Bibliography
Major publications by the team in recent years
-
1C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]
https://hal.inria.fr/hal-01631130 -
2K. Bhargavan, G. Leurent.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
https://hal.inria.fr/hal-01404208 -
3A. Canteaut, J. Roué.
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
https://hal.inria.fr/hal-01104051 -
4A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]
https://hal.inria.fr/hal-01651007 -
5K. Chakraborty, A. Chailloux, A. Leverrier.
Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
https://hal.inria.fr/hal-01237241 -
6P. Charpin, G. M. Kyureghyan, V. Suder.
Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
https://hal.archives-ouvertes.fr/hal-01068860 -
7N. Courtois, M. Finiasz, N. Sendrier.
How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174. -
8A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
https://hal.inria.fr/hal-01661935 -
9M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
https://hal.inria.fr/hal-01404196 -
10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
https://hal.inria.fr/hal-00870929
Doctoral Dissertations and Habilitation Theses
-
11X. Bonnetain.
Hidden Structures and Quantum Cryptanalysis, Sorbonne Université, November 2019.
https://tel.archives-ouvertes.fr/tel-02400328 -
12T. Debris-Alazard.
Code-based Cryptography: New Approaches for Design and Proof ; Contribution to Cryptanalysis, Sorbonne Universites, UPMC University of Paris 6, December 2019.
https://hal.inria.fr/tel-02424234 -
13A. Grospellier.
Constant Time Decoding of Quantum Expander Codes and Application to Fault-Tolerant Quantum Computation, Sorbonne universités, November 2019.
https://hal.inria.fr/tel-02422585 -
14V. Londe.
Topological Quantum Error-Correcting Codes beyond dimension 2, Inria Paris ; Université de bordeaux, December 2019.
https://hal.inria.fr/tel-02429868
Articles in International Peer-Reviewed Journals
-
15Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang.
Generic Attacks on Hash Combiners, in: Journal of Cryptology, 2020, 82 p, forthcoming. [ DOI : 10.1007/s00145-019-09328-w ]
https://hal.inria.fr/hal-02424905 -
16J.-F. Biasse, X. Bonnetain, B. Pring, A. Schrottenloher, W. Youmans.
A trade-off between classical and quantum circuit size for an attack against CSIDH, in: Journal of Mathematical Cryptology, August 2019, pp. 1-16.
https://hal.inria.fr/hal-02423394 -
17X. Bonnetain, M. Naya-Plasencia, A. Schrottenloher.
Quantum Security Analysis of AES, in: IACR Transactions on Symmetric Cryptology, June 2019, vol. 2019, no 2, pp. 55-93. [ DOI : 10.13154/tosc.v2019.i2.55-93 ]
https://hal.inria.fr/hal-02397049 -
18C. Boura, A. Canteaut, D. Coggia.
A General Proof Framework for Recent AES Distinguishers, in: IACR Transactions on Symmetric Cryptology, March 2019, vol. 2019, no 1, pp. 170-191. [ DOI : 10.13154/tosc.v2019.i1.170-191 ]
https://hal.inria.fr/hal-02431695 -
19C. Boura, A. Canteaut, J. Jean, V. Suder.
Two Notions of Differential Equivalence on Sboxes, in: Designs, Codes and Cryptography, 2019, vol. 87, no 2-3, pp. 185-202, forthcoming. [ DOI : 10.1007/s10623-018-0496-z ]
https://hal.inria.fr/hal-01944565 -
20C. Boura, E. Chavli, M. Chlouveraki, K. Karvounis.
The BMM symmetrising trace conjecture for groups , , , , , in: Journal of Symbolic Computation, 2020, vol. 96, pp. 62-84, https://arxiv.org/abs/1802.07482. [ DOI : 10.1016/j.jsc.2019.02.012 ]
https://hal.archives-ouvertes.fr/hal-02147376 -
21A. Canteaut, L. Perrin.
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 209-246. [ DOI : 10.1016/j.ffa.2018.11.008 ]
https://hal.inria.fr/hal-01953353 -
22A. Canteaut, L. Perrin, S. Tian.
