EN FR
EN FR

2024Activity reportProject-TeamCANARI

RNSR: 202324429H
  • Research center Inria Centre at the University of Bordeaux
  • In partnership with:CNRS, Université de Bordeaux
  • Team name: Cryptography ANalysis and ARIthmetic
  • In collaboration with:Institut de Mathématiques de Bordeaux (IMB)
  • Domain:Algorithmics, Programming, Software and Architecture
  • Theme:Algorithmics, Computer Algebra and Cryptology

Keywords

Computer Science and Digital Science

  • A4.3.1. Public key cryptography
  • A4.3.3. Cryptographic protocols
  • A4.3.4. Quantum Cryptography
  • A8.5. Number theory
  • A8.10. Computer arithmetic

Other Research Topics and Application Domains

  • B9.5.1. Computer science
  • B9.5.2. Mathematics
  • B9.8. Reproducibility
  • B9.10. Privacy

1 Team members, visitors, external collaborators

Research Scientists

  • Damien Olivier Robert [Team leader, INRIA, Senior Researcher]
  • Razvan Barbulescu [CNRS, Researcher]
  • Xavier Caruso [CNRS, Senior Researcher]
  • Andreas Enge [INRIA, Senior Researcher]
  • Fredrik Johansson [INRIA, Researcher]
  • Sabrina Kunzweiler [INRIA, ISFP, from Oct 2024]
  • Aurel Page [INRIA, Researcher]
  • Alice Pellet Mary [CNRS, Researcher]

Faculty Members

  • Karim Belabas [UNIV BORDEAUX, Professor]
  • Elena Berardini [CNRS, Professor, from Jun 2024]
  • Guilhem Castagnos [UNIV BORDEAUX, Associate Professor]
  • Henri Cohen [UNIV BORDEAUX, Emeritus]
  • Jean-Marc Couveignes [UNIV BORDEAUX, Professor]
  • Qing Liu [UNIV BORDEAUX, Associate Professor Delegation, until Aug 2024]

Post-Doctoral Fellows

  • Marcel Houben [INRIA, Post-Doctoral Fellow, from Oct 2024]
  • Sabrina Kunzweiler [INRIA, Post-Doctoral Fellow, until Sep 2024]
  • Wessel Van Woerden [UNIV BORDEAUX, Post-Doctoral Fellow, from Nov 2024]
  • Wessel Van Woerden [UNIV BORDEAUX, Post-Doctoral Fellow, until Oct 2024]

PhD Students

  • Alix Barraud [UNIV BORDEAUX, from Aug 2024]
  • Agathe Beaugrand [UNIV BORDEAUX]
  • Pierrick Dartois [IMT]
  • Fabrice Etienne [UNIV BORDEAUX]
  • Jean Gasnier [UNIV BORDEAUX]
  • Afonso Li [UNIV BORDEAUX, from Aug 2024]
  • Guilhem Mureau [INRIA]
  • Nicolas Sarkis [UNIV BORDEAUX]
  • Anne-Edgar Wilke [UNIV BORDEAUX, from Sep 2024]
  • Anne-Edgar Wilke [UNIV BORDEAUX, ATER, until Aug 2024]

Technical Staff

  • Bill Allombert [CNRS, Engineer]

Interns and Apprentices

  • Rayane Bait [INRIA, Intern, from May 2024 until Sep 2024]

Administrative Assistant

  • Flavie Blondel [INRIA]

External Collaborators

  • Maxime Bombar [UNIV BORDEAUX, from Sep 2024]
  • Luca De Feo [IBM RESEARCH EUROPE]
  • Benjamin Wesolowski [CNRS]

2 Overall objectives

The primary goals of the Canari project are, firstly, to design algorithmic solutions to manipulate the objects involved in the Langlands programme, secondly to develop algorithmic tools to handle the necessary arithmetic and analysis (real, complex and p-adic) involved, and thirdly, to derive concrete applications, in particular to cryptography.

The Langlands programme postulates deep relationships between objects of three apparently unrelated worlds: the automorphic world, the world of Galois representations, and the motivic world.

