Bibliography
Major publications by the team in recent years
-
1A. Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, J.-R. Reinhard, C. Thuillet, M. Videau.
Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, October 2008, Submission to NIST. -
2A. Canteaut, M. Naya-Plasencia, B. Vayssière.
Sieve-in-the-Middle: Improved MITM Attacks, in: Advances in Cryptology - CRYPTO 2013, Part I, Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 222–240. -
3A. Canteaut, J. Roué.
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
https://hal.inria.fr/hal-01104051 -
4K. Chakraborty, A. Chailloux, A. Leverrier.
Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
https://hal.inria.fr/hal-01237241 -
5P. Charpin, G. Kyureghyan, V. Suder.
Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
https://hal.archives-ouvertes.fr/hal-01068860 -
6N. Courtois, M. Finiasz, N. Sendrier.
How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174. -
7I. Dinur, G. Leurent.
Improved Generic Attacks Against Hash-based MACs and HAIFA, in: Advances in Cryptology - CRYPTO 2014, Santa Barbara, CA, United States, LNCS, Springer, August 2014, vol. 8616. [ DOI : 10.1007/978-3-662-44371-2_9 ]
https://hal.archives-ouvertes.fr/hal-01086177 -
8J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich.
Algebraic Cryptanalysis of McEliece Variants with Compact Keys, in: Advances in Cryptology - EUROCRYPT 2010, LNCS, Springer, 2010, no 6110, pp. 279-298.
http://dx.doi.org/10.1007/978-3-642-13190-5_14 -
9P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, E. Diamanti.
Experimental demonstration of long-distance continuous-variable quantum key distribution, in: Nature Photonics, 2013, vol. 7, pp. 378-381. [ DOI : 10.1038/nphoton.2013.63 ]
https://hal.archives-ouvertes.fr/hal-00798855 -
10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. Barreto.
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
https://hal.inria.fr/hal-00870929
Doctoral Dissertations and Habilitation Theses
-
11V. Lallemand.
Cryptanalysis of symmetric ciphers, Université Pierre et Marie Curie - Paris VI, October 2016.
https://hal.inria.fr/tel-01405436
Articles in International Peer-Reviewed Journals
-
12D. Aharonov, A. Chailloux, M. Ganz, I. Kerenidis, L. Magnin.
A simpler proof of existence of quantum weak coin flipping with arbitrarily small bias, in: SIAM Journal on Computing, May 2016, 48 p. [ DOI : 10.1137/14096387X ]
https://hal.inria.fr/hal-01094114 -
13C. Boura, A. Canteaut, L. R. Knudsen, G. Leander.
Reflection ciphers, in: Designs, Codes and Cryptography, January 2016, pp. 1-23. [ DOI : 10.1007/s10623-015-0143-x ]
https://hal.inria.fr/hal-01237135 -
14N. Cepak, P. Charpin, E. Pasalic.
Permutations via linear translators, in: Finite Fields and Their Applications, 2017.
https://hal.inria.fr/hal-01412487 -
15A. Chailloux, G. Gutoski, J. Sikora.
Optimal bounds for quantum weak oblivious transfer, in: Chicago Journal of Theoretical Computer Science, September 2016. [ DOI : 10.4086/cjtcs.2016.013 ]
https://hal.archives-ouvertes.fr/hal-00927537 -
16K. Chakraborty, A. Chailloux, A. Leverrier.
Robust Relativistic Bit Commitment, in: Physical Review A, December 2016. [ DOI : 10.1103/PhysRevA.94.062314 ]
https://hal.inria.fr/hal-01409562 -
17K. Chakraborty, S. Sarkar, S. Maitra, B. Mazumdar, D. Mukhopadhyay, E. Prouff.
Redefining the transparency order, in: Designs, Codes and Cryptography, 2016. [ DOI : 10.1007/s10623-016-0250-3 ]
https://hal.archives-ouvertes.fr/hal-01399584 -
18P. Charpin, G. M. Kyureghyan.
On sets determining the differential spectrum of mappings, in: International journal of information and Coding Theory, 2017, Special issue on the honor of Gerard Cohen.
https://hal.inria.fr/hal-01406589 -
19P. Charpin, S. Mesnager, S. Sarkar.
Involutions over the Galois field F2n, in: IEEE Transactions on Information Theory, 2016, vol. 62, no 4. [ DOI : 10.1109/TIT.2016.2526022 ]
https://hal.inria.fr/hal-01272943 -
20I. Dinur, G. Leurent.
Improved Generic Attacks Against Hash-Based MACs and HAIFA, in: Algorithmica, November 2016. [ DOI : 10.1007/s00453-016-0236-6 ]
https://hal.inria.fr/hal-01407953 -
21J.-C. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.-P. Tillich.
