Bibliography
Publications of the year
Articles in International Peer-Reviewed Journals
-
1M. Albrecht, C. Cid, J.-C. Faugère, R. Fitzpatrick, L. Perret.
On the complexity of the BKW algorithm on LWE, in: Designs, Codes and Cryptography, February 2015, vol. 74, no 2, 26 p. [ DOI : 10.1007/s10623-013-9864-x ]
https://hal.inria.fr/hal-00921517 -
2B. Bank, M. Giusti, J. Heintz, M. Safey El Din.
Intrinsic complexity estimates in polynomial optimization, in: Journal of Complexity, February 2014, vol. 30, no 4, pp. 430-443. [ DOI : 10.1016/j.jco.2014.02.005 ]
https://hal.inria.fr/hal-00815123 -
3M. Bardet, J.-C. Faugère, B. Salvy.
On the complexity of the F5 Gröbner basis algorithm, in: Journal of Symbolic Computation, September 2014, pp. 1-24. [ DOI : 10.1016/j.jsc.2014.09.025 ]
https://hal.inria.fr/hal-01064519 -
4S. Basu, M.-F. Roy, M. Safey El Din, E. Schost.
A Baby Step–Giant Step Roadmap Algorithm for General Algebraic Sets, in: Foundations of Computational Mathematics, 2014, vol. 14, no 6, pp. 1117 - 1172. [ DOI : 10.1007/s10208-014-9212-1 ]
https://hal.inria.fr/hal-01096209 -
5J. C. Costello, L. M. Heiser, E. Georgii, M. Gönen, M. P. Menden, N. J. Wang, M. Bansal, M. Ammad-ud-din, P. Hintsanen, S. A. Khan, J.-P. Mpindi, O. Kallioniemi, A. Honkela, T. Aittokallio, K. Wennerberg, J.-P. Abbuehl, J. Allen, R. B. Altman, S. Balcome, A. Battle, A. Bender, B. Berger, J. Bernard, M. Bhattacharjee, K. Bhuvaneshwar, A. A. Bieberich, F. Boehm, A. Califano, C. Chan, B. Chen, T.-H. Chen, J. Choi, L. P. Coelho, T. Cokelaer, J. C. Collins, C. J. Creighton, J. Cui, W. Dampier, V. J. Davisson, B. D. Baets, R. Deshpande, B. DiCamillo, M. Dundar, Z. Duren, A. Ertel, H. Fan, H. Fang, D. Gallahan, R. Gauba, A. Gottlieb, M. Grau, J. W. Gray, Y. Gusev, M. J. Ha, L. Han, M. Harris, N. Henderson, H. A. Hejase, K. Homicsko, J. P. Hou, W. Hwang, A. P. IJzerman, B. Karacali, S. Kaski, S. Keles, C. Kendziorski, J. Kim, M. Kim, Y. Kim, D. A. Knowles, D. Koller, J. Lee, J. K. Lee, E. B. Lenselink, B. Li, B. Li, J. Li, H. Liang, J. Ma, S. Madhavan, S. Mooney, C. L. Myers, M. A. Newton, J. P. Overington, R. Pal, J. Peng, R. Pestell, R. J. Prill, P. Qiu, B. Rajwa, A. Sadanandam, J. Saez-Rodriguez, F. Sambo, H. Shin, D. Singer, J. Song, L. Song, A. Sridhar, M. Stock, G. Stolovitzky, W. Sun, T. Ta, M. Tadesse, M. Tan, H. Tang, D. Theodorescu, G. M. Toffolo, A. Tozeren, W. Trepicchio, N. Varoquaux, J.-P. Vert, W. Waegeman, T. Walter, Q. Wan, D. Wang, W. Wang, Y. Wang, Z. Wang, J. K. Wegner, T. Wu, T. Xia, G. Xiao, Y. Xie, Y. Xu, J. Yang, Y. Yuan, S. Zhang, X.-S. Zhang, J. Zhao, C. Zuo, H. W. T. v. Vlijmen, G. J. P. v. Westen, J. J. Collins.
