Personnel
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1K. Bhargavan, G. Leurent.
    On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
    https://hal.inria.fr/hal-01404208
  • 2A. Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, J.-R. Reinhard, C. Thuillet, M. Videau.
    Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, October 2008, Submission to NIST.
  • 3A. Canteaut, M. Naya-Plasencia, B. Vayssière.
    Sieve-in-the-Middle: Improved MITM Attacks, in: Advances in Cryptology - CRYPTO 2013, Part I, Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 222–240.
  • 4A. Canteaut, J. Roué.
    On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
    https://hal.inria.fr/hal-01104051
  • 5K. Chakraborty, A. Chailloux, A. Leverrier.
    Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
    https://hal.inria.fr/hal-01237241
  • 6P. Charpin, G. M. Kyureghyan, V. Suder.
    Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
    https://hal.archives-ouvertes.fr/hal-01068860
  • 7N. Courtois, M. Finiasz, N. Sendrier.
    How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174.
  • 8J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich.
    Algebraic Cryptanalysis of McEliece Variants with Compact Keys, in: Advances in Cryptology - EUROCRYPT 2010, LNCS, Springer, 2010, no 6110, pp. 279-298.
    http://dx.doi.org/10.1007/978-3-642-13190-5_14
  • 9M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
    Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
    https://hal.inria.fr/hal-01404196
  • 10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.
    MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
    https://hal.inria.fr/hal-00870929
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 11K. Chakraborty.
    Cryptography with Spacetime Constraints, Université Pierre et Marie Curie - Paris VI, October 2017.
    https://hal.inria.fr/tel-01637818
  • 12J. Chaulet.
    Study of public key cryptosystems based on quasi-cyclic MDPC codes, Université Pierre et Marie Curie - Paris VI, March 2017.
    https://tel.archives-ouvertes.fr/tel-01599347
  • 13A. Leverrier.
    Protecting information in a quantum world: from cryptography to error correction, Université Pierre et Marie Curie - Paris VI, September 2017, Habilitation à diriger des recherches.
    https://hal.inria.fr/tel-01636624
  • 14M. Naya-Plasencia.
    Symmetric Cryptography for Long-Term Security, Université Pierre et Marie Curie - Paris VI, May 2017, Habilitation à diriger des recherches.
    https://hal.inria.fr/tel-01656036