The automorphic world belongs to the realm of analysis and infinite-dimensional vector spaces: its main citizens are automorphic forms, which are certain smooth functions satisfying nice differential equations. The number-theoretic content comes from the domains of these functions: they are defined on so-called arithmetic manifolds, of which many classical objects are special cases: modular curves, moduli spaces of abelian varieties, the space of Euclidean lattices of a given dimension, Arakelov class groups, etc.

The world of Galois representations is about symmetry and algebra. The main citizen is the group of all symmetries of the field of all algebraic numbers, the absolute Galois group G. Galois representations are linear actions of G on finite-dimensional vector spaces over a field (complex numbers, p-adic numbers and finite fields are all important). They are like powerful microscopes that allow us to visualise a tiny portion of G as a group of geometric symmetries.

The motivic world is about geometry. Its main citizens are algebraic varieties, that is, sets of solutions of polynomial equations, and their associated cohomologies. Important examples are algebraic curves and abelian varieties. One can classify varieties by discrete, or cohomological, invariants such as dimension and genus (integers). On some families of algebraic varieties, after fixing these discrete invariants, the family is classified by a continuous space which is itself an algebraic variety called a moduli space. Moduli spaces of curves and abelian varieties play a key role in number theory and in cryptography.

These worlds are tied together via the central notion of L-function: generating series adapted to number theory. Each world has its own recipe to produce L-functions, and the Langlands programme asserts that the L-functions coming from the three worlds are the same; this has striking consequences as each origin then brings special properties to the other ones. A large portion of current research in number theory is placed in this context. Thus L-functions can be seen as bridges between these three worlds, and the main goal of the team is to give algorithms to construct these bridges in practice.

A strong focus on the team is on making our algorithms available through open source software, notably Pari/GP, Flint (Arb, Calcium) and Mpc.

3 Research program

The team is organised around three axes. The goal of the first axis is to give a systematic computational treatment of objects from the Langlands programme, and to investigate algorithmic insight that can be gained by approching problems in computational number theory from the Langlands programme point of view.

These algorithms will be of two kinds: exact or of analytic, approximated nature (p-adic, real or complex). Hence, the second axis is concerned with the development of effective complex and p-adic analysis to handle the analytic objects that appear naturally. Finally, the new objects and computational problems will provide potential bases for next-generation cryptosystems, and the third axis uses these new insights to analyse the security of post-quantum cryptography, build new cryptosystems and improve the existing ones and study their security.

3.1 Algorithms for higher dimensional number theory

The goal of this axis is to design and implement efficient algorithms to enumerate, construct, represent, and compute with the fundamental objects of the Langlands programme and to explore their interactions. This will provide versatile tools for mathematicians to progress on difficult problems by directly manipulating intricate objects, and a collection of new problems and algorithms for cryptographers to use for the design of next-generation cryptographic primitives. Since many of these objects have a strong analytic flavour, the methods from our effective analysis axis will be vital.

The main topics of this theme will be:

  • Automorphic forms: compute spaces of automorphic forms (Siegel and Hilbert modular forms, ...)
  • Galois representations: compute Artin representations using tools from representation theory, Iwasawa theory, p-adic Hodge theory.
  • Varieties: abelian varieties, curves of higher genus, Shimura varieties and moduli spaces, hypergeometric motives.
  • Bridges from the Langlands programme.

3.2 Effective analysis

The goal of this axis is to develop algorithms for efficient and reliable arithmetics in various fields (real, complex, p-adic, finite), which is a prerequisite for computing with the number theoretical objects of both Axis 1 and Axis 3, and especially L-functions, which are analytic objects by nature (defined in terms of series and integrals). Beyond elementary arithmetic and linear and nonlinear algebra, we also frequently need effective algorithms in the realm of complex and p-adic analysis, including algorithms for solving differential equations.

There is a wealth of research questions to address to guarantee convergence, optimal complexities and efficiency at different precisions, as well as the exactness of the results.