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups, in: IEEE Transactions on Information Theory, 2016, vol. 62, no 1, pp. 184 - 198. [ DOI : 10.1109/TIT.2015.2493539 ]
https://hal.inria.fr/hal-01244609 -
22J.-C. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.-P. Tillich.
Structural Cryptanalysis of McEliece Schemes with Compact Keys, in: Designs, Codes and Cryptography, April 2016, vol. 79, no 1, pp. 87-112. [ DOI : 10.1007/s10623-015-0036-z ]
https://hal.inria.fr/hal-00964265 -
23M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
Quantum Differential and Linear Cryptanalysis, in: IACR Transactions on Symmetric Cryptology, 2016, vol. 2016, no 1.
https://hal.inria.fr/hal-01237242 -
24W. Mc Cutcheon, A. Pappa, B. A. Bell, A. Mcmillan, A. Chailloux, T. Lawson, M. S. Mafu, D. Markham, E. Diamanti, I. Kerenidis, J. Rarity, M. Tame.
Experimental verification of multipartite entanglement in quantum networks, in: Nature Communications, November 2016, vol. 7, 8 p. [ DOI : 10.1038/ncomms13251 ]
https://hal.inria.fr/hal-01409559 -
25I. Márquez-Corbella, R. Pellikaan.
A characterization of MDS codes that have an error correcting pair, in: Finite Fields and Their Applications, 2016, vol. 40, pp. 224 - 245. [ DOI : 10.1016/j.ffa.2016.04.004 ]
https://hal.inria.fr/hal-01408412
Invited Conferences
-
26C. Boura, A. Canteaut.
Another view of the division property, in: Symmetric Cryptography (Dagstuhl Seminar 16021), Dagstuhl, Germany, January 2016.
https://hal.inria.fr/hal-01401320 -
27A. Canteaut.
Algebraic Distinguishers against Symmetric Primitives, in: Paris Crypto Day, Paris, France, June 2016.
https://hal.inria.fr/hal-01401286 -
28A. Canteaut.
Chiffrer mieux pour (dé)chiffrer plus, in: Conférence d’Informatique de l'ENS, Paris, France, April 2016.
https://hal.inria.fr/hal-01401333 -
29A. Canteaut.
Comment concevoir un algorithme de chiffrement sûr et efficace : l'héritage de Shannon, in: Théorie de l’information : nouvelles frontières (dans le cadre du centenaire de Claude Shannon), Paris, France, IHP, October 2016.
https://hal.inria.fr/hal-01401325 -
30A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: CryptoAction Symposium 2016, Budapest, Hungary, April 2016.
https://hal.inria.fr/hal-01401328 -
31A. Chailloux.
Cryptographie relativiste, in: CCA 2016, Paris, France, July 2016.
https://hal.inria.fr/hal-01409564 -
32V. Lallemand.
Cryptanalysis of the FLIP Family of Stream Ciphers, in: Paris Crypto Day, Paris, France, September 2016.
https://hal.inria.fr/hal-01405423 -
33G. Leurent.
Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: TCCM-CACR 2016, Yinchuan, China, August 2016.
https://hal.inria.fr/hal-01407929 -
34G. Leurent.
Transcript Collision Attacks, in: Symmetric Cryptography (Dagstuhl Seminar 16021), Dagstuhl, Germany, January 2016.
https://hal.inria.fr/hal-01407921 -
35A. Leverrier.
Distributing Secret Keys with Quantum Continuous Variables, in: Recent Advances in Continuous-variable Quantum Information Theory, Barcelone, Spain, April 2016.
https://hal.inria.fr/hal-01407434 -
36A. Leverrier.
Quantum Expander Codes, in: Beyond i.i.d. in Information Theory, Barcelone, Spain, July 2016.
https://hal.inria.fr/hal-01407431 -
37J.-P. Tillich.
Attaining the capacity with Reed-Solomon codes through the construction and Koetter-Vardy soft decoding, in: Journée Claude Shannon, Paris, France, François Baccelli, Marc Lelarge, July 2016.
https://hal.inria.fr/hal-01413503
International Conferences with Proceedings
-
38M. Bardet, J. Chaulet, V. Dragoi, A. Otmani, J.-P. Tillich.
Cryptanalysis of the McEliece Public Key Cryptosystem based on Polar Codes, in: Post-Quantum Cryptography - PQCrypto 2016, Fukuoka, Japan, T. Takagi (editor), LNCS - Lecture Notes in Computer Science, Springer, February 2016, vol. 9606. [ DOI : 10.1007/978-3-319-29360-8_9 ]
https://hal.inria.fr/hal-01240856 -
39M. Bardet, V. Dragoi, A. Otmani, J.-P. Tillich.