If a generalised butterfly is APN then it operates on 6 bits, in: Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , November 2019, vol. 11, no 6, pp. 1147-1164. [ DOI : 10.1007/s12095-019-00361-x ]
https://hal.inria.fr/hal-02420992 -
23K. Carrier, J.-P. Tillich.
Identifying an unknown code by partial Gaussian elimination, in: Designs, Codes and Cryptography, March 2019, vol. 87, no 2-3, pp. 685-713. [ DOI : 10.1007/s10623-018-00593-7 ]
https://hal.inria.fr/hal-02424098 -
24D. Chang, N. Datta, A. Dutta, B. Mennink, M. Nandi, S. Sanadhya, F. Sibleyras.
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE, in: IACR Transactions on Symmetric Cryptology, 2019, forthcoming.
https://hal.inria.fr/hal-02424957 -
25P. Charpin, P. Langevin.
Obituary of Jacques Wolfmann (1932–2018), in: Designs, Codes and Cryptography, May 2019, vol. 87, no 5, pp. 955-956. [ DOI : 10.1007/s10623-019-00631-y ]
https://hal-univ-tln.archives-ouvertes.fr/hal-02168222 -
26P. Charpin, J. Peng.
Differential uniformity and the associated codes of cryptographic functions, in: Advances in Mathematics of Communications, November 2019, vol. 13, no 4, pp. 579-600. [ DOI : 10.3934/amc.2019036 ]
https://hal.inria.fr/hal-01908336 -
27P. Charpin, J. Peng.
New links between nonlinearity and differential uniformity, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 188-208. [ DOI : 10.1016/j.ffa.2018.12.001 ]
https://hal.inria.fr/hal-01907499 -
28S. Ghorai, E. Diamanti, A. Leverrier.
Composable security of two-way continuous-variable quantum key distribution without active symmetrization, in: Physical Review A, January 2019, vol. 99, no 1, 11 p, https://arxiv.org/abs/1806.11356. [ DOI : 10.1103/PhysRevA.99.012311 ]
https://hal.archives-ouvertes.fr/hal-02096575 -
29S. Ghorai, P. Grangier, E. Diamanti, A. Leverrier.
Asymptotic security of continuous-variable quantum key distribution with a discrete modulation, in: Physical Review X, June 2019, vol. 9, no 2, 11 p, https://arxiv.org/abs/1902.01317. [ DOI : 10.1103/PhysRevX.9.021059 ]
https://hal.archives-ouvertes.fr/hal-02163714 -
30A. Krishna, J.-P. Tillich.
Towards Low Overhead Magic State Distillation, in: Physical Review Letters, August 2019, vol. 123, no 7, 4 p. [ DOI : 10.1103/PhysRevLett.123.070507 ]
https://hal.inria.fr/hal-02424053
Invited Conferences
-
32A. Canteaut.
Algebraic attacks on symmetric primitives for advanced protocols, in: Frisiacrypt 2019 - Workshop on Symmetric Cryptography, Borkum, Germany, September 2019.
https://hal.inria.fr/hal-02431723 -
33A. Canteaut.
Cryptanalysis – a Never-Ending Story, in: Guest lecture for Honorary Doctorate, Bergen, Norway, October 2019.
https://hal.inria.fr/hal-02431731 -
34A. Canteaut.
Searching for APN permutations with the butterfly construction, in: CANADAM 2019 - minisymposium on "Finite Fields in Discrete Mathematics", Vancouver, Canada, May 2019.
https://hal.inria.fr/hal-02431757 -
35P. Charpin.
Crooked and weakly crooked functions, in: Fq14 - 14th international conference on Finite Fields and Applications -, Vancouver, Canada, June 2019.
https://hal.inria.fr/hal-02431744 -
36A. Leverrier, V. Londe, G. Zémor.
Quantum local testability, in: Symmetry, Phases of Matter, and Resources in Quantum Computing, Waterloo, Canada, November 2019.
https://hal.inria.fr/hal-02432364 -
37M. Naya-Plasencia.
Preparing Symmetric Crypto for the Quantum World, in: FSE 2019 - 26th Annual Fast Software Encryption Conference, Paris, France, March 2019.
https://hal.inria.fr/hal-02424409 -
38M. Naya-Plasencia, A. Schrottenloher, A. Chailloux, L. Grassi.