Articles in International Peer-Reviewed Journals

  • 15C. Boura, A. Canteaut, L. R. Knudsen, G. Leander.
    Reflection ciphers, in: Designs, Codes and Cryptography, January 2017, vol. 82, no 1–2, pp. 3–25. [ DOI : 10.1007/s10623-015-0143-x ]
    https://hal.inria.fr/hal-01237135
  • 16R. Bricout, A. Chailloux.
    Recursive cheating strategies for the relativistic 𝔽Q bit commitment protocol, in: MDPI - Cryptography, August 2017, https://arxiv.org/abs/1608.03820. [ DOI : 10.3390/cryptography1020014 ]
    https://hal.inria.fr/hal-01409563
  • 17A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.
    Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: Journal of Cryptology, 2017, forthcoming.
    https://hal.inria.fr/hal-01650012
  • 18A. Canteaut, S. Duval, L. Perrin.
    A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size 24k+2, in: IEEE Transactions on Information Theory, 2017, vol. 63, no 11, pp. 7575–7591. [ DOI : 10.1109/TIT.2017.2676807 ]
    https://hal.inria.fr/hal-01589131
  • 19A. Canteaut, E. Lambooij, S. Neves, S. Rasoolzadeh, Y. Sasaki, M. Stevens.
    Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds, in: IACR Transactions on Symmetric Cryptology, May 2017, vol. 2017, no 2, pp. 203–227. [ DOI : 10.13154/tosc.v2017.i2.203-227 ]
    https://hal.inria.fr/hal-01649954
  • 20C. Carlet, P. Méaux, Y. Rotella.
    Boolean functions with restricted input and their robustness; application to the FLIP cipher, in: IACR Transactions on Symmetric Cryptology, 2017, vol. 2017, no 3, pp. 192–227. [ DOI : 10.13154/tosc.v2017.i3.192-227 ]
    https://hal.inria.fr/hal-01633506
  • 21N. Cepak, P. Charpin, E. Pasalic.
    Permutations via linear translators, in: Finite Fields and Their Applications, 2017, vol. 45, pp. 19–42, https://arxiv.org/abs/1609.09291. [ DOI : 10.1016/j.ffa.2016.11.009 ]
    https://hal.inria.fr/hal-01412487
  • 22A. Chailloux, I. Kerenidis.
    Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment, in: SIAM Journal on Computing, January 2017, vol. 46, no 5, pp. 1647–1677. [ DOI : 10.1137/15M1010853 ]
    https://hal.inria.fr/hal-01650970
  • 23P. Charpin, G. M. Kyureghyan.
    On sets determining the differential spectrum of mappings, in: International journal of information and Coding Theory, 2017, vol. 4, no 2/3, pp. 170–184, Special issue on the honor of Gerard Cohen. [ DOI : 10.1504/IJICOT.2017.083844 ]
    https://hal.inria.fr/hal-01406589
  • 24A. Couvreur, A. Otmani, J.-P. Tillich.
    Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
    https://hal.inria.fr/hal-01661935
  • 25I. Dinur, G. Leurent.
    Improved Generic Attacks Against Hash-Based MACs and HAIFA, in: Algorithmica, December 2017, vol. 79, no 4, pp. 1161–1195. [ DOI : 10.1007/s00453-016-0236-6 ]
    https://hal.inria.fr/hal-01407953
  • 26A. Leverrier.
    Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction, in: Physical Review Letters, May 2017, vol. 118, no 20, pp. 1–24, https://arxiv.org/abs/1701.03393. [ DOI : 10.1103/PhysRevLett.118.200501 ]
    https://hal.inria.fr/hal-01652082
  • 27M. Tomamichel, A. Leverrier.
    A largely self-contained and complete security proof for quantum key distribution, in: Quantum, 2017, vol. 1, 14 p, https://arxiv.org/abs/1506.08458. [ DOI : 10.22331/q-2017-07-14-14 ]
    https://hal.inria.fr/hal-01237240

Invited Conferences

  • 28C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
    Proving Resistance against Invariant Attacks: Properties of the Linear Layer , in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
    https://hal.inria.fr/hal-01649994
  • 29C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
    Proving resistance of a block cipher against invariant attacks, in: BFA 2017 - Boolean Functions and their Applications, Os, Norway, July 2017.
    https://hal.inria.fr/hal-01649990
  • 30A. Chailloux.
    A tight security reduction in the quantum random oracle model for code-based signature schemes, in: 2017 - IRIF Algocomp seminar, Paris, France, November 2017.
    https://hal.inria.fr/hal-01660701
  • 31G. Leurent, K. Bhargavan.
    On the Practical (In-)Security of 64-bit Block Ciphers, in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
    https://hal.inria.fr/hal-01105128
  • 32G. Leurent.
    Bad Symmetric Crypto in the Real World, in: Journées Nationales 2017 Pré-GDR Sécurité Informatique, Paris, France, May 2017.
    https://hal.inria.fr/hal-01652853
  • 33G. Leurent.
    Breaking Symmetric Cryptosystems Using Quantum Algorithms, in: FOQUS - ​Frontiers of Quantum Safe Cryptography, Paris, France, April 2017.
    https://hal.inria.fr/hal-01652852
  • 34A. Leverrier.
    A Gaussian de Finetti theorem and application to truncations of random Haar matrices, in: Workshop on ”Probabilistic techniques and Quantum Information Theory”, Paris, France, October 2017, pp. 1-60.
    https://hal.inria.fr/hal-01656425
  • 35A. Leverrier.
    Efficient decoding of random errors for quantum expander codes, in: Conference on ”Quantum Information Theory”, Paris, France, December 2017, pp. 1-33.
    https://hal.inria.fr/hal-01656427
  • 36A. Leverrier.
    Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction, in: TyQi 2017 - Trustworthy Quantum Information, Paris, France, June 2017.
    https://hal.inria.fr/hal-01656418
  • 37A. Leverrier.
    Theoretical challenges in continuous-variable quantum cryptography, in: QCrypt 2017 - 7th International Conference on Quantum Cryptography, Cambridge, United Kingdom, September 2017, pp. 1-26.
    https://hal.inria.fr/hal-01656419
  • 38M. Naya-Plasencia.
    New results on symmetric quantum cryptanalysis, in: Dagstuhl Seminar 17401 - Quantum Cryptanalysis, Dagstuhl, Germany, October 2017.
    https://hal.inria.fr/hal-01671913
  • 39J.-P. Tillich.
    Code based cryptography and quantum attacks, in: Dagstuhl Seminar 17401 - Quantum cryptanalysis, Dagstuhl, Germany, October 2017.
    https://hal.archives-ouvertes.fr/hal-01671921

