Bibliography
Major publications by the team in recent years
-
1K. Bhargavan, G. Leurent.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
https://hal.inria.fr/hal-01404208 -
2A. Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, J.-R. Reinhard, C. Thuillet, M. Videau.
Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, October 2008, Submission to NIST. -
3A. Canteaut, M. Naya-Plasencia, B. Vayssière.
Sieve-in-the-Middle: Improved MITM Attacks, in: Advances in Cryptology - CRYPTO 2013, Part I, Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 222–240. -
4A. Canteaut, J. Roué.
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
https://hal.inria.fr/hal-01104051 -
5K. Chakraborty, A. Chailloux, A. Leverrier.
Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
https://hal.inria.fr/hal-01237241 -
6P. Charpin, G. M. Kyureghyan, V. Suder.
Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
https://hal.archives-ouvertes.fr/hal-01068860 -
7N. Courtois, M. Finiasz, N. Sendrier.
How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174. -
8J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich.
Algebraic Cryptanalysis of McEliece Variants with Compact Keys, in: Advances in Cryptology - EUROCRYPT 2010, LNCS, Springer, 2010, no 6110, pp. 279-298.
http://dx.doi.org/10.1007/978-3-642-13190-5_14 -
9M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
https://hal.inria.fr/hal-01404196 -
10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
https://hal.inria.fr/hal-00870929
Doctoral Dissertations and Habilitation Theses
-
11K. Chakraborty.
Cryptography with Spacetime Constraints, Université Pierre et Marie Curie - Paris VI, October 2017.
https://hal.inria.fr/tel-01637818 -
12J. Chaulet.
Study of public key cryptosystems based on quasi-cyclic MDPC codes, Université Pierre et Marie Curie - Paris VI, March 2017.
https://tel.archives-ouvertes.fr/tel-01599347 -
13A. Leverrier.
Protecting information in a quantum world: from cryptography to error correction, Université Pierre et Marie Curie - Paris VI, September 2017, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-01636624 -
14M. Naya-Plasencia.
Symmetric Cryptography for Long-Term Security, Université Pierre et Marie Curie - Paris VI, May 2017, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-01656036
Articles in International Peer-Reviewed Journals
-
15C. Boura, A. Canteaut, L. R. Knudsen, G. Leander.
Reflection ciphers, in: Designs, Codes and Cryptography, January 2017, vol. 82, no 1–2, pp. 3–25. [ DOI : 10.1007/s10623-015-0143-x ]
https://hal.inria.fr/hal-01237135 -
16R. Bricout, A. Chailloux.
Recursive cheating strategies for the relativistic bit commitment protocol, in: MDPI - Cryptography, August 2017, https://arxiv.org/abs/1608.03820. [ DOI : 10.3390/cryptography1020014 ]
https://hal.inria.fr/hal-01409563 -
17A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: Journal of Cryptology, 2017, forthcoming.
https://hal.inria.fr/hal-01650012 -
18A. Canteaut, S. Duval, L. Perrin.
A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size , in: IEEE Transactions on Information Theory, 2017, vol. 63, no 11, pp. 7575–7591. [ DOI : 10.1109/TIT.2017.2676807 ]
https://hal.inria.fr/hal-01589131 -
19A. Canteaut, E. Lambooij, S. Neves, S. Rasoolzadeh, Y. Sasaki, M. Stevens.
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds, in: IACR Transactions on Symmetric Cryptology, May 2017, vol. 2017, no 2, pp. 203–227. [ DOI : 10.13154/tosc.v2017.i2.203-227 ]
https://hal.inria.fr/hal-01649954 -
20C. Carlet, P. Méaux, Y. Rotella.
Boolean functions with restricted input and their robustness; application to the FLIP cipher, in: IACR Transactions on Symmetric Cryptology, 2017, vol. 2017, no 3, pp. 192–227. [ DOI : 10.13154/tosc.v2017.i3.192-227 ]
https://hal.inria.fr/hal-01633506 -
21N. Cepak, P. Charpin, E. Pasalic.
Permutations via linear translators, in: Finite Fields and Their Applications, 2017, vol. 45, pp. 19–42, https://arxiv.org/abs/1609.09291. [ DOI : 10.1016/j.ffa.2016.11.009 ]
https://hal.inria.fr/hal-01412487 -
22A. Chailloux, I. Kerenidis.
Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment, in: SIAM Journal on Computing, January 2017, vol. 46, no 5, pp. 1647–1677. [ DOI : 10.1137/15M1010853 ]
https://hal.inria.fr/hal-01650970 -
23P. Charpin, G. M. Kyureghyan.