The main topics of this theme will be:

  • Real and complex analysis: rigorous algorithms for evaluating holonomic functions. For analytic operations like limits, differentiation, summation and integration, develop algorithms with guaranteed accuracy that can handle functions with singularities or pathological behaviour like strong oscillation.
  • Symbolic-numeric representations: reduce the cost of computing with algebraic numbers of large degree or height, compute with mixed algebraic and purely transcendental fields.
  • p-adic analysis: optimise p-adic linear algebra and p-adic commutative algebra (including Gröbner bases) with respect to precision loss and instabilities.

3.3 Next generation and post-quantum cryptography

While the objects mentioned in Axis 1 may appear excessively abstract, when suitably instantiated, they become basic building blocks for next generation cryptosystems. First, these algebraic objects make it possible to construct quantum-resistant public key cryptosystems, which may become indispensable to secure communications in a future where large-scale quantum computers have become a reality. Second, the richness of these objects enables the construction of cryptographic schemes with advanced properties, such as homomorphic encryption, decentralised cryptography, secure multiparty computation and verifiable delay functions. The cryptosystems that will be studied in the team are related to (generalisations) of ideals and class groups in number fields: algebraic lattices, actions of class groups of orders in number fields and actions of groupoids constructed from quaternion algebras. Building and analysing these cryptosystems requires a deep understanding of the mathematical structures underlying them, which cannot simply be treated as black boxes.

The main topics of this theme will be:

  • Isogenies: new cryptographic protocols from higher dimensional isogenies.
  • Lattices: investigate the hardness of finding short vectors in algebraically structured lattices.
  • Pairings and discrete logarithms, quantum algorithms to compute unit and class groups .
  • Orders of number fields: algorithms for computing with orders in number fields, as well as regulators and class groups. These algorithms can be used to construct groups of unknown order, which find applications in advanced cryptographic primitives, for instance in the area of homomorphic encryption or threshold cryptography.
  • Verifiable delay functions.

4 Application domains

Our main existing and future impact is through our software, notably Pari/GP, Flint (Arb, Calcium) and Mpc, which are world leaders in their respective domains. Pari/GP is the leading package used in number theory, and integrated into wider platforms like SageMath. Flint focus on lower level building blocks for number theory, like polynomial arithmetic, interval arithmetic (Arb) and symbolic computations (Calcium). Mpc, with its guarantees of correct rounding for basic complex arithmetic operations, operates on a lower level and thus has a larger scope. It serves as a reference for the GNU C library and is installed alongside GCC on each computer requiring the GNU Compiler Collection. The interval arithmetic of Arb provides a more flexible use case than Mpc, whence it has the widest potential of applications, far beyond the need of algorithmic number theory. It is already used in Mathematica and Maple, and a goal of the team will be to develop its reach even more.

The main impact of Axis 1, apart from the cryptographic applications, will be to give new tools to mathematicians to explore the world of the Langlands programme, construct objects explicitly and carry out experimentations, in particular via Pari/GP.

The main impact of Axis 2 will be the improvement of tools to handle precision better (floating point, p-adic, interval arithmetic), broadening the scope outside the context of pure arithmetic. The focus of Axis 2 is different from scientific computing in that we require very high precision (hundreds to tens of thousands of digits), and if possible with certified approximation bounds.

Concerning Axis 3, the requirement by governmental agencies to have post-quantum cryptographic solutions means that the civil society already needs to pivot towards such solutions. The NIST has an ongoing post-quantum cryptography standardisation process. This is an international process and the Canari team will contribute to the analysis (and improvement) of the security of some of these schemes (notably the isogeny based ones and the ideal lattices ones).

5 Social and environmental responsibility

5.1 Footprint of research activities

The main footprint of our research activites are:

  • The ecological impact of attending international conferences. We have signed the University of Bordeaux ecological chart saying that we should try to reduce travel and privilege train as much as possible. Some of us also signed a more restrictive commitment, saying that we will try to limit ourselves to 20 000km traveled by plane over a period of two years.1
  • The impact of our computations. Some of our record computations (largest class polynomials, largest primality proof) require using a large cluster for a long time. To reduce this impact we aim to develop faster algorithms.