International Conferences with Proceedings

  • 40P. S. L. M. Barreto, S. Gueron, T. Guneysu, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich.
    CAKE: Code-based Algorithm for Key Encapsulation, in: IMACC 2017 - 16th IMA International Conference on Cryptography and Coding, Oxford, United Kingdom, M. O'Neill (editor), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10655, pp. 207–226. [ DOI : 10.1007/978-3-319-71045-7_11 ]
    https://hal.inria.fr/hal-01661949
  • 41C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
    Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]
    https://hal.inria.fr/hal-01631130
  • 42A. Biryukov, L. Perrin.
    Symmetrically and Asymmetrically Hard Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10626, pp. 417–445. [ DOI : 10.1007/978-3-319-70700-6_15 ]
    https://hal.inria.fr/hal-01650044
  • 43O. Blazy, P. Gaborit, J. Schrek, N. Sendrier.
    A code-based blind signature, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 2718–2722. [ DOI : 10.1109/ISIT.2017.8007023 ]
    https://hal.archives-ouvertes.fr/hal-01610410
  • 44X. Bonnetain.
    Quantum Key-Recovery on full AEZ, in: SAC 2017 - Selected Areas in Cryptography, Ottawa, Canada, August 2017.
    https://hal.inria.fr/hal-01650026
  • 45C. Boura, A. Canteaut, J. Jean, V. Suder.
    Two Notions of Differential Equivalence on Sboxes, in: WCC 2017 - Workshop on Coding and Cryptography, Saint Petersburg, Russia, September 2017.
    https://hal.inria.fr/hal-01650010
  • 46A. Chailloux, A. Leverrier.
    Relativistic (or 2-Prover 1-Round) Zero-Knowledge Protocol for NP Secure Against Quantum Adversaries, in: Eurocrypt 2017 - Advances in Cryptology, Paris, France, J.-S. Coron, J. B. Nielsen (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2017, vol. 10212, pp. 369–396. [ DOI : 10.1007/978-3-319-56617-7_13 ]
    https://hal.inria.fr/hal-01650985
  • 47A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.
    An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]
    https://hal.inria.fr/hal-01651007
  • 48T. Debris-Alazard, J.-P. Tillich.
    Statistical Decoding, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 1789–1802. [ DOI : 10.1109/ISIT.2017.8006839 ]
    https://hal.inria.fr/hal-01661749
  • 49P. Gaborit, A. Hauteville, D. H. Phan, J.-P. Tillich.
    Identity-based Encryption from Codes with Rank Metric, in: Crypto 2017 - Advances in Cryptology, Santa-Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10403, pp. 194–224. [ DOI : 10.1007/978-3-319-63697-9_7 ]
    https://hal.inria.fr/hal-01589463
  • 50G. Kachigar, J.-P. Tillich.
    Quantum Information Set Decoding Algorithms, in: PQCrypto 2017 - The Eighth International Conference on Post-Quantum Cryptography, Utrecht, Netherlands, T. Lange, T. Takagi (editors), LNCS - Lecture Notes in Computer Science, Springer, June 2017, vol. 10346, pp. 69-89. [ DOI : 10.1007/978-3-319-59879-6_5 ]
    https://hal.inria.fr/hal-01661905
  • 51L. Khati, N. Mouha, D. Vergnaud.
    Full Disk Encryption: Bridging Theory and Practice, in: CT-RSA 2017 - RSA Conference Cryptographers' Track, San Francisco, United States, H. Handschuh (editor), Lecture Notes in Computer Science, Springer, February 2017, vol. 10159, pp. 241–257. [ DOI : 10.1007/978-3-319-52153-4_14 ]
    https://hal.inria.fr/hal-01403418
  • 52B. Lac, A. Canteaut, J. J. A. Fournier, R. Sirdey.
    DFA on LS-Designs with a Practical Implementation on SCREAM, in: COSADE 2017 - Constructive Side-Channel Analysis and Secure Design, Paris, France, S. Guilley (editor), LNCS - Lecture Notes in Computer Science, Springer, April 2017, vol. 10348, pp. 223–247. [ DOI : 10.1007/978-3-319-64647-3_14 ]
    https://hal.inria.fr/hal-01649974
  • 53I. Marquez-Corbella, J.-P. Tillich.
    Attaining Capacity with iterated (U|U+V) codes based on AG codes and Koetter-Vardy soft decoding, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 6–10. [ DOI : 10.1109/ISIT.2017.8006479 ]
    https://hal.inria.fr/hal-01661977

