Bibliography
Major publications by the team in recent years
-
1D. Augot, M. Finiasz.
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes, in: 21st International Workshop on Fast Software Encryption, FSE 2014, London, United Kingdom, C. Cid, C. Rechberger (editors), springer, March 2014.
https://hal.inria.fr/hal-01044597 -
2A. Couvreur, I. Márquez-Corbella, R. Pellikaan.
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems, in: Information Theory (ISIT), 2014 IEEE International Symposium on, Honolulu, United States, IEEE, June 2014, pp. 1446-1450. [ DOI : 10.1109/ISIT.2014.6875072 ]
https://hal.archives-ouvertes.fr/hal-00937476 -
3A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: EUROCRYPT 2014, Copenhagen, Denmark, May 2014, pp. 17-39.
https://hal.archives-ouvertes.fr/hal-00931774 -
4P. Lebacque, A. Zykin.
On the Number of Rational Points of Jacobians over Finite Fields, in: Acta Arith., 2015, vol. 169, pp. 373–384.
https://hal.archives-ouvertes.fr/hal-01081468 -
5F. Morain.
Implementing the asymptotically fast version of the elliptic curve primality proving algorithm, in: Math. Comp., 2007, vol. 76, pp. 493–505. -
6B. Smith.
Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves, in: J. of Cryptology, 2009, vol. 22, no 4, pp. 505-529. -
7B. Smith.
Families of fast elliptic curves from Q-curves, in: Advances in Cryptology - ASIACRYPT 2013, Bangalore, India, K. Sako, P. Sarkar (editors), Lecture Notes in Computer Science, Springer, December 2013, vol. 8269, pp. 61-78. [ DOI : 10.1007/978-3-642-42033-7_4 ]
https://hal.inria.fr/hal-00825287
Articles in International Peer-Reviewed Journals
-
8D. Augot, P. Loidreau, G. Robert.
Generalized Gabidulin codes over fields of any characteristic, in: Designs, Codes and Cryptography, 2017, https://arxiv.org/abs/1703.09125, forthcoming. [ DOI : 10.1007/s10623-017-0425-6 ]
https://hal.archives-ouvertes.fr/hal-01503212 -
9C. Costello, B. Smith.
Montgomery curves and their arithmetic: The case of large characteristic fields, in: Journal of Cryptographic Engineering, 2017, https://arxiv.org/abs/1703.01863. [ DOI : 10.1007/s13389-017-0157-6 ]
https://hal.inria.fr/hal-01483768 -
10A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
https://hal.inria.fr/hal-01661935 -
11C. Ritzenthaler, R. Lercier, F. Rovetta, J. Sijsling, B. Smith.
Distributions of traces of Frobenius for smooth plane curves over finite fields, in: Experimental Mathematics, 2017, https://arxiv.org/abs/1510.05601. [ DOI : 10.1080/10586458.2017.1328321 ]
https://hal.inria.fr/hal-01217995
International Conferences with Proceedings
-
12D. Augot, H. Chabanne, T. Chenevier, W. George, L. Lamber.
A User-Centric System for Verified Identities on the Bitcoin Blockchain, in: International Workshop on Cryptocurrencies and Blockchain Technology - CBT'17, Oslo, Norway, September 2017, https://arxiv.org/abs/1710.02019.
https://hal.inria.fr/hal-01611251 -
13D. Augot, H. Chabanne, O. Clémot, W. George.
Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain, in: PST2017 - International Conference on Privacy, Security and Trust, Calgary, Canada, August 2017, 10 p, https://arxiv.org/abs/1710.02951.
https://hal.inria.fr/hal-01611297 -
14L. Grémy, A. Guillevic, F. Morain, E. Thomé.
Computing discrete logarithms in , in: 24th Annual Conference on Selected Areas in Cryptography, Ottawa, Canada, August 2017.
https://hal.inria.fr/hal-01624662 -
15J. Renes, B. Smith.
qDSA: Small and Secure Digital Signatures with Curve-based Diffie–Hellman Key Pairs, in: ASIACRYPT 2017, Hong Kong, China, IACR, December 2017, https://arxiv.org/abs/1709.03358.
https://hal.inria.fr/hal-01585322
Conferences without Proceedings
-
16E. Barelli.
On the security of Some Compact Keys for McEliece Scheme, in: WCC 2017 - The Tenth International Workshop on Coding and Cryptography, St Petersbourg, Russia, September 2017, pp. 1-9.
https://hal.inria.fr/hal-01674546 -
17J. Lavauzelle.
Constructions for efficient Private Information Retrieval protocols, in: WCC 2017 - The Tenth International Workshop on Coding and Cryptography, Saint-Petersbourg, Russia, Inria and SUAI and Skoltech, September 2017, pp. 1-12.
https://hal.inria.fr/hal-01633469
Other Publications
-
18C. Bachoc, A. Couvreur, G. Zémor.
Towards a function field version of Freiman's Theorem, September 2017, https://arxiv.org/abs/1709.00087 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01584034 -
19M. Bardet, E. Barelli, O. Blazy, R. Canto Torres, A. Couvreur, P. Gaborit, A. Otmani, N. Sendrier, J.-P. Tillich.
BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation, December 2017, submission to the NIST post quantum cryptography standardization process.
https://hal.archives-ouvertes.fr/hal-01671866 -
20E. Barelli, P. Beelen, M. Datta, V. Neiger, J. Rosenkilde.
Two-Point Codes for the Generalized GK Curve, October 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01535513 -
21N. Coxon.
Fast systematic encoding of multiplicity codes, April 2017, https://arxiv.org/abs/1704.07083 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01512372 -
22L. Grémy, A. Guillevic, F. Morain.
Breaking DLP in using 3-dimensional sieving, July 2017, working paper or preprint.
https://hal.inria.fr/hal-01568373
-
23A. Guillevic, F. Morain, E. Thomé.
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction, in: Selected Areas in Cryptography 2016, St. John's, Canada, R. Avanzi, H. Heys (editors), Selected Areas in Cryptography 2016, Springer, August 2016, to appear in the Lecture Notes in Computer Science (LNCS).
https://hal.inria.fr/hal-01320496