A community effort to assess and improve drug sensitivity prediction algorithms, in: Nature Biotechnology, 2014, vol. 32, pp. 1202-1212. [ DOI : 10.1038/nbt.2877 ]
https://hal-mines-paristech.archives-ouvertes.fr/hal-01101874 -
6J.-C. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.-P. Tillich.
Structural Cryptanalysis of McEliece Schemes with Compact Keys, in: Designs, Codes and Cryptography, January 2015, 26 p.
https://hal.inria.fr/hal-00964265 -
7A. Greuet, M. Safey El Din.
Probabilistic Algorithm for Polynomial Optimization over a Real Algebraic Set, in: SIAM Journal on Optimization, August 2014, vol. 24, no 3, pp. 1313-1343. [ DOI : 10.1137/130931308 ]
https://hal.archives-ouvertes.fr/hal-00849523 -
8X. Li, D. Wang.
Computing equilibria of semi-algebraic economies using triangular decomposition and real solution classification, in: Journal of Mathematical Economics, 2014, vol. 54, pp. 48-58. [ DOI : 10.1016/j.jmateco.2014.08.007 ]
https://hal.inria.fr/hal-01092169
International Conferences with Proceedings
-
9M. Albrecht, J.-C. Faugère, R. Fitzpatrick, L. Perret.
Lazy Modulus Switching for the BKW Algorithm on LWE, in: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, Springer, March 2014.
https://hal.inria.fr/hal-00925187 -
10M. Albrecht, J.-C. Faugère, R. Fitzpatrick, L. Perret, Y. Todo, K. Xagawa.
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, in: PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, Springer, March 2014.
https://hal.inria.fr/hal-00932382 -
11J. Bi, J.-S. Coron, J.-C. Faugère, P. Q. Nguyen, G. Renault, R. Zeitoun.
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences, in: PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, Buenos Aires, Argentina, H. Krawczyk (editor), Springer, March 2014, vol. 8383, pp. 185-202. [ DOI : 10.1007/978-3-642-54631-0_11 ]
https://hal.inria.fr/hal-00926902 -
12A. Bostan, T. Combot, M. Safey El Din.
Computing necessary integrability conditions for planar parametrized homogeneous potentials, in: ISSAC'14 - International Symposium on Symbolic and Algebraic Computation, Kobe, Japan, ACM Press, July 2014. [ DOI : 10.1145/2608628.2608662 ]
https://hal.inria.fr/hal-00994116 -
13M. Conde Pena, J.-C. Faugère, L. Perret.
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case, in: IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'15), Maryland, United States, March 2015.
https://hal.inria.fr/hal-01098223 -
14J.-C. Faugère, P. Gaudry, L. Huot, G. Renault.
Sub-cubic Change of Ordering for Gröner Basis: A Probabilistic Approach, in: ISSAC '14 - Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, Kobe, Japan, ISSAC '14, ACM, July 2014, pp. 170–177. [ DOI : 10.1145/2608628.2608669 ]
https://hal.inria.fr/hal-01064551 -
15J.-C. Faugère, D. Gligoroski, L. Perret, S. Simona, E. Thomae.
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems, in: IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'15), Maryland, United States, March 2015.
https://hal.inria.fr/hal-01074194 -
16J.-C. Faugère, L. Huot, A. Joux, G. Renault, V. Vitse.
Symmetrized summation polynomials: using small order torsion points to speed up elliptic curve index calculus, in: EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 2014. [ DOI : 10.1007/978-3-642-55220-5_3 ]
https://hal.inria.fr/hal-00935050 -
17J.-C. Faugère, L. Perret, F. De Portzamparc.
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form, in: Advances in Cryptology Asiacrypt 2014, Kaohsiung, Taiwan, December 2014. [ DOI : 10.1007/978-3-662-45611-8_2 ]
https://hal.inria.fr/hal-01064687 -
18J.-C. Faugère, L. Perret, F. De Portzamparc, A. Otmani, J.-P. Tillich.
Structural weakness of compact variants of the McEliece cryptosystem, in: IEEE International Symposium on Information Theory - ISIT 2014, Honolulu, United States, June 2014, pp. 1717-1721.
https://hal.archives-ouvertes.fr/hal-01096180 -
19J.-C. Faugère, P.-J. Spaenlehauer, J. Svartz.