New algorithms for quantum (symmetric) cryptanalysis, in: QuAC: Quantum Algorithms for Cryptanalysis, Darmstadt, Germany, May 2019.
https://hal.inria.fr/hal-02423376 -
39M. Naya-Plasencia, A. Schrottenloher, A. Chailloux, L. Grassi.
Quantum Merging Algorithms, in: Dagstuhl Seminar 19421 Quantum Cryptanalysis, Dagstuhl, Germany, October 2019.
https://hal.inria.fr/hal-02423380 -
40F. Sibleyras.
The Missing Difference Problem, and its Applications to Counter Mode Encryption, in: Invited talk at NTT Secure Platform Laboratories, Musashino, Japan, September 2019.
https://hal.inria.fr/hal-02424996 -
41F. Sibleyras.
Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem, in: Invited talk at NTT Secure Platform Laboratories, Musashino, Japan, September 2020.
https://hal.inria.fr/hal-02425000
International Conferences with Proceedings
-
42S. Apers.
Quantum Walk Sampling by Growing Seed Sets, in: ESA 2019 - 27th Annual European Symposium on Algorithms, Munich/Garching, Germany, September 2019, https://arxiv.org/abs/1904.11446. [ DOI : 10.4230/LIPIcs.ESA.2019.9 ]
https://hal.inria.fr/hal-02436629 -
43X. Bonnetain, A. Hosoyamada, M. Naya-Plasencia, Y. Sasaki, A. Schrottenloher.
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm, in: ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, LNCS, Springer, December 2019, vol. 11921, pp. 552-583. [ DOI : 10.1007/978-3-030-34578-5_20 ]
https://hal.inria.fr/hal-02397056 -
44X. Bonnetain, L. Perrin, S. Tian.
Anomalies and Vector Space Search: Tools for S-Box Analysis, in: ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, LNCS, Springer, November 2019, vol. 11921, pp. 196-223. [ DOI : 10.1007/978-3-030-34578-5_8 ]
https://hal.inria.fr/hal-02396738 -
45R. Bricout, A. Chailloux, T. Debris-Alazard, M. Lequesne.
Ternary Syndrome Decoding with Large Weight, in: SAC 2019 - 26th International Conference Selected Areas in Cryptography, Waterloo, Canada, August 2019.
https://hal.inria.fr/hal-02420997 -
46A. Canteaut, V. Lallemand, G. Leander, P. Neumann, F. Wiemer.
Bison: Instantiating the Whitened Swap-Or-Not Construction, in: Eurocrypt 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, LNCS, Springer, May 2019, vol. 11478. [ DOI : 10.1007/978-3-030-17659-4_20 ]
https://hal.inria.fr/hal-02431714 -
47R. Canto-Torres, J.-P. Tillich.
Speeding up decoding a code with a non-trivial automorphism group up to an exponential factor, in: ISIT 2019 - IEEE International Symposium on Information Theory, Paris, France, IEEE, July 2019, pp. 1927-1931. [ DOI : 10.1109/ISIT.2019.8849628 ]
https://hal.inria.fr/hal-02424101 -
48A. Couvreur, M. Lequesne, J.-P. Tillich.
Recovering short secret keys of RLCE encryption scheme in polynomial time, in: PQCrypto 2019 - International Conference on Post-Quantum Cryptography, Chongqing, China, May 2019, https://arxiv.org/abs/1805.11489. [ DOI : 10.1007/978-3-030-25510-7_8 ]
https://hal.inria.fr/hal-01959617 -
50O. Dunkelman, L. Perrin.
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs, in: SSR 2019 - Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, Royaume-Uni, ACM Press, November 2019, pp. 69-80. [ DOI : 10.1145/3338500.3360335 ]
https://hal.inria.fr/hal-02396695 -
51S. Duval, G. Leurent.
Lightweight MACs from Universal Hash Functions, in: CARDIS 2019 - 18th Smart Card Research and Advanced Application Conference, Prague, Czech Republic, November 2019.
https://hal.inria.fr/hal-02424904 -
52G. Leurent, T. Peyrin.