5.2 Impact of research results

Another possible impact of Axis 3 will be ecological. Moving blockchains from Proof of Work to Proof of Stake is key to reduce their ecological impact. Verifiable delay functions are a core component of proof of stake, so Axis 3 will play a small role in helping this transition. In the same vein, cryptography based on class groups makes it possible to reduce the bandwidth used for certain multiparty protocols.

6 Highlights of the year

Raphaël Pagès defended his PhD thesis Factorisation des opérateurs différentiels en caractéristique positive in February 2024 29.

6.1 Awards

The Pari/GP software won the price Prix science ouverte du logiciel libre de la recherche from the ministère de l’Enseignement supérieur et de la Recherche in the category Communauté.

The paper 20 by P. Dartois, A. Leroux, D. Robert and B. Wesolowski won the best paper award of Eurocrypt 2024.

7 New software, platforms, open data

7.1 New software

7.1.1 PARI/GP

  • Keyword:
    Computational number theory
  • Functional Description:
    PARI/GP is a cross platform and open-source computer algebra system designed for fast computations in number theory: factorizations, algebraic number theory, elliptic curves, modular forms, L functions... It also contains a wealth of functions to compute with mathematical entities such as matrices, polynomials, power series, algebraic numbers, etc., and a lot of transcendental functions as well as numerical summation and integration routines. PARI is also available as a C library to allow for faster computations.
  • URL:
  • Contact:
    Aurel Page
  • Participants:
    Bill Allombert, Karim Belabas, Henri Cohen, Andreas Enge, Aurel Page
  • Partner:
    CNRS

7.1.2 FLINT

  • Name:
    Fast Library for Number Theory
  • Keywords:
    Computer algebra, Computational number theory, Arithmetic
  • Functional Description:

    FLINT is a C library for doing number theory. At its core, FLINT provides arithmetic in standard rings such as the integers, rationals, algebraic, real, complex and p-adic numbers, finite fields, and number fields. It also provides polynomials (univariate and multivariate), power series, and matrices.

    FLINT covers a wide range of functionality: primality testing, integer factorisation, multivariate polynomial GCD and factorisation, FFTs, multimodular reconstruction, special functions, exact and approximate linear algebra, LLL, finite field embeddings, and more.

  • URL:
  • Contact:
    Fredrik Johansson
  • Partner:
    Technische Universität Kaiserslautern (UniKL)

7.1.3 GNU MPC

  • Functional Description:
    Mpc is a C library for the arithmetic of complex numbers with arbitrarily high precision and correct rounding of the result. It is built upon and follows the same principles as Mpfr. The library is written by Andreas Enge, Philippe Théveny and Paul Zimmermann.
  • Release Contributions:

    Changes in version 1.3.1, released in December 2022: - Bug fix: It is again possible to include mpc.h without including stdio.h.

    Changes in version 1.3.0 ("Ipomoea batatas"), released in December 2022: - New function: mpc_agm - New rounding modes "away from zero", indicated by the letter "A" and corresponding to MPFR_RNDA on the designated real or imaginary part. - New experimental ball arithmetic. - New experimental function: mpc_eta_fund - Bug fixes: - mpc_asin for asin(z) with small |Re(z)| and tiny |Im(z)| - mpc_pow_fr: sign of zero part of result when the base has up to sign the same real and imaginary part, and the exponent is an even positive integer - mpc_fma: the returned 'int' value was incorrect in some cases (indicating whether the rounded real/imaginary parts were smaller/equal/greater than the exact values), but the computed complex value was correct. - Remove the unmaintained Makefile.vc, build files for Visual Studio can be found at https://github.com/BrianGladman/mpc .

