013
  • 19M. Joldes, J.-M. Muller, V. Popescu.
    On the computation of the reciprocal of floating point expansions using an adapted Newton-Raphson iteration, in: 25th IEEE International Conference on Application-specific Systems, Architectures and Processors, ASAP, Zurich, Switzerland, June 2014, 8 p, forthcoming.
    https://hal.archives-ouvertes.fr/hal-00957379
  • 20E. L. Kaltofen, C. Pernet.
    Sparse Polynomial Interpolation Codes and their decoding beyond half the minimal distance, in: ISSAC - 39th International Symposium on Symbolic and Algebraic Computation, Kobe, Japan, July 2014, In Proceedings of the International Symposium on Symbolic and Algebraic Computation 2014 (ISSAC'14). [ DOI : 10.1145/2608628.2608660 ]
    https://hal.inria.fr/hal-01068308
  • 21A. Langlois, S. Ling, K. Nguyen, H. Wang.
    Lattice-based Group Signature Scheme with Verifier-local Revocation, in: Public-Key Cryptography - PKC2014, Buenos Aires, Argentina, H. Krawczyk (editor), Lecture Notes in Computer Science, Springer, March 2014, vol. 8383, pp. 345-361. [ DOI : 10.1007/978-3-642-54631-0 ]
    https://hal.archives-ouvertes.fr/hal-00983084
  • 22A. Langlois, D. Stehlé, R. Steinfeld.
    GGHLite: More Efficient Multilinear Maps from Ideal Lattices, in: EUROCRYPT 2014, Copenhague, Denmark, May 2014.
    https://hal.archives-ouvertes.fr/hal-00983179
  • 23R. Lashermes, M. Paindavoine, N. El Mrabet, J. Fournier, L. Goubin.
    Practical validation of several fault attacks against the Miller algorithm, in: FDTC - Workshop on Fault Diagnosis and Tolerance in Cryptography, Busan, South Korea, September 2014. [ DOI : 10.1109/FDTC.2014.21 ]
    https://hal.archives-ouvertes.fr/hal-01100813
  • 24B. Libert, M. Joye, M. Yung.
    Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold Signatures with Short Shares, in: ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, S. Dolev (editor), ACM, July 2014.
    https://hal.inria.fr/hal-00983149
  • 25B. Libert, M. Joye, M. Yung, T. Peters.
    Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security, in: Asiacrypt 2014, Kaohsiung, Taiwan, Advances in Cryptology - Lecture Notes in Computer Science, Springer, December 2014, vol. 2, no 8874, pp. 1 - 21. [ DOI : 10.1007/978-3-662-45608-8_1 ]
    https://hal.inria.fr/hal-01088108
  • 26B. Libert, T. Peters, M. Joye, M. Yung.
    Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, in: Eurocrypt 2014, Copenhagen, Denmark, P. Nguyen, E. Oswald (editors), May 2014.
    https://hal.inria.fr/hal-00983147
  • 27S. Ling, D. H. Phan, D. Stehlé, R. Steinfeld.
    Hardness of k-LWE and Applications in Traitor Tracing, in: CRYPTO, Santa Barbara, CA, United States, 2014.
    https://hal.archives-ouvertes.fr/hal-01091300
  • 28N. Revol.
    Latest Developments on the IEEE 1788 Effort for the Standardization of Interval Arithmetic, in: ICVRAM & ISUMA - Second International Conference on Vulnerability and Risk Analysis and Management & Sixth International Symposium on Uncertainty Modelling and Analysis, Liverpool, United Kingdom, ASCE: American Society of Civil Engineers, July 2014, pp. 1-10, (Standardization effort supported by the Inria D2T.).
    https://hal.inria.fr/hal-00920662
  • 29R. Serra, D. Arzelier, M. Joldes, J.-B. Lasserre, A. Rondepierre, B. Salvy.
    A New Method to Compute the Probability of Collision for Short-term Space Encounters, in: AIAA/AAS Astrodynamics Specialist Conference, San Diego, United States, August 2014. [ DOI : 10.2514/6.2014-4366 ]
    https://hal.inria.fr/hal-01092420
  • 30D. Stehlé, G. Villard, I. Morel, G. Sarushi.
    LLL reducing with the most significant bits, in: ISSAC'14 - International symposium on Symbolic and algebraic computation, Kobe, Japan, ACM proceedings, July 2014. [ DOI : 10.1145/2608628.2608645 ]
    https://hal-ens-lyon.archives-ouvertes.fr/ensl-00993445

Scientific Books (or Scientific Book chapters)

  • 31F. De Dinechin, J.-M. Muller.
    Evaluating Elementary Functions, in: Princeton Companion to Applied Mathematics, N. Higham (editor), Princeton University Press, 2014, 2 p.
    https://hal.inria.fr/ensl-00989001
  • 32A. Gil, J.-M. Muller, J. Segura.
    Edition d'un numéro spécial "Numerical Software: Design, Analysis and Verification", Elsevier, September 2014, vol. 90 part A, 1 p.
    https://hal-ens-lyon.archives-ouvertes.fr/ensl-01070771
  • 33F. Laguillaumie, A. Langlois, D. Stehlé.
    Chiffrement avancé à partir du problème Learning With Errors, in: Informatique Mathématique : une photographie en 2014, S. Peyronnet (editor), Presses universitaires de Perpignan, March 2014.
    https://hal.inria.fr/hal-00984055

Internal Reports

  • 34C.-P. Jeannerod, S. M. Rump.
    On relative errors of floating-point operations: optimal bounds and applications, January 2014, 15 p.
    https://hal.inria.fr/hal-00934443
  • 35M. Joldes, O. Marty, J.-M. Muller, V. Popescu.
    Arithmetic algorithms for extended precision using floating-point expansions, LIP - ENS Lyon ; LAAS-CNRS ; ENS Cachan, January 2015, Rapport LAAS n° 15016.
    https://hal.archives-ouvertes.fr/hal-01111551

Scientific Popularization

Other Publications