Algebraic properties of polar codes from a new polynomial formalism, in: International Symposium on Information Theory ISIT 2016, Barcelona, Spain, July 2016, pp. 230 - 234. [ DOI : 10.1109/ISIT.2016.7541295 ]
https://hal.inria.fr/hal-01410210 -
40K. Bhargavan, G. Leurent.
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
https://hal.inria.fr/hal-01404208 -
42C. Boura, A. Canteaut.
Another View of the Division Property, in: Crypto 2016 (part I) - 36th Annual International Cryptology Conference, Santa Barbara, United States, Lecture Notes in Computer Science, Springer, August 2016, vol. 9814, pp. 654 - 682. [ DOI : 10.1007/978-3-662-53018-4_24 ]
https://hal.inria.fr/hal-01401016 -
43C. Boura, A. Chakraborti, G. Leurent, G. Paul, D. Saha, H. Soleimany, V. Suder.
Key Recovery Attack Against 2.5-Round Pi-Cipher, in: FSE 2016 - 23rd International Conference Fast Software Encryption, Bochum, Germany, T. Peyrin (editor), LNCS - Lecture Notes in Computer Science, Springer, March 2016, vol. 9783, pp. 535 - 553. [ DOI : 10.1007/978-3-662-52993-5_27 ]
https://hal.inria.fr/hal-01404164 -
44A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: FSE 2016 : 23rd International Conference on Fast Software Encryption, Bochum, Germany, Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016,, Springer, March 2016, vol. 9783 - LNCS (Lecture Notes in Computer Science), pp. 313-333. [ DOI : 10.1007/978-3-662-52993-5_16 ]
https://hal.archives-ouvertes.fr/hal-01280479 -
45A. Canteaut, Y. Rotella.
Attacks Against Filter Generators Exploiting Monomial Mappings, in: Fast Software Encrytion - FSE 2016, Bochum, Germany, Lecture Notes in Computer Science, Springer, March 2016, vol. 9783, pp. 78 - 98. [ DOI : 10.1007/978-3-662-52993-5_5 ]
https://hal.inria.fr/hal-01401009 -
46R. Canto Torres, N. Sendrier.
Analysis of Information Set Decoding for a Sub-linear Error Weight, in: Post-Quantum Cryptography - PQCrypto 2016, Fukuoka, Japan, February 2016.
https://hal.inria.fr/hal-01244886 -
47J. Chaulet, N. Sendrier.
Worst case QC-MDPC decoder for McEliece cryptosystem, in: IEEE International Symposium on Information Theory, ISIT 2016, Barcelone, Spain, ISIT 2016, proceedings, July 2016, 5 p. [ DOI : 10.1109/ISIT.2016.7541522 ]
https://hal.inria.fr/hal-01408633 -
48S. Duval, V. Lallemand, Y. Rotella.
Cryptanalysis of the FLIP Family of Stream Ciphers, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9814, pp. 457 - 475. [ DOI : 10.1007/978-3-662-53018-4_17 ]
https://hal.inria.fr/hal-01404145 -
49P. Gaborit, A. Hauteville, J.-P. Tillich.
RankSynd a PRNG Based on Rank Metric, in: Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, T. Takagi (editor), Lecture Notes in Computer Science, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Springer, February 2016, vol. 9606, pp. 18-28. [ DOI : 10.1007/978-3-319-29360-8_2 ]
https://hal.inria.fr/hal-01289338 -
50S. Gueron, N. Mouha.
Simpira v2: A Family of Efficient Permutations Using the AES Round Function, in: Advances in Cryptology - ASIACRYPT 2016, Hanoi, Vietnam, Lecture Notes in Computer Science, December 2016, vol. 10031, pp. 95-125. [ DOI : 10.1007/978-3-662-53887-6_4 ]
https://hal.inria.fr/hal-01403414 -
51M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
https://hal.inria.fr/hal-01404196 -
52L. Khati, N. Mouha, D. Vergnaud.
Full Disk Encryption: Bridging Theory and Practice, in: CT-RSA 2017 - RSA Conference Cryptographers' Track, San Francisco, United States, Lecture Notes in Computer Science, February 2017, 16 p.
https://hal.inria.fr/hal-01403418 -
53B. Lac, M. Beunardeau, A. Canteaut, J. J. A. Fournier, R. Sirdey.
A First DFA on PRIDE: from Theory to Practice, in: International Conference on Risks and Security of Internet and Systems - CRISIS 2016, Roscoff, France, Lecture Notes in Computer Science, September 2016.
https://hal.inria.fr/hal-01401271 -
54G. Leurent.
Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning, in: EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic, Vienna, Austria, M. Fischlin, J.-S. Coron (editors), Springer, May 2016, pp. 344 - 371. [ DOI : 10.1007/978-3-662-49890-3_14 ]
https://hal.inria.fr/hal-01404221 -
55I. Márquez-Corbella, E. Martínez-Moro.
