Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 3M. Abdalla, F. Benhamouda, A. Passelègue, K. Paterson.
    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, in: Journal of Cryptology, October 2018, vol. 31, no 4, pp. 917-964. [ DOI : 10.1007/s00145-017-9274-8 ]
    https://hal.inria.fr/hal-01723012
  • 4B. Allombert, N. Brisebarre, A. Lasjaunias.
    On a two-valued sequence and related continued fractions in power series fields, in: The Ramanujan Journal, 2018, vol. 45, no 3, pp. 859-871, https://arxiv.org/abs/1607.07235. [ DOI : 10.1007/s11139-017-9892-7 ]
    https://hal.archives-ouvertes.fr/hal-01348576
  • 5S. Bai, T. Lepoint, A. Roux-Langlois, A. Sakzad, D. Stehlé, R. Steinfeld.
    Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance, in: Journal of Cryptology, April 2018, vol. 31, no 2, pp. 610 - 640. [ DOI : 10.1007/s00145-017-9265-9 ]
    https://hal.archives-ouvertes.fr/hal-01934177
  • 6N. Brisebarre, S.-I. Filip, G. Hanrot.
    A Lattice Basis Reduction Approach for the Design of Finite Wordlength FIR Filters, in: IEEE Transactions on Signal Processing, 2018, vol. 66, no 10, pp. 2673-2684. [ DOI : 10.1109/TSP.2018.2812739 ]
    https://hal.inria.fr/hal-01308801
  • 7F. Bréhard, N. Brisebarre, M. Joldes.
    Validated and numerically efficient Chebyshev spectral methods for linear ordinary differential equations, in: ACM Transactions on Mathematical Software, July 2018, vol. 44, no 4, pp. 44:1-44:42. [ DOI : 10.1145/3208103 ]
    https://hal.archives-ouvertes.fr/hal-01526272
  • 8L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, D. Stehlé.
    CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme, in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018.
    https://hal.archives-ouvertes.fr/hal-01934176
  • 9G. Herold, E. Kirshanova, A. May.
    On the asymptotic complexity of solving LWE, in: Designs, Codes and Cryptography, January 2018, vol. 86, no 1, pp. 55 - 83. [ DOI : 10.1007/s10623-016-0326-0 ]
    https://hal.archives-ouvertes.fr/hal-01934181
  • 10C.-P. Jeannerod, S. M. Rump.
    On relative errors of floating-point operations: optimal bounds and applications, in: Mathematics of Computation, 2018, vol. 87, pp. 803-819. [ DOI : 10.1090/mcom/3234 ]
    https://hal.inria.fr/hal-00934443
  • 11B. Salvy.
    Linear Differential Equations as a Data-Structure, in: Foundations of Computational Mathematics, 2018, pp. 1-35, https://arxiv.org/abs/1811.08616 - Based on an invited talk at FoCM'2017.
    https://hal.inria.fr/hal-01940078
  • 12A. Volkova, M. Istoan, F. de Dinechin, T. Hilaire.
    Towards Hardware IIR Filters Computing Just Right: Direct Form I Case Study, in: IEEE Transactions on Computers, 2018. [ DOI : 10.1109/TC.2018.2879432 ]
    https://hal.sorbonne-universite.fr/hal-01561052

Invited Conferences

  • 13B. Salvy.
    Recursive Combinatorial Structures: Enumeration, Probabilistic Analysis and Random Generation, in: STACS 2018 - 35th Symposium on Theoretical Aspects of Computer Science, Caen, France, February 2018, Tutorial. [ DOI : 10.4230/LIPIcs.STACS.2018.1 ]
    https://hal.inria.fr/hal-01926094