On sets determining the differential spectrum of mappings, in: International journal of information and Coding Theory, 2017, vol. 4, no 2/3, pp. 170–184, Special issue on the honor of Gerard Cohen. [ DOI : 10.1504/IJICOT.2017.083844 ]
https://hal.inria.fr/hal-01406589 -
24A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
https://hal.inria.fr/hal-01661935 -
25I. Dinur, G. Leurent.
Improved Generic Attacks Against Hash-Based MACs and HAIFA, in: Algorithmica, December 2017, vol. 79, no 4, pp. 1161–1195. [ DOI : 10.1007/s00453-016-0236-6 ]
https://hal.inria.fr/hal-01407953 -
26A. Leverrier.
Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction, in: Physical Review Letters, May 2017, vol. 118, no 20, pp. 1–24, https://arxiv.org/abs/1701.03393. [ DOI : 10.1103/PhysRevLett.118.200501 ]
https://hal.inria.fr/hal-01652082 -
27M. Tomamichel, A. Leverrier.
A largely self-contained and complete security proof for quantum key distribution, in: Quantum, 2017, vol. 1, 14 p, https://arxiv.org/abs/1506.08458. [ DOI : 10.22331/q-2017-07-14-14 ]
https://hal.inria.fr/hal-01237240
Invited Conferences
-
28C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving Resistance against Invariant Attacks: Properties of the Linear Layer , in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
https://hal.inria.fr/hal-01649994 -
29C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving resistance of a block cipher against invariant attacks, in: BFA 2017 - Boolean Functions and their Applications, Os, Norway, July 2017.
https://hal.inria.fr/hal-01649990 -
30A. Chailloux.
A tight security reduction in the quantum random oracle model for code-based signature schemes, in: 2017 - IRIF Algocomp seminar, Paris, France, November 2017.
https://hal.inria.fr/hal-01660701 -
31G. Leurent, K. Bhargavan.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
https://hal.inria.fr/hal-01105128 -
32G. Leurent.
Bad Symmetric Crypto in the Real World, in: Journées Nationales 2017 Pré-GDR Sécurité Informatique, Paris, France, May 2017.
https://hal.inria.fr/hal-01652853 -
33G. Leurent.
Breaking Symmetric Cryptosystems Using Quantum Algorithms, in: FOQUS - Frontiers of Quantum Safe Cryptography, Paris, France, April 2017.
https://hal.inria.fr/hal-01652852 -
34A. Leverrier.
A Gaussian de Finetti theorem and application to truncations of random Haar matrices, in: Workshop on ”Probabilistic techniques and Quantum Information Theory”, Paris, France, October 2017, pp. 1-60.
https://hal.inria.fr/hal-01656425 -
35A. Leverrier.
Efficient decoding of random errors for quantum expander codes, in: Conference on ”Quantum Information Theory”, Paris, France, December 2017, pp. 1-33.
https://hal.inria.fr/hal-01656427 -
36A. Leverrier.
Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction, in: TyQi 2017 - Trustworthy Quantum Information, Paris, France, June 2017.
https://hal.inria.fr/hal-01656418 -
37A. Leverrier.
Theoretical challenges in continuous-variable quantum cryptography, in: QCrypt 2017 - 7th International Conference on Quantum Cryptography, Cambridge, United Kingdom, September 2017, pp. 1-26.
https://hal.inria.fr/hal-01656419 -
38M. Naya-Plasencia.
New results on symmetric quantum cryptanalysis, in: Dagstuhl Seminar 17401 - Quantum Cryptanalysis, Dagstuhl, Germany, October 2017.
https://hal.inria.fr/hal-01671913 -
39J.-P. Tillich.
Code based cryptography and quantum attacks, in: Dagstuhl Seminar 17401 - Quantum cryptanalysis, Dagstuhl, Germany, October 2017.
https://hal.archives-ouvertes.fr/hal-01671921
International Conferences with Proceedings
-
40P. S. L. M. Barreto, S. Gueron, T. Guneysu, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich.
CAKE: Code-based Algorithm for Key Encapsulation, in: IMACC 2017 - 16th IMA International Conference on Cryptography and Coding, Oxford, United Kingdom, M. O'Neill (editor), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10655, pp. 207–226. [ DOI : 10.1007/978-3-319-71045-7_11 ]
https://hal.inria.fr/hal-01661949 -
41C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]
https://hal.inria.fr/hal-01631130 -
42A. Biryukov, L. Perrin.
Symmetrically and Asymmetrically Hard Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10626, pp. 417–445. [ DOI : 10.1007/978-3-319-70700-6_15 ]
https://hal.inria.fr/hal-01650044 -
43O. Blazy, P. Gaborit, J. Schrek, N. Sendrier.