  • URL:
  • Contact:
    Andreas Enge
  • Participants:
    Andreas Enge, Mickaël Gastineau, Paul Zimmermann, Philippe Theveny

7.1.4 SQISignHD

  • Keyword:
    Cryptography
  • Functional Description:
    Compact post-quantum signature algorithm using isogenies in higher dimension.
  • Contact:
    Benjamin Wesolowski

7.1.5 SQIsign2d

  • Name:
    Compact post-quantum signature algorithm using isogenies in dimension 2
  • Keyword:
    Cryptography
  • Functional Description:
    Compact post-quantum signature algorithm using isogenies in dimension 2, improving on SQIsign and SQIsignHD
  • Contact:
    Luca De Feo

7.1.6 ThetaIsogenies

7.1.7 Kummer Line

7.1.8 CM

  • Keyword:
    Arithmetic
  • Functional Description:
    The Cm software implements the construction of ring class fields of imaginary quadratic number fields and of elliptic curves with complex multiplication via floating point approximations. It consists of libraries that can be called from within a C program and of executable command line applications.
  • Release Contributions:
    Version 0.4.3 "Fitzebohnen", released in February 2024, comes with the following new features: - Support FLINT version 3. - Add an upper bound on the permitted class number in ECPP, to avoid choosing discriminants for which class polynomials cannot be computed in reasonable time and with reasonable memory. - Add a binary ecpp-check for checking certificates.
  • URL:
  • Contact:
    Andreas Enge
  • Participant:
    Andreas Enge

8 New results

8.1 Higher dimensional number theory

Participants: Xavier Caruso, Henri Cohen, Aurel Page.

In 34, A. Bartel and A. Page develop a new approach to the isospectrality of the orbifolds constructed by Vignéras.

In 51, H. Cohen explains how to accelerate continued fractions, and then in 50 he builds a database of continued fractions of polynomial type.

Drinfeld modules

In 12, X. Caruso and Quentin Gazda designed an implemented an efficient algorithm for computing L-series of Drinfeld modules and Anderson motives over 𝔽q[t]. Based on a large dataset produced by this algorithm, they formulated a conjecture stating that the order of vanishing at 1 of the v-adic L-series of an Anderson motive is independent of v

In 39, X. Caruso, Quentin Gazda and Alexis Lucas studied Wieferich primes in the context of Drinfeld modules. They managed to relate the property of being Wieferich to the vanihsing of the L-series. They also obtained probabilistic results (confirming standard heuristics) about the repartition of Wieferich primes for many families of Drinfeld modules.

Algebraic differential equations

Alin Bostan, X .Caruso and Julien Roques published a survey 11 on the theory of linear differential equations over number fields and finite fields, focusing on algebraic criteria for the existence of algebraic solutions.

8.2 Algorithms for number theory

Participants: Razvan Barbulescu, Karim Belabas, Jean-Marc Couveignes, Andreas Enge, Fabrice Etienne.

In 22, A. Enge presents his implementation of the FastECPP algorithm for primality proving. He carries out a complexity analysis with particular emphasis on the parallelisation aspects and presents the parameter choices that have made possible the record of a primality proof for (1086453-1)/9 using his CM software 49. This free software has been used for 18 primality proofs out of the 20 largest primes without special properties referenced at https://­t5k.­org/­top20/­page.­php?id=27.

In 42, F. Etienne describes an algorithm to compute class groups by induction with generalised norm relations.

The paper 7 by R. Barbulescu and F. Jouve useing the Elliott-Halberstam conjecture to measure how ECM friendly an elliptic curve with complex multiplication is was published in Acta Arithmetica.

In 8, published in Mathematics of Computation, K. Belabas and D. Simon give an algorithm for power detection in number fields.

8.3 Cryptography

Participants: Guilhem Castagnos.