From Collisions to Chosen-Prefix Collisions : Application to Full SHA-1, in: Eurocrypt 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, LNCS, Springer, April 2019, vol. 11478, pp. 527-555. [ DOI : 10.1007/978-3-030-17659-4_18 ]
https://hal.inria.fr/hal-02424900 -
53G. Leurent, F. Sibleyras.
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem, in: CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, United States, A. Boldyreva, D. Micciancio (editors), LNCS, Springer, August 2019, vol. 11693, pp. 210-235. [ DOI : 10.1007/978-3-030-26951-7_8 ]
https://hal.inria.fr/hal-02424902 -
54Y. Li, G. Leurent, M. Wang, W. Wang, G. Zhang, Y. Liu.
Universal Forgery Attack against GCM-RUP, in: CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, United States, February 2020.
https://hal.inria.fr/hal-02424899 -
55F. Sibleyras.
Generic Attack on Iterated Tweakable FX Constructions, in: CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, United States, February 2020.
https://hal.inria.fr/hal-02424953
National Conferences with Proceedings
-
56L. Perrin, X. Bonnetain.
Russian Style (Lack of) Randomness, in: Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2019.
https://hal.inria.fr/hal-02396792
Conferences without Proceedings
-
57C. Boura, L. Perrin, S. Tian.
Boomerang Uniformity of Popular S-box Constructions, in: WCC 2019 - The Eleventh International Workshop on Coding and Cryptography, Saint-Jacut-de-la-Mer, France, March 2019.
https://hal.inria.fr/hal-02420970 -
58A. Canteaut, L. Perrin.
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Fq14 - 14th international conference on Finite Fields and Applications, Vancouver, Canada, June 2019.
https://hal.inria.fr/hal-02431739 -
59A. Chailloux.
A note on the Quantum Query Complexity of Permutation Symmetric Functions, in: QIP 2019 - 22nd Annual Conference on Quantum Information Processing, Boulder, United States, January 2019.
https://hal.inria.fr/hal-02427235 -
60A. Chailloux.
A note on the quantum query complexity of permutation symmetric functions, in: ITCS 2019 - 10th Annual Innovations in Theoretical Computer Science, San Diego, United States, 2019, https://arxiv.org/abs/1810.01790. [ DOI : 10.4230/LIPIcs.ITCS.2019.19 ]
https://hal.inria.fr/hal-01950650 -
61D. Coggia, A. Couvreur.
On the security of a Loidreau's rank metric code based encryption scheme, in: WCC 2019 - The Eleventh International Workshop on Coding and Cryptography, Saint Jacut de la mer, France, March 2019.
https://hal.archives-ouvertes.fr/hal-02064465 -
62A. Grospellier, L. Grouès, A. Krishna, A. Leverrier.
Combining Hard and Soft Decoders for Hypergraph Product Codes, in: QEC19 - 5th International Conference on Quantum Error Correction, London, United Kingdom, July 2019.
https://hal.inria.fr/hal-02429542
Scientific Popularization
-
63G. Leurent, M. Naya-Plasencia.
La fragilité inattendue du chiffrement symétrique dans le monde post-quantique, in: Interstices, December 2019.
https://hal.inria.fr/hal-02425716
Other Publications
-
64S. Apers.
Expansion Testing using Quantum Fast-Forwarding and Seed Sets, January 2020, https://arxiv.org/abs/1907.02369 - 17 pages, 2 figures; v2: fixed error in Lemma 3, with corresponding modifications.
https://hal.inria.fr/hal-02436647 -
65S. Apers, R. De Wolf.
Quantum Speedup for Graph Sparsification, Cut Approximation and Laplacian Solving, January 2020, https://arxiv.org/abs/1911.07306 - working paper or preprint.
https://hal.inria.fr/hal-02436651 -
66S. Apers, A. Gilyén, S. Jeffery.
A Unified Framework of Quantum Walk Search, January 2020, https://arxiv.org/abs/1912.04233 - working paper or preprint.
https://hal.inria.fr/hal-02436653 -
67M. Bardet, P. Briaud, M. Bros, P. Gaborit, V. Neiger, O. Ruatta, J.-P. Tillich.