Conferences without Proceedings

  • 54C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
    Attaques par invariant : comment s'en protéger?, in: Journées codage et cryptographie 2017, La Bresse, France, April 2017, 1 p.
    https://hal.inria.fr/hal-01633519
  • 55A. Canteaut, S. Duval, L. Perrin.
    On a generalisation of Dillon’s APN permutation, in: Fq13 - Finite Fields and Applications, Gaeta, Italy, June 2017.
    https://hal.inria.fr/hal-01650001
  • 56A. Chailloux.
    A tight security reduction in the quantum random oracle model for code-based signature schemes, in: Code based crypto seminar, Paris, France, October 2017, pp. 1-22.
    https://hal.inria.fr/hal-01660693
  • 57O. Fawzi, A. Grospellier, A. Leverrier.
    Efficient decoding of random errors for quantum expander codes, in: QIP 2018 - 21th Annual Conference on Quantum Information Processing, Delft, Netherlands, QuTech, January 2018, pp. 1-31, https://arxiv.org/abs/1711.08351 - 31 pages.
    https://hal.archives-ouvertes.fr/hal-01654670
  • 58A. Grospellier, A. Leverrier, O. Fawzi.
    Efficient decoding of random errors for quantum expander codes, in: Journées Informatique Quantique 2017, Bordeaux, France, November 2017.
    https://hal.archives-ouvertes.fr/hal-01671491
  • 59A. Grospellier, A. Leverrier, O. Fawzi.
    Quantum expander codes, in: Journées codage et cryptographie 2017, La Bresse, France, April 2017.
    https://hal.archives-ouvertes.fr/hal-01671485
  • 60G. Leurent, M. Kaplan, A. Leverrier, M. Naya-Plasencia.
    Quantum differential and linear cryptanalysis, in: FSE 2017 - Fast Software Encryption, Tokyo, Japan, March 2017.
    https://hal.inria.fr/hal-01652807
  • 61A. Leverrier.
    SU(p,q) coherent states and Gaussian de Finetti theorems, in: QIP 2017 - 20th Annual Conference on Quantum Information Processing, Seattle, United States, January 2017, pp. 1-24.
    https://hal.inria.fr/hal-01656414
  • 62V. Londe.
    Golden codes: 4D hyperbolic regular quantum codes, in: 8th colloquium of the GDR IQFA - Ingénierie Quantique, des Aspects Fondamentaux aux Applications, Nice, France, November 2017.
    https://hal.inria.fr/hal-01671528
  • 63V. Londe.
    Homological quantum error correcting codes and real projective space, in: Journées Codage et Cryptographie 2017, La Bresse, France, April 2017.
    https://hal.inria.fr/hal-01671444
  • 64V. Londe.
    4D hyperbolic regular quantum codes, in: Journées Informatique Quantique 2017, Bordeaux, France, November 2017.
    https://hal.inria.fr/hal-01671456
  • 65N. Sendrier.
    Quantum Safe Cryptography from Codes: Present and Future, in: 16th IMA International Conference on Cryptography and Coding, Oxford, United Kingdom, December 2017.
    https://hal.archives-ouvertes.fr/hal-01671452