In 19, L. Braun, G. Castagnos, I. Damgård, F. Laguillaumie, K. Melissaris, C. Orlandi, I. Tucker present distributed key generation and decryption protocols for an additively homomorphic cryptosystem based on class groups, CL, improving on a similar system proposed by Braun, Damgård, and Orlandi at CRYPTO'23. Their key generation is similarly constant round but achieves lower communication complexity than the previous work. This improvement is in part the result of relaxing the reconstruction property required of the underlying integer verifiable secret sharing scheme. This eliminates the reliance on potentially costly proofs of knowledge in unknown order groups. They present a new method to batch zero-knowledge proofs in unknown order groups which strengthens these improvements. They also present a protocol which is proven secure against adaptive adversaries in the single inconsistent player (SIP) model. Theirs protocols are secure in the universal composability (UC) framework and provide guaranteed output delivery. They demonstrate the relative efficiency of our techniques by presenting the running times and communication costs associated with our implementation of the statically secure protocol and provide a direct comparison with alternate state of the art constructions.

8.4 Isogeny based cryptography

Participants: Bill Allombert, Pierrick Dartois, Sabrina Kunzweiler, Aurel Page, Damien Robert, Benjamin Wesolowski.

The paper 20, P. Dartois, A. Leroux, D. Robert and B. Wesolowski, which present the SQISignHD protocol, has been published in Eurocrypt 2024 and won the best paper awards.

The verification step of SQISignHD requires computing dimension 4 2e-isogenies. The algorithmic aspects of this task was tackled in 40 by P. Dartois, using theta coordinates.

In 18, published at Asiacrypt 2024, A. Basso, L. de Feo, P. Dartois, A. Leroux, L. Maino, G. Pope, D. Robert, and B. Wesolowski introduce the SQISign2d protocol (in its West variant). This version improves on the SQISignHD version by keeping the fast signature and strong security proof while improving significantly on the verification time.

In 44, S. Kunzweiler, L. Maino T. Moriya C. Petit, G. Pope D. Robert, M. Stopar and Y.B. Ti look at hash functions from isogeny graphs in dimension up to g=3. They show that dimension 3 is more efficient than dimension 1 or 2.

The paper 27, by D. Robert, written for the NuTMiC 2024 invited talk, contains a survey on the representation of isogenies. It notably focus on the recent HD representation, which allows to give an efficient representation of any isogeny, and which had tremendous impacts on the field of isogeny based cryptography.

In 47, D. Robert introduces MIKE (module isogeny key exchange) a new Non Interactive Key Exchange protocol, which combine the best advantages of CSIDH and full non commutative supersingular isogeny graphs.

Using commutative isogeny graphs, like in CSIDH, allow to build a NIKE. But the graphs result from a commutative group action (by ideals of a class group), and the protocol is susceptible to a subexponential quantum attack. The idea of exploiting non commutative supersingular graphs was used in SIDH, but the protocol relied on extra torsion information (due to the difficulty of building a NIKE on a non commutative graph), and was spectacularly broken in 2022.

The idea of MIKE is to replace the ideal action by a Hermitian module action to get the benefit of a nice NIKE without the subexponential attack. In 47, D. Robert shows that supersingular graphs fit into this framework via their Weil restriction, which can be described by a rank 2 module action.

In 31, B. Allombert, J-F. Biasse, J. K. Eriksen, P. Kutas, C. Leonardi, A .Page, R .Scheidler, M. T. Bagi give new efficient parameters for SCALLOP, an isogeny based (full) group action. The main difference compared to SCALLOP is that they start from a non trivial class group at the top of the volcano. This required a large class group computation, done via tweaks to the Pari/GP algorithm.

The paper 6 by S. Arpin, J. Clements, P .Dartois, J. K. Eriksen, P. Kutas and B Wesolowski on finding orientations was published in esigns, Codes and Cryptography.

The paper 17 by B. Wesolowski on attacking the isogeny path problems in Drinfeld modules was published in IACR Communications in Cryptology.

The paper 21 by P. Dartois, L. Maino, G. Pope and D. Robert, using optimised formula for 2n-isogenies in dimension 2 was published in Asiacrypt 2024.

The paper 26 by A. Page and B. Wesolowski on the equivalence between the one endomorphism and the full endomorphism problem for supersingular elliptic curves has been published in Eurocrypt 2024.

8.5 Elliptic curves and abelian varieties

Participants: Elena Berardini, Andreas Enge, Sabrina Kunzweiler, Aurel Page, Damien Robert, Nicolas Sarkis.