An Algebraic Attack on Rank Metric Code-Based Cryptosystems, October 2019, working paper or preprint.
https://hal-unilim.archives-ouvertes.fr/hal-02303015 -
68I. Bardet, A. Capel, A. Lucia, D. Pérez-García, C. Rouzé.
On the modified logarithmic Sobolev inequality for the heat-bath dynamics for 1D systems, January 2020, https://arxiv.org/abs/1908.09004 - 26 pages, 4 figures.
https://hal.archives-ouvertes.fr/hal-02436766 -
69I. Bardet, M. Junge, N. LaRacuente, C. Rouzé, D. S. França.
Group transference techniques for the estimation of the decoherence times and capacities of quantum Markov semigroups, January 2020, https://arxiv.org/abs/1904.11043 - 39 pages, 2 figures.
https://hal.archives-ouvertes.fr/hal-02436767 -
70A. Bariant.
Cryptanalysis of Tweakable Block Ciphers and Forkciphers, École Polytechnique, July 2019, INTERNSHIP REPORT.
https://hal.inria.fr/hal-02426441 -
71X. Bonnetain.
Collisions on Feistel-MiMC and univariate GMiMC, December 2019, working paper or preprint.
https://hal.inria.fr/hal-02400343 -
72X. Bonnetain.
Improved Low-qubit Hidden Shift Algorithms, December 2019, https://arxiv.org/abs/1901.11428 - working paper or preprint.
https://hal.inria.fr/hal-02400414 -
73R. Bricout, A. Chailloux, T. Debris-Alazard, M. Lequesne.
Ternary Syndrome Decoding with Large Weight, July 2019, Munich Workshop on Coding and Cryptography (MWCC), Poster.
https://hal.inria.fr/hal-02421017 -
74A. Canteaut, S. Duval, G. Leurent, M. Naya-Plasencia, L. Perrin, T. Pornin, A. Schrottenloher.
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security, March 2019, Soumission à la compétition "Lightweight Cryptography" du NIST.
https://hal.inria.fr/hal-02436763 -
75A. Chailloux.
DEREC - Développement de la cryptographie relativiste, October 2019, WISG 2019 - 13ème Workshop Interdisciplinaire sur la Sécurité Globale, Poster.
https://hal.inria.fr/hal-02427236 -
76A. Chailloux.
Quantum security of the Fiat-Shamir transform of commit and open protocols, 2019, https://arxiv.org/abs/1906.05415 - working paper or preprint.
https://hal.inria.fr/hal-02427223 -
77P. Charpin.
Crooked functions, October 2019, working paper or preprint.
https://hal.inria.fr/hal-02337711 -
78N. David.
Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY, MPRI, September 2019.
https://hal.inria.fr/hal-02424410 -
79T. Debris-Alazard, N. Sendrier, J.-P. Tillich.
About Wave Implementation and its Leakage Immunity, December 2019, working paper or preprint.
https://hal.inria.fr/hal-02424231 -
80A. Florez Gutierrez.
Improving the key recovery in Linear Cryptanalysis: An application to PRESENT, UVSQ, September 2019.
https://hal.inria.fr/hal-02424413 -
81A. Krishna, J.-P. Tillich.
Magic state distillation with punctured polar codes, May 2019, https://arxiv.org/abs/1811.03112 - working paper or preprint.
https://hal.inria.fr/hal-02120563 -
82A. Krishna, J.-P. Tillich.
Towards low overhead magic state distillation, May 2019, https://arxiv.org/abs/1811.08461 - working paper or preprint.
https://hal.inria.fr/hal-02120564 -
83A. Leverrier, V. Londe, G. Zémor.
Towards local testability for quantum coding, January 2020, https://arxiv.org/abs/1911.03069 - 38 pages.
https://hal.inria.fr/hal-02432360 -
84S. Ouzineb.
Towards the Reverse-Engineering of the CaveTable, Télécom ParisTech, August 2019.
https://hal.inria.fr/hal-02275389 -
85L. Perrin.
Russian Style (Lack of ) Randomness, December 2019, working paper or preprint.
https://hal.inria.fr/hal-02396756 -
86L. Perrin.
Streebog and Kuznyechik: Inconsistencies in the Claims of their Designers, July 2019, IETF 105.
https://hal.inria.fr/hal-02396671