Betti Numbers and Generalized Hamming Weights, in: 22nd Conference on Applications of Computer Algebra (ACA 2016), Kassel, Germany, August 2016.
https://hal.inria.fr/hal-01409298 -
56I. Márquez-Corbella, R. Pellikaan.
Is it hard to retrieve an error-correcting pair?, in: 22nd Conference on Applications of Computer Algebra (ACA 2016), Kassel, Germany, August 2016.
https://hal.inria.fr/hal-01409299 -
57I. Márquez-Corbella, J.-P. Tillich.
Using Reed-Solomon codes in the (U | U + V ) construction and an application to cryptography, in: International Symposium on Information Theory, Barcelona, Spain, July 2016.
https://hal.inria.fr/hal-01410201
Conferences without Proceedings
-
59A. Leverrier, J.-P. Tillich, G. Zémor.
Quantum Expander Codes, in: 19th International Conference on Quantum Information Processing, Banff, Canada, January 2016.
https://hal.inria.fr/hal-01244685 -
60J.-P. Tillich.
Attaining the capacity with Reed-Solomon codes through the construction and Koetter-Vardy soft decoding, in: CohenFest 2016, Paris, France, July 2016.
https://hal.inria.fr/hal-01413506
Scientific Books (or Scientific Book chapters)
-
61P. Charpin, S. Mesnager, S. Sarkar.
Dickson Polynomials that are Involutions, in: Contemporary Developments in Finite Fields and Their Applications, A. Canteaut, G. Effinger, S. Huczynska, D. Panario, L. Storme (editors), World Scientific Press, 2016, pp. 22-45. [ DOI : 10.1142/9789814719261_0003 ]
https://hal.inria.fr/hal-01237332
Books or Proceedings Editing
-
62A. Canteaut, G. Effinger, S. Huczynska, D. Panario, L. Storme (editors)
Contemporary Developments in Finite Fields and Applications , World Scientific, August 2016, 362 p. [ DOI : 10.1142/9762 ]
https://hal.inria.fr/hal-01401266 -
63P. Charpin, T. Johansson, G. M. Kyureghyan, N. Sendrier, J.-P. Tillich (editors)
Special issue on coding and cryptography, Design, Codes and Cryptography - Special issue on coding and cryptography, Springer, 2016. [ DOI : 10.1007/s10623-016-0307-3 ]
https://hal.archives-ouvertes.fr/hal-01406954
Internal Reports
-
64A. Canteaut, S. Duval, L. Perrin.
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size , IACR Cryptology ePrint Archive, September 2016, no 2016/887, 29 p.
https://hal.inria.fr/hal-01401245
Scientific Popularization
-
65A. Canteaut.
On the Origin of Trust: Struggle for Secure Cryptography, in: Dot Security 2016, Paris, France, April 2016.
https://hal.inria.fr/hal-01401311 -
66A. Chailloux.
L'ordinateur quantique, in: Art, cerveau, futur, Mouans Sartoux, France, September 2016.
https://hal.inria.fr/hal-01409565 -
67N. Sendrier, J.-P. Tillich.
Code-Based Cryptography: New Security Solutions Against a Quantum Adversary, in: ERCIM News, July 2016, vol. Special Theme Cybersecurity, no 106.
https://hal.archives-ouvertes.fr/hal-01410068
Other Publications
-
68X. Bonnetain.
Cryptanalyse quantique de primitives symétriques, Télécom ParisTech ; Paris Diderot, September 2016.
https://hal.inria.fr/hal-01409206 -
69R. Bricout.
Protocole de mise en gage de bit relativiste, MPRI, September 2016.
https://hal.inria.fr/hal-01419367 -
70R. Bricout, A. Chailloux.
Recursive cheating strategies for the relativistic bit commitment protocol, August 2016, working paper or preprint.
https://hal.inria.fr/hal-01409563 -
71K. Chakraborty, A. Chailloux, A. Leverrier.
Robust Relativistic Bit Commitment, October 2016, International Conference for Young Quantum Information Scientists, Poster.
https://hal.inria.fr/hal-01409527 -
72K. Chakraborty, A. Chailloux, A. Leverrier.
Robust Relativistic Bit Commitment, December 2016, working paper or preprint.
https://hal.inria.fr/hal-01407421 -
73A. Couvreur, I. Márquez-Corbella, R. Pellikaan.
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes, March 2016, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01280927 -
74T. Debris.
Décodage Statistique, MPRI, September 2016.
https://hal.inria.fr/hal-01413092 -
75G. Kachigar.
Étude et conception d'algorithmes quantiques pour le décodage de codes linéaires , Université de Rennes 1, France, September 2016, 127 p.
https://hal.inria.fr/hal-01371018