A code-based blind signature, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 2718–2722. [ DOI : 10.1109/ISIT.2017.8007023 ]
https://hal.archives-ouvertes.fr/hal-01610410 -
44X. Bonnetain.
Quantum Key-Recovery on full AEZ, in: SAC 2017 - Selected Areas in Cryptography, Ottawa, Canada, August 2017.
https://hal.inria.fr/hal-01650026 -
45C. Boura, A. Canteaut, J. Jean, V. Suder.
Two Notions of Differential Equivalence on Sboxes, in: WCC 2017 - Workshop on Coding and Cryptography, Saint Petersburg, Russia, September 2017.
https://hal.inria.fr/hal-01650010 -
46A. Chailloux, A. Leverrier.
Relativistic (or 2-Prover 1-Round) Zero-Knowledge Protocol for NP Secure Against Quantum Adversaries, in: Eurocrypt 2017 - Advances in Cryptology, Paris, France, J.-S. Coron, J. B. Nielsen (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2017, vol. 10212, pp. 369–396. [ DOI : 10.1007/978-3-319-56617-7_13 ]
https://hal.inria.fr/hal-01650985 -
47A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]
https://hal.inria.fr/hal-01651007 -
48T. Debris-Alazard, J.-P. Tillich.
Statistical Decoding, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 1789–1802. [ DOI : 10.1109/ISIT.2017.8006839 ]
https://hal.inria.fr/hal-01661749 -
49P. Gaborit, A. Hauteville, D. H. Phan, J.-P. Tillich.
Identity-based Encryption from Codes with Rank Metric, in: Crypto 2017 - Advances in Cryptology, Santa-Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10403, pp. 194–224. [ DOI : 10.1007/978-3-319-63697-9_7 ]
https://hal.inria.fr/hal-01589463 -
50G. Kachigar, J.-P. Tillich.
Quantum Information Set Decoding Algorithms, in: PQCrypto 2017 - The Eighth International Conference on Post-Quantum Cryptography, Utrecht, Netherlands, T. Lange, T. Takagi (editors), LNCS - Lecture Notes in Computer Science, Springer, June 2017, vol. 10346, pp. 69-89. [ DOI : 10.1007/978-3-319-59879-6_5 ]
https://hal.inria.fr/hal-01661905 -
51L. Khati, N. Mouha, D. Vergnaud.
Full Disk Encryption: Bridging Theory and Practice, in: CT-RSA 2017 - RSA Conference Cryptographers' Track, San Francisco, United States, H. Handschuh (editor), Lecture Notes in Computer Science, Springer, February 2017, vol. 10159, pp. 241–257. [ DOI : 10.1007/978-3-319-52153-4_14 ]
https://hal.inria.fr/hal-01403418 -
52B. Lac, A. Canteaut, J. J. A. Fournier, R. Sirdey.
DFA on LS-Designs with a Practical Implementation on SCREAM, in: COSADE 2017 - Constructive Side-Channel Analysis and Secure Design, Paris, France, S. Guilley (editor), LNCS - Lecture Notes in Computer Science, Springer, April 2017, vol. 10348, pp. 223–247. [ DOI : 10.1007/978-3-319-64647-3_14 ]
https://hal.inria.fr/hal-01649974 -
53I. Marquez-Corbella, J.-P. Tillich.
Attaining Capacity with iterated codes based on AG codes and Koetter-Vardy soft decoding, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 6–10. [ DOI : 10.1109/ISIT.2017.8006479 ]
https://hal.inria.fr/hal-01661977
Conferences without Proceedings
-
54C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Attaques par invariant : comment s'en protéger?, in: Journées codage et cryptographie 2017, La Bresse, France, April 2017, 1 p.
https://hal.inria.fr/hal-01633519 -
55A. Canteaut, S. Duval, L. Perrin.
On a generalisation of Dillon’s APN permutation, in: Fq13 - Finite Fields and Applications, Gaeta, Italy, June 2017.
https://hal.inria.fr/hal-01650001 -
56A. Chailloux.
A tight security reduction in the quantum random oracle model for code-based signature schemes, in: Code based crypto seminar, Paris, France, October 2017, pp. 1-22.
https://hal.inria.fr/hal-01660693 -
57O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, in: QIP 2018 - 21th Annual Conference on Quantum Information Processing, Delft, Netherlands, QuTech, January 2018, pp. 1-31, https://arxiv.org/abs/1711.08351 - 31 pages.
https://hal.archives-ouvertes.fr/hal-01654670 -
58A. Grospellier, A. Leverrier, O. Fawzi.