International Conferences with Proceedings

  • 14P. R. Arantes Gilz, F. Bréhard, C. Gazzino.
    Validated Semi-Analytical Transition Matrices for Linearized Relative Spacecraft Dynamics via Chebyshev Series Approximations, in: SCITECH 2018 - AIAA Science and Technology Forum and Exposition, 28th Space Flight Mechanics Meeting, Kissimmee, United States, SCITECH 2018-AIAA Science and Technology Forum and Exposition, 28th Space Flight Mechanics Meeting, American Institute of Aeronautics and Astronautics, January 2018, pp. 1-23. [ DOI : 10.2514/6.2018-1960 ]
    https://hal.archives-ouvertes.fr/hal-01540170
  • 15S. Bai, D. Stehlé, W. Wen.
    Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ, in: ASIACRYPT, Brisbane, Australia, 2018.
    https://hal.archives-ouvertes.fr/hal-01934174
  • 16D. Boneh, Y. Ishai, A. Passelègue, A. Sahai, D. J. Wu.
    Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications, in: TCC 2018 - Theory of Cryptography Conference, Goa, India, LNCS, Springer, November 2018, vol. 11240, pp. 699-729. [ DOI : 10.1007/978-3-030-03810-6_25 ]
    https://hal.inria.fr/hal-01929288
  • 17J. W. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. Schanck, P. Schwabe, G. Seiler, D. Stehlé.
    CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM, in: EuroS&P 2018 - IEEE European Symposium on Security and Privacy, London, United Kingdom, IEEE, April 2018, pp. 353-367. [ DOI : 10.1109/EuroSP.2018.00032 ]
    https://hal.archives-ouvertes.fr/hal-01934169
  • 18A. Bostan, F. Chyzak, P. Lairez, B. Salvy.
    Generalized Hermite Reduction, Creative Telescoping and Definite Integration of D-Finite Functions, in: ISSAC 2018 - International Symposium on Symbolic and Algebraic Computation, New York, United States, July 2018, pp. 1-8. [ DOI : 10.1145/3208976.3208992 ]
    https://hal.inria.fr/hal-01788619
  • 19Z. Brakerski, A. Jain, I. Komargodski, A. Passelègue, D. Wichs.
    Non-Trivial Witness Encryption and Null-iO from Standard Assumptions, in: SCN 2018 - International Conference on Security and Cryptography for Networks, Amalfi, Italy, LNCS, Springer, September 2018, vol. 11035, pp. 425-441. [ DOI : 10.1007/978-3-319-98113-0_23 ]
    https://hal.inria.fr/hal-01929279
  • 20Z. Brakerski, E. Kirshanova, D. Stehlé, W. Wen.
    Learning with Errors and Extrapolated Dihedral Cosets, in: PKC 2018 - 21st International Conference on Practice and Theory of Public Key Cryptography, Rio de Janeiro, Brazil, March 2018.
    https://hal.archives-ouvertes.fr/hal-01934165
  • 21N. Brisebarre, G. Constantinides, M. Ercegovac, S.-I. Filip, M. Istoan, J.-M. Muller.
    A High Throughput Polynomial and Rational Function Approximations Evaluator, in: ARITH 2018 - 25th IEEE Symposium on Computer Arithmetic, Amherst, MA, United States, IEEE, June 2018, pp. 99-106. [ DOI : 10.1109/ARITH.2018.8464778 ]
    https://hal.inria.fr/hal-01774364
  • 22F. Bréhard.
    A Newton-like Validation Method for Chebyshev Approximate Solutions of Linear Ordinary Differential Systems, in: ISSAC 2018 - 43rd International Symposium on Symbolic and Algebraic Computation, New York, United States, ISSAC 2018-43rd International Symposium on Symbolic and Algebraic Computation, ACM, July 2018, pp. 103-110. [ DOI : 10.1145/3208976.3209000 ]
    https://hal.archives-ouvertes.fr/hal-01654396
  • 23G. Castagnos, F. Laguillaumie, I. Tucker.
    Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo p, in: ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, T. Peyrin, S. Galbraith (editors), Advances in Cryptology – ASIACRYPT 2018, December 2018, vol. LNCS, no 11273, pp. 733-764.
    https://hal.archives-ouvertes.fr/hal-01934296
  • 24J. Chen, J. Gong, L. Kowalczyk, H. Wee.
    Unbounded ABE via Bilinear Entropy Expansion, Revisited, in: EUROCRYPT 2018 - Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, J. B. Nielsen, V. Rijmen (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2018, vol. 10820, pp. 503-534. [ DOI : 10.1007/978-3-319-78381-9_19 ]
    https://hal.inria.fr/hal-01899901
  • 25J. Chen, J. Gong, H. Wee.
    Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 2018.
    https://hal.inria.fr/hal-01900153
  • 26J. Chen, D. Stehlé, G. Villard.
    Computing an LLL-reduced Basis of the Orthogonal Lattice, in: ISSAC 2018, 43rd International Symposium on Symbolic and Algebraic Computation (ISSAC 2018), New York, United States, July 2018, https://arxiv.org/abs/1805.03418. [ DOI : 10.1145/3208976.3209013 ]
    https://hal.archives-ouvertes.fr/hal-01921335
  • 27C. Chuengsatiansup, C. Martindale.
    Pairing-friendly twisted Hessian curves, in: Indocrypt 2018 - 19th International Conference on Cryptology, New Delhi, India, December 2018.
