Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
    Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]
    https://hal.inria.fr/hal-01631130
  • 2K. Bhargavan, G. Leurent.
    On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
    https://hal.inria.fr/hal-01404208
  • 3A. Canteaut, J. Roué.
    On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
    https://hal.inria.fr/hal-01104051
  • 4A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.
    An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]
    https://hal.inria.fr/hal-01651007
  • 5K. Chakraborty, A. Chailloux, A. Leverrier.
    Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
    https://hal.inria.fr/hal-01237241
  • 6P. Charpin, G. M. Kyureghyan, V. Suder.
    Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
    https://hal.archives-ouvertes.fr/hal-01068860
  • 7N. Courtois, M. Finiasz, N. Sendrier.
    How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174.
  • 8A. Couvreur, A. Otmani, J.-P. Tillich.
    Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
    https://hal.inria.fr/hal-01661935
  • 9M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
    Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
    https://hal.inria.fr/hal-01404196
  • 10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.
    MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
    https://hal.inria.fr/hal-00870929
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 15Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang.
    Generic Attacks on Hash Combiners, in: Journal of Cryptology, 2020, 82 p, forthcoming. [ DOI : 10.1007/s00145-019-09328-w ]
    https://hal.inria.fr/hal-02424905
  • 16J.-F. Biasse, X. Bonnetain, B. Pring, A. Schrottenloher, W. Youmans.
    A trade-off between classical and quantum circuit size for an attack against CSIDH, in: Journal of Mathematical Cryptology, August 2019, pp. 1-16.
    https://hal.inria.fr/hal-02423394
  • 17X. Bonnetain, M. Naya-Plasencia, A. Schrottenloher.
    Quantum Security Analysis of AES, in: IACR Transactions on Symmetric Cryptology, June 2019, vol. 2019, no 2, pp. 55-93. [ DOI : 10.13154/tosc.v2019.i2.55-93 ]
    https://hal.inria.fr/hal-02397049
  • 18C. Boura, A. Canteaut, D. Coggia.
    A General Proof Framework for Recent AES Distinguishers, in: IACR Transactions on Symmetric Cryptology, March 2019, vol. 2019, no 1, pp. 170-191. [ DOI : 10.13154/tosc.v2019.i1.170-191 ]
    https://hal.inria.fr/hal-02431695
  • 19C. Boura, A. Canteaut, J. Jean, V. Suder.
    Two Notions of Differential Equivalence on Sboxes, in: Designs, Codes and Cryptography, 2019, vol. 87, no 2-3, pp. 185-202, forthcoming. [ DOI : 10.1007/s10623-018-0496-z ]
    https://hal.inria.fr/hal-01944565
  • 20C. Boura, E. Chavli, M. Chlouveraki, K. Karvounis.
    The BMM symmetrising trace conjecture for groups G, G, G, G, G, in: Journal of Symbolic Computation, 2020, vol. 96, pp. 62-84, https://arxiv.org/abs/1802.07482. [ DOI : 10.1016/j.jsc.2019.02.012 ]
    https://hal.archives-ouvertes.fr/hal-02147376
  • 21A. Canteaut, L. Perrin.
    On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 209-246. [ DOI : 10.1016/j.ffa.2018.11.008 ]
    https://hal.inria.fr/hal-01953353
  • 22A. Canteaut, L. Perrin, S. Tian.
    If a generalised butterfly is APN then it operates on 6 bits, in: Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , November 2019, vol. 11, no 6, pp. 1147-1164. [ DOI : 10.1007/s12095-019-00361-x ]
    https://hal.inria.fr/hal-02420992
  • 23K. Carrier, J.-P. Tillich.
    Identifying an unknown code by partial Gaussian elimination, in: Designs, Codes and Cryptography, March 2019, vol. 87, no 2-3, pp. 685-713. [ DOI : 10.1007/s10623-018-00593-7 ]
    https://hal.inria.fr/hal-02424098
  • 24D. Chang, N. Datta, A. Dutta, B. Mennink, M. Nandi, S. Sanadhya, F. Sibleyras.
    Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE, in: IACR Transactions on Symmetric Cryptology, 2019, forthcoming.
    https://hal.inria.fr/hal-02424957
  • 25P. Charpin, P. Langevin.
    Obituary of Jacques Wolfmann (1932–2018), in: Designs, Codes and Cryptography, May 2019, vol. 87, no 5, pp. 955-956. [ DOI : 10.1007/s10623-019-00631-y ]
    https://hal-univ-tln.archives-ouvertes.fr/hal-02168222
  • 26P. Charpin, J. Peng.
    Differential uniformity and the associated codes of cryptographic functions, in: Advances in Mathematics of Communications, November 2019, vol. 13, no 4, pp. 579-600. [ DOI : 10.3934/amc.2019036 ]
    https://hal.inria.fr/hal-01908336
  • 27P. Charpin, J. Peng.
    New links between nonlinearity and differential uniformity, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 188-208. [ DOI : 10.1016/j.ffa.2018.12.001 ]
    https://hal.inria.fr/hal-01907499
  • 28S. Ghorai, E. Diamanti, A. Leverrier.
    Composable security of two-way continuous-variable quantum key distribution without active symmetrization, in: Physical Review A, January 2019, vol. 99, no 1, 11 p, https://arxiv.org/abs/1806.11356. [ DOI : 10.1103/PhysRevA.99.012311 ]
    https://hal.archives-ouvertes.fr/hal-02096575
  • 29S. Ghorai, P. Grangier, E. Diamanti, A. Leverrier.
    Asymptotic security of continuous-variable quantum key distribution with a discrete modulation, in: Physical Review X, June 2019, vol. 9, no 2, 11 p, https://arxiv.org/abs/1902.01317. [ DOI : 10.1103/PhysRevX.9.021059 ]
    https://hal.archives-ouvertes.fr/hal-02163714
  • 30A. Krishna, J.-P. Tillich.
    Towards Low Overhead Magic State Distillation, in: Physical Review Letters, August 2019, vol. 123, no 7, 4 p. [ DOI : 10.1103/PhysRevLett.123.070507 ]
    https://hal.inria.fr/hal-02424053