Efficient decoding of random errors for quantum expander codes, in: Journées Informatique Quantique 2017, Bordeaux, France, November 2017.
https://hal.archives-ouvertes.fr/hal-01671491 -
59A. Grospellier, A. Leverrier, O. Fawzi.
Quantum expander codes, in: Journées codage et cryptographie 2017, La Bresse, France, April 2017.
https://hal.archives-ouvertes.fr/hal-01671485 -
60G. Leurent, M. Kaplan, A. Leverrier, M. Naya-Plasencia.
Quantum differential and linear cryptanalysis, in: FSE 2017 - Fast Software Encryption, Tokyo, Japan, March 2017.
https://hal.inria.fr/hal-01652807 -
61A. Leverrier.
SU(p,q) coherent states and Gaussian de Finetti theorems, in: QIP 2017 - 20th Annual Conference on Quantum Information Processing, Seattle, United States, January 2017, pp. 1-24.
https://hal.inria.fr/hal-01656414 -
62V. Londe.
Golden codes: 4D hyperbolic regular quantum codes, in: 8th colloquium of the GDR IQFA - Ingénierie Quantique, des Aspects Fondamentaux aux Applications, Nice, France, November 2017.
https://hal.inria.fr/hal-01671528 -
63V. Londe.
Homological quantum error correcting codes and real projective space, in: Journées Codage et Cryptographie 2017, La Bresse, France, April 2017.
https://hal.inria.fr/hal-01671444 -
64V. Londe.
4D hyperbolic regular quantum codes, in: Journées Informatique Quantique 2017, Bordeaux, France, November 2017.
https://hal.inria.fr/hal-01671456 -
65N. Sendrier.
Quantum Safe Cryptography from Codes: Present and Future, in: 16th IMA International Conference on Cryptography and Coding, Oxford, United Kingdom, December 2017.
https://hal.archives-ouvertes.fr/hal-01671452
Scientific Popularization
-
66A. Chailloux.
Cryptographie Quantique en théorie, in: 2017 - 9ème Journée Mathématiques en Mouvement sur l'ordinateur quantique, Paris, France, FSMP, May 2017.
https://hal.inria.fr/hal-01660726
Other Publications
-
67N. Aragon, P. S. L. M. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C. Aguilar Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich, G. Zémor.
BIKE: Bit Flipping Key Encapsulation, December 2017, Submission to the NIST post quantum standardization process.
https://hal.archives-ouvertes.fr/hal-01671903 -
68N. Aragon, P. Gaborit, A. Hauteville, J.-P. Tillich.
Improvement of Generic Attacks on the Rank Syndrome Decoding Problem, October 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01618464 -
69M. Bardet, E. Barelli, O. Blazy, R. Canto Torres, A. Couvreur, P. Gaborit, A. Otmani, N. Sendrier, J.-P. Tillich.
BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation, December 2017, submission to the NIST post quantum cryptography standardization process.
https://hal.archives-ouvertes.fr/hal-01671866 -
70A. Chailloux, T. Debris-Alazard.
A tight security reduction in the quantum random oracle model for code-based signature schemes , December 2017, working paper or preprint.
https://hal.inria.fr/hal-01671870 -
71T. Debris-Alazard, J.-P. Tillich.
Statistical Decoding, December 2017, working paper or preprint.
https://hal.inria.fr/hal-01661745 -
72O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, December 2017, working paper or preprint.
https://hal.inria.fr/hal-01671348 -
73O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, November 2017, 8th colloquium of the GDR IQFA - Ingénierie Quantique, des Aspects Fondamentaux aux Applications, Poster.
https://hal.archives-ouvertes.fr/hal-01671496 -
74M. Lequesne.
Side Channel Key Recovery Attacks on QC-MDPC Codes, MPRI, September 2017, pp. 1-22.
https://hal.inria.fr/hal-01658381 -
75A. Leverrier.
coherent states and a Gaussian de Finetti theorem, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01652084 -
76A. Schrottenloher.
Collision search and quantum symmetric cryptanalysis, Université Paris-Saclay, September 2017, pp. 1-25.
https://hal.inria.fr/hal-01654190 -
77F. Sibleyras.
Cryptanalysis of the Counter mode of operation, Paris 7, September 2017.
https://hal.inria.fr/hal-01662040 -
78V. Vasseur.
Cryptographie post-quantique : étude du décodage des codes QC-MDPC, Université Grenoble-Alpes, September 2017.
https://hal.inria.fr/hal-01664082 -
79M. de la Morinerie.
Implémentation à seuil de boîtes S, Ecole Polytechnique, July 2017.
https://hal.inria.fr/hal-01672270