In 15, published at ANTS 2024, S. Kunzweiler and D. Robert give a new method, using deformation and higher dimensional isogenies, to compute modular polynomials on elliptic curves. The algorithm is quasi-linear and does not rely on any assumption.

In 16, published in IACR Communications in Cryptology, D. Robert and N. Sarkis improve some formulas for computing 2-isogenies between Kummer lines, notably on variants of the Montgomery models.

They use these results in 46 to give new (faster) formulas for scalar multiplications on Montgomery curves.

A. Enge and M. Streng have completely rewritten their preprint 41. Using Shimura reciprocity and quadratic forms over totally real number fields they provide an easy to implement algorithm for deciding whether special values of Siegel modular functions of higher level define moduli of polarised abelian varieties and lead to class invariants defining unramified abelian field extensions. In this case, they determine a complete set of Galois conjugates. They also examine in detail under which conditions the invariants are real.

In 37 E. Berardini, A. Giangreco–Maidana and S. Marseglia characterize abelian surfaces defined over finite fields containing no curves of genus less than or equal to 3. They complete and expand the characterisation of isogeny classes of abelian surfaces with no curves of genus up to 2, then show that for simple abelian surfaces, containing a curve of genus 3 is equivalent to admitting a polarisation of degree 4. Thanks to this result, they can use existing algorithms to check which isomorphism classes in the isogeny classes containing no genus 2 curves have a polarisation of degree 4. Besides, they describe absolutely irreducible genus 3 curves lying on abelian surfaces containing no curves of genus less than or equal to 2, and show that their number of rational points is far from the Serre–Weil bound.

The paper 14 by J. Kieffer, A. Page and D. Robert on computing isogenies from modular polynomials in dimension 2 was published in Journal of Algebra.

8.6 Pairings

Participants: Damien Robert, Jean Gasnier.

In 45, D. Robert give new formulas to compute pairings on elliptic curves and abelian varieties by developing the arithmetic of biextensions and cubical arithmetic.

In 43, J. Gasnier and A. Guillevic given an algebraic point of view on the generation of pairing-friendly curves.

8.7 Lattices and Lattice-based cryptography

Participants: Guilhem Mureau, Alice Pellet-Mary, Wessel van Woerden.

In June 2023, the NIST started an additional post-quantum signature standardization process.2 The objective of this new call is to standardize one or more post-quantum signature scheme, different from the ones standardized so far. Members of the Canari team have studied the security of some of the new submissions, based on lattices and codes.

In 24, published in Crypto 2024, Felicitas Hörmann and Wessel van Woerden described a polynomial time attack against a NIST submission called FuLeeca. This submission uses codes in the Lee metric, which make the algorithmic problems very similar to lattice problems. Exploiting this connection with lattices, the authors were able to exploit leakage from the signatures to obtain a key-recovery attack against the scheme.

In 25, Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok and Alexandre Wallet studied the hardness of the module lattice isomorphism problem (module-LIP), which serve as a foundation for the security of Hawk, another signature scheme submitted to the NIST competition. The authors showed that when instantiated over totally real fields, the module-LIP problem becomes easy, and can be heuristically solved in polynomial time (when the modules have rank 2). This does not threaten the Hawk signature scheme since they use modules over a totally complex field, which is not subject to the attack.

In 13, published in Acta Crystallographica, M. D. Sikirić and W. van Woerden give a Complete classification of six-dimensional iso-edge domains.

In 28, published in Asiacrypt 2024, W. van Woerden shows that dense and smooth lattices exist in any genus.

8.8 Quantum algorithms for cryptanalysis

Participants: Razvan Barbulescu.

In 32, Razvan Barbulescu, Muguel Barcau and Vicentiu Pasol extended Regev's quantum algorithm to elliptic curves. Indeed, the extension is not direct because there is no natural notion of smallness for the points of an elliptic curve over a finite field. The speedup with respect to Shor tends to infinity with the input size and corresponds to a speedup pf factor 4 for some curves of the NIST list.