Invited Conferences

  • 32A. Canteaut.
    Algebraic attacks on symmetric primitives for advanced protocols, in: Frisiacrypt 2019 - Workshop on Symmetric Cryptography, Borkum, Germany, September 2019.
    https://hal.inria.fr/hal-02431723
  • 33A. Canteaut.
    Cryptanalysis – a Never-Ending Story, in: Guest lecture for Honorary Doctorate, Bergen, Norway, October 2019.
    https://hal.inria.fr/hal-02431731
  • 34A. Canteaut.
    Searching for APN permutations with the butterfly construction, in: CANADAM 2019 - minisymposium on "Finite Fields in Discrete Mathematics", Vancouver, Canada, May 2019.
    https://hal.inria.fr/hal-02431757
  • 35P. Charpin.
    Crooked and weakly crooked functions, in: Fq14 - 14th international conference on Finite Fields and Applications -, Vancouver, Canada, June 2019.
    https://hal.inria.fr/hal-02431744
  • 36A. Leverrier, V. Londe, G. Zémor.
    Quantum local testability, in: Symmetry, Phases of Matter, and Resources in Quantum Computing, Waterloo, Canada, November 2019.
    https://hal.inria.fr/hal-02432364
  • 37M. Naya-Plasencia.
    Preparing Symmetric Crypto for the Quantum World, in: FSE 2019 - 26th Annual Fast Software Encryption Conference, Paris, France, March 2019.
    https://hal.inria.fr/hal-02424409
  • 38M. Naya-Plasencia, A. Schrottenloher, A. Chailloux, L. Grassi.
    New algorithms for quantum (symmetric) cryptanalysis, in: QuAC: Quantum Algorithms for Cryptanalysis, Darmstadt, Germany, May 2019.
    https://hal.inria.fr/hal-02423376
  • 39M. Naya-Plasencia, A. Schrottenloher, A. Chailloux, L. Grassi.
    Quantum Merging Algorithms, in: Dagstuhl Seminar 19421 Quantum Cryptanalysis, Dagstuhl, Germany, October 2019.
    https://hal.inria.fr/hal-02423380
  • 40F. Sibleyras.
    The Missing Difference Problem, and its Applications to Counter Mode Encryption, in: Invited talk at NTT Secure Platform Laboratories, Musashino, Japan, September 2019.
    https://hal.inria.fr/hal-02424996
  • 41F. Sibleyras.
    Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem, in: Invited talk at NTT Secure Platform Laboratories, Musashino, Japan, September 2020.
    https://hal.inria.fr/hal-02425000