    https://hal.archives-ouvertes.fr/hal-01934160
  • 28L. Ducas, A. Pellet–Mary.
    On the Statistical Leak of the GGH13 Multilinear Map and some Variants, in: Asiacrypt 2018, Brisbane, Australia, December 2018, pp. 465-493.
    https://hal.archives-ouvertes.fr/hal-01895645
  • 29J. Gong, B. Libert, S. C. Ramanna.
    Compact IBBE and Fuzzy IBE from Simple Assumptions, in: SCN 2018 - 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, Security and Cryptography for Networks (SCN) 2018, September 2018, pp. 1-29.
    https://hal.inria.fr/hal-01686690
  • 30L. Grémy.
    Higher dimensional sieving for the number field sieve algorithms, in: ANTS 2018 - Thirteenth Algorithmic Number Theory Symposium, Madison, United States, University of Wisconsin, July 2018, pp. 1-16.
    https://hal.inria.fr/hal-01890731
  • 31G. Herold, E. Kirshanova, T. Laarhoven.
    Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving, in: PKC 2018 - 21st International Conference on Practice and Theory of Public Key Cryptography, Rio de Janeiro, Brazil, March 2018.
    https://hal.archives-ouvertes.fr/hal-01934183
  • 32C.-P. Jeannerod, J.-M. Muller, P. Zimmermann.
    On various ways to split a floating-point number, in: ARITH 2018 - 25th IEEE Symposium on Computer Arithmetic, Amherst (MA), United States, IEEE, June 2018, pp. 53-60. [ DOI : 10.1109/ARITH.2018.8464793 ]
    https://hal.inria.fr/hal-01774587
  • 33M. Joye, A. Passelègue.
    Function-Revealing Encryption: Definitions and Constructions, in: SCN 2018 - International Conference on Security and Cryptography for Networks, Amalfi, Italy, LNCS, Springer, September 2018, vol. 11035, pp. 527-543. [ DOI : 10.1007/978-3-319-98113-0_28 ]
    https://hal.inria.fr/hal-01929272
  • 34E. Kirshanova.
    Improved Quantum Information Set Decoding, in: PQCrypto 2018 - The Ninth International Conference on Post-Quantum Cryptography, Fort Lauderdale, United States, April 2018.
    https://hal.archives-ouvertes.fr/hal-01934186
  • 35J. Li, J. Gong.
    Improved Anonymous Broadcast Encryptions: Tight Security and Shorter Ciphertext, in: ACNS 2018 - 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, Springer, July 2018, pp. 497-515. [ DOI : 10.1007/978-3-319-93387-0_26 ]
    https://hal.archives-ouvertes.fr/hal-01829132
  • 36B. Libert, S. Ling, K. Nguyen, H. Wang.
    Lattice-Based Zero-Knowledge Arguments for Integer Relations, in: CRYPTO 2018 - Annual International Cryptology Conference, Santa Barbara, United States, Springer, August 2018, vol. LNCS, no 10992, pp. 700-732. [ DOI : 10.1007/978-3-319-96881-0_24 ]
    https://hal.inria.fr/hal-01911886
  • 37B. Libert, T. Peters, C. Qian.
    Logarithmic-Size Ring Signatures With Tight Security from the DDH Assumption, in: ESORICS 2018 - 23rd European Symposium on Research in Computer Security, Barcelone, Spain, LNCS, Springer, September 2018, vol. 11099, pp. 288-308. [ DOI : 10.1007/978-3-319-98989-1_15 ]
    https://hal.inria.fr/hal-01848134
  • 38B. Libert, D. Stehlé, R. Titiu.
    Adaptively Secure Distributed PRFs from LWE, in: TCC 2018 - 16th International Conference on Theory of Cryptography, Panaji, India, LNCS, Springer, November 2018, vol. 11240, pp. 391-421. [ DOI : 10.1007/978-3-030-03810-6_15 ]
    https://hal.inria.fr/hal-01911887
  • 39A. Pellet–Mary.
    Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model, in: Crypto 2018 - 38th International Cryptology Conference, Santa-Barbara, United States, Springer, August 2018, pp. 153-183. [ DOI : 10.1007/978-3-319-96878-0_6 ]
    https://hal.archives-ouvertes.fr/hal-01895639
  • 40M. Roșca, D. Stehlé, A. Wallet.
    On the Ring-LWE and Polynomial-LWE Problems, in: EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications, Tel Aviv, Israel, April 2018.
    https://hal.archives-ouvertes.fr/hal-01934170
  • 41R. Serra, D. Arzelier, F. Bréhard, M. Joldes.
    Fuel-optimal impulsive fixed-time trajectories in the linearized circular restricted 3-body-problem, in: IAC 2018 - 69th International Astronautical Congress; IAF Astrodynamics Symposium, Bremen, Germany, CSA/IAF Special issue IAF Astrodynamics Symposium (69TH international astronautical congress), International Astronautical Federation, October 2018, pp. 1-9.
    https://hal.archives-ouvertes.fr/hal-01830253

Scientific Books (or Scientific Book chapters)

  • 43J.-M. Muller, N. Brunie, F. de Dinechin, C.-P. Jeannerod, M. Joldes, V. Lefèvre, G. Melquiond, N. Revol, S. Torres.
    Handbook of Floating-point Arithmetic (2nd edition), Birkhäuser Basel, July 2018, pp. 1-627. [ DOI : 10.1007/978-3-319-76526-6 ]
    https://hal.inria.fr/hal-01766584

Other Publications