Sparse Gröbner Bases: the Unmixed Case, in: ISSAC 2014, Kobe, Japan, July 2014, 20 pages, Corollary 6.1 has been corrected. [ DOI : 10.1145/2608628.2608663 ]
https://hal.archives-ouvertes.fr/hal-00953501 -
20V. Y. Pan, E. Tsigaridas.
Accelerated Approximation of the Complex Roots of a Univariate Polynomial (Extended Abstract), in: Proceedings of the 2014 Symposium on Symbolic-Numeric Computation, Shanghai, China, ACM, July 2014, pp. 132-134. [ DOI : 10.1145/2631948.2631973 ]
https://hal.inria.fr/hal-00980584 -
21V. Y. Pan, E. Tsigaridas.
Nearly Optimal Computations with Structured Matrices, in: Proceedings of the 2014 Symposium on Symbolic-Numeric Computation, Shanghai, China, July 2014, pp. 21-30. [ DOI : 10.1145/2631948.2631954 ]
https://hal.inria.fr/hal-00980591 -
22J. Yang, D. Wang, H. Hong.
ImUp: A Maple Package for Uniformity-Improved Reparameterization of Plane Curves, in: 10th Asian Symposium on Computer Mathematics, Beijing, China, Computer Mathematics, Springer, October 2014, pp. 437-451. [ DOI : 10.1007/978-3-662-43799-5_29 ]
https://hal.inria.fr/hal-01092141
Other Publications
-
23M. Albrecht, C. Cid, J.-C. Faugère, R. Fitzpatrick, L. Perret.
Algebraic Algorithms for LWE Problems, October 2014.
https://hal.inria.fr/hal-01072721 -
24M. Albrecht, J.-C. Faugère, R. Fitzpatrick, L. Perret.
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, January 2014.
https://hal.inria.fr/hal-00918314 -
25J. Berthomieu, J.-C. Faugère, L. Perret.
Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case, April 2014.
https://hal.inria.fr/hal-00846041 -
26C. Eder, J.-C. Faugère.
A survey on signature-based Gröbner basis computations, April 2014.
https://hal.inria.fr/hal-00974810 -
27I. Emiris, B. Mourrain, E. Tsigaridas.
Separation bounds for polynomial systems, January 2015.
https://hal.inria.fr/hal-01105276 -
28J.-C. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.-P. Tillich.
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups, May 2014, forthcoming.
https://hal.inria.fr/hal-00992389 -
29J.-C. Faugère, M. Safey El Din, T. Verron.
On the complexity of computing Gröbner bases for weighted homogeneous systems, December 2014.
https://hal.inria.fr/hal-01097316 -
30D. Henrion, S. Naldi, M. Safey El Din.
Real root finding for determinants of linear matrices, October 2014, Typos corrected, section 4 rewritten.
https://hal.archives-ouvertes.fr/hal-01077888 -
31A. Herman, E. Tsigaridas.
Bounds for the Condition Number for Polynomials with Integer Coefficients, December 2014.
https://hal.inria.fr/hal-01098981 -
32V. Y. Pan, E. Tsigaridas, Z. Liang.
Simple and Efficient Real Root-finding for a Univariate Polynomial, January 2015.
https://hal.inria.fr/hal-01105309 -
33V. Y. Pan, E. Tsigaridas.
Nearly Optimal Refinement of Real Roots of a Univariate Polynomial, 2014.
https://hal.inria.fr/hal-00960896 -
34V. Y. Pan, E. Tsigaridas.
Accelerated approximation of the complex roots of a univariate polynomial, January 2015. [ DOI : 10.1145/2631948.2631973 ]
https://hal.inria.fr/hal-01105267 -
35V. Y. Pan, E. Tsigaridas.
Nearly optimal computations with structured matrices, January 2015. [ DOI : 10.1145/2631948.2631954 ]
https://hal.inria.fr/hal-01105263 -
36M. Safey El Din, E. Schost.
A nearly optimal algorithm for deciding connectivity queries in smooth and bounded real algebraic sets, December 2014.
https://hal.inria.fr/hal-00849057