International Conferences with Proceedings

  • 42S. Apers.
    Quantum Walk Sampling by Growing Seed Sets, in: ESA 2019 - 27th Annual European Symposium on Algorithms, Munich/Garching, Germany, September 2019, https://arxiv.org/abs/1904.11446. [ DOI : 10.4230/LIPIcs.ESA.2019.9 ]
    https://hal.inria.fr/hal-02436629
  • 43X. Bonnetain, A. Hosoyamada, M. Naya-Plasencia, Y. Sasaki, A. Schrottenloher.
    Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm, in: ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, LNCS, Springer, December 2019, vol. 11921, pp. 552-583. [ DOI : 10.1007/978-3-030-34578-5_20 ]
    https://hal.inria.fr/hal-02397056
  • 44X. Bonnetain, L. Perrin, S. Tian.
    Anomalies and Vector Space Search: Tools for S-Box Analysis, in: ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, LNCS, Springer, November 2019, vol. 11921, pp. 196-223. [ DOI : 10.1007/978-3-030-34578-5_8 ]
    https://hal.inria.fr/hal-02396738
  • 45R. Bricout, A. Chailloux, T. Debris-Alazard, M. Lequesne.
    Ternary Syndrome Decoding with Large Weight, in: SAC 2019 - 26th International Conference Selected Areas in Cryptography, Waterloo, Canada, August 2019.
    https://hal.inria.fr/hal-02420997
  • 46A. Canteaut, V. Lallemand, G. Leander, P. Neumann, F. Wiemer.
    Bison: Instantiating the Whitened Swap-Or-Not Construction, in: Eurocrypt 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, LNCS, Springer, May 2019, vol. 11478. [ DOI : 10.1007/978-3-030-17659-4_20 ]
    https://hal.inria.fr/hal-02431714
  • 47R. Canto-Torres, J.-P. Tillich.
    Speeding up decoding a code with a non-trivial automorphism group up to an exponential factor, in: ISIT 2019 - IEEE International Symposium on Information Theory, Paris, France, IEEE, July 2019, pp. 1927-1931. [ DOI : 10.1109/ISIT.2019.8849628 ]
    https://hal.inria.fr/hal-02424101
  • 48A. Couvreur, M. Lequesne, J.-P. Tillich.
    Recovering short secret keys of RLCE encryption scheme in polynomial time, in: PQCrypto 2019 - International Conference on Post-Quantum Cryptography, Chongqing, China, May 2019, https://arxiv.org/abs/1805.11489. [ DOI : 10.1007/978-3-030-25510-7_8 ]
    https://hal.inria.fr/hal-01959617
  • 50O. Dunkelman, L. Perrin.
    Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs, in: SSR 2019 - Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, Royaume-Uni, ACM Press, November 2019, pp. 69-80. [ DOI : 10.1145/3338500.3360335 ]
    https://hal.inria.fr/hal-02396695
  • 51S. Duval, G. Leurent.
    Lightweight MACs from Universal Hash Functions, in: CARDIS 2019 - 18th Smart Card Research and Advanced Application Conference, Prague, Czech Republic, November 2019.
    https://hal.inria.fr/hal-02424904
  • 52G. Leurent, T. Peyrin.
    From Collisions to Chosen-Prefix Collisions : Application to Full SHA-1, in: Eurocrypt 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, LNCS, Springer, April 2019, vol. 11478, pp. 527-555. [ DOI : 10.1007/978-3-030-17659-4_18 ]
    https://hal.inria.fr/hal-02424900
  • 53G. Leurent, F. Sibleyras.
    Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem, in: CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, United States, A. Boldyreva, D. Micciancio (editors), LNCS, Springer, August 2019, vol. 11693, pp. 210-235. [ DOI : 10.1007/978-3-030-26951-7_8 ]
    https://hal.inria.fr/hal-02424902
  • 54Y. Li, G. Leurent, M. Wang, W. Wang, G. Zhang, Y. Liu.
    Universal Forgery Attack against GCM-RUP, in: CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, United States, February 2020.
    https://hal.inria.fr/hal-02424899
  • 55F. Sibleyras.
    Generic Attack on Iterated Tweakable FX Constructions, in: CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, United States, February 2020.
    https://hal.inria.fr/hal-02424953

National Conferences with Proceedings

  • 56L. Perrin, X. Bonnetain.
    Russian Style (Lack of) Randomness, in: Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2019.
    https://hal.inria.fr/hal-02396792

Conferences without Proceedings

  • 57C. Boura, L. Perrin, S. Tian.
    Boomerang Uniformity of Popular S-box Constructions, in: WCC 2019 - The Eleventh International Workshop on Coding and Cryptography, Saint-Jacut-de-la-Mer, France, March 2019.
    https://hal.inria.fr/hal-02420970
  • 58A. Canteaut, L. Perrin.
    On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Fq14 - 14th international conference on Finite Fields and Applications, Vancouver, Canada, June 2019.
    https://hal.inria.fr/hal-02431739
  • 59A. Chailloux.
    A note on the Quantum Query Complexity of Permutation Symmetric Functions, in: QIP 2019 - 22nd Annual Conference on Quantum Information Processing, Boulder, United States, January 2019.
    https://hal.inria.fr/hal-02427235
  • 60A. Chailloux.
    A note on the quantum query complexity of permutation symmetric functions, in: ITCS 2019 - 10th Annual Innovations in Theoretical Computer Science, San Diego, United States, 2019, https://arxiv.org/abs/1810.01790. [ DOI : 10.4230/LIPIcs.ITCS.2019.19 ]
    https://hal.inria.fr/hal-01950650
  • 61D. Coggia, A. Couvreur.
    On the security of a Loidreau's rank metric code based encryption scheme, in: WCC 2019 - The Eleventh International Workshop on Coding and Cryptography, Saint Jacut de la mer, France, March 2019.
    https://hal.archives-ouvertes.fr/hal-02064465
  • 62A. Grospellier, L. Grouès, A. Krishna, A. Leverrier.
    Combining Hard and Soft Decoders for Hypergraph Product Codes, in: QEC19 - 5th International Conference on Quantum Error Correction, London, United Kingdom, July 2019.
    https://hal.inria.fr/hal-02429542

Scientific Popularization

  • 63G. Leurent, M. Naya-Plasencia.
    La fragilité inattendue du chiffrement symétrique dans le monde post-quantique, in: Interstices, December 2019.
    https://hal.inria.fr/hal-02425716

Other Publications