Scientific Popularization

  • 66A. Chailloux.
    Cryptographie Quantique en théorie, in: 2017 - 9ème Journée Mathématiques en Mouvement sur l'ordinateur quantique, Paris, France, FSMP, May 2017.
    https://hal.inria.fr/hal-01660726

Other Publications

  • 67N. Aragon, P. S. L. M. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C. Aguilar Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich, G. Zémor.
    BIKE: Bit Flipping Key Encapsulation, December 2017, Submission to the NIST post quantum standardization process.
    https://hal.archives-ouvertes.fr/hal-01671903
  • 68N. Aragon, P. Gaborit, A. Hauteville, J.-P. Tillich.
    Improvement of Generic Attacks on the Rank Syndrome Decoding Problem, October 2017, working paper or preprint.
    https://hal.archives-ouvertes.fr/hal-01618464
  • 69M. Bardet, E. Barelli, O. Blazy, R. Canto Torres, A. Couvreur, P. Gaborit, A. Otmani, N. Sendrier, J.-P. Tillich.
    BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation, December 2017, submission to the NIST post quantum cryptography standardization process.
    https://hal.archives-ouvertes.fr/hal-01671866
  • 70A. Chailloux, T. Debris-Alazard.
    A tight security reduction in the quantum random oracle model for code-based signature schemes , December 2017, working paper or preprint.
    https://hal.inria.fr/hal-01671870
  • 71T. Debris-Alazard, J.-P. Tillich.
    Statistical Decoding, December 2017, working paper or preprint.
    https://hal.inria.fr/hal-01661745
  • 72O. Fawzi, A. Grospellier, A. Leverrier.
    Efficient decoding of random errors for quantum expander codes, December 2017, working paper or preprint.
    https://hal.inria.fr/hal-01671348
  • 73O. Fawzi, A. Grospellier, A. Leverrier.
    Efficient decoding of random errors for quantum expander codes, November 2017, 8th colloquium of the GDR IQFA - Ingénierie Quantique, des Aspects Fondamentaux aux Applications, Poster.
    https://hal.archives-ouvertes.fr/hal-01671496
  • 74M. Lequesne.
    Side Channel Key Recovery Attacks on QC-MDPC Codes, MPRI, September 2017, pp. 1-22.
    https://hal.inria.fr/hal-01658381
  • 75A. Leverrier.
    SU(p,q) coherent states and a Gaussian de Finetti theorem, November 2017, working paper or preprint.
    https://hal.inria.fr/hal-01652084
  • 76A. Schrottenloher.
    Collision search and quantum symmetric cryptanalysis, Université Paris-Saclay, September 2017, pp. 1-25.
    https://hal.inria.fr/hal-01654190
  • 77F. Sibleyras.
    Cryptanalysis of the Counter mode of operation, Paris 7, September 2017.
    https://hal.inria.fr/hal-01662040
  • 78V. Vasseur.
    Cryptographie post-quantique : étude du décodage des codes QC-MDPC, Université Grenoble-Alpes, September 2017.
    https://hal.inria.fr/hal-01664082
  • 79M. de la Morinerie.
    Implémentation à seuil de boîtes S, Ecole Polytechnique, July 2017.
    https://hal.inria.fr/hal-01672270