In 33, Razvan Barbulescu and Gaëtan Bisson proposed a variant of Regev's algorithm for hyperelliptic curves. When the genus g is large the speed-up is min(g,(n)) which corresponds to the full potential of Regev's idea when the genus is very large, i.e. gn. In cryptography only the case g=2 is used and they propos a different improvement in this case, obtaining a speedup by a factor 7 for a curve used in cryptography. The algorithm suggests that, for quantum computing, the hypperelliptic curves are slightly weaker than elliptic curves.

8.9 Coding theory

Participants: Elena Berardini, Xavier Caruso, Fabrice Drain.

In a series of paper 10, 35, E. Berardini and X. Caruso defined new families of codes for the sum-rank metric. They first introduced linearized versions of Algebraic Geometry codes and studied their parameter, showing in particular that the obtained codes beat the (sum-rank analogue of the) Gilbert–Varshamov bound. They also introduced a linearized analogue of Reed–Muller codes.

In 38, X. Caruso and F. Drain obtained a complete classification of self-dual skew cyclic and skew negacyclic codes. They also provided efficient algorithms for sampling and enumerating them.

In  9, E. Berardini, A. Caminata and A. Ravagnani investigate CSS and CSS-T quantum error-correcting codes from the point of view of their existence, rarity, and performance.

In 36, E. Berardini, R. Dastbasteh, J. Etxezarreta Martinez, S. Jain and O. Sanz Larrarte give a new construction of binary quantum codes that enables the generation of a CSS-T code from any given CSS code. Using this construction, they prove the existence of asymptotically good binary CSS-T codes, resolving a previously open problem in the literature.

8.10 Effective analysis and certified arithmetic

Participants: Fredrik Johansson.

In 23, F. Johansson and J. van der Hoeven gave efficient algorithms to take advantage of precomputations when evaluating elementary functions in multiple precision arithmetic.

In 48, L .Stempfle, A .James, J .Josse, T .Gauss, F .Johansson study interpretable machine learning models with missing data.

9 Partnerships and cooperations

Participants: Bill Allombert, Razvan Barbulescu, Karim Belabas, Elena Berardini, Xavier Caruso, Guilhem Castagnos, Andreas Enge, Jean-Marc Couveignes, Fredrik Johansson, Sabrina Kunzweiler, Aurel Page, Alice Pellet-Mary, Damien Robert.

9.1 International research visitors

9.1.1 Visits of international scientists

Other international visits to the team

The following international speakers gave a talk at the Canari seminar in 2024: Thomas Decru (KU Leuven), Semyon Novoselov (University of Kaliningrad), Rocco Mora (CISPA), Dmitrii Koshelev (Ethereum Foundation), Simona Etinski (CWI), Lars Ran (Radboud University), Oana Padurariu (Max-Planck-Institut für Mathematik, Bonn), Bram Bekker (TU Delft), Valentijn Karemaker (Universiteit Utrecht), Eric Ahlqvist (University of Edinburgh), Maria Corte-Real Santos (University College London), Reza Dasbasteh (Universidad de Navarra), Sam Frengley (University of Bristol), Florian Breuer (University of Newcastle, Australia), Rob de Jeu (Vrije Universiteit Amsterdam).

9.2 National initiatives

  • PEPR Technologies Quantiques

    Integrated project PQ-TLS: Post-quantum padlock for web browser

    with Inria teams Grace, Cosmiq, Prosecco Universities of Bordeaux, Rennes, Limoges, Versailles–St. Quentin, Rouen, St. Étienne, and ENS Lyon and CEA

    2022–2027, total budget 4180k€, of which 456k€ for Bordeaux

  • PEPR Cybersécurité

    Integrated project CRYPTANALYSE: Cryptanalysis of classical cryptographic primitives

    with Inria teams Caramba, Cosmiq, Universities of Rennes, Amiens, Sorbonne, and CNRS

    2023–2028, total budget 5000k€, of which about 90k€ for Bordeaux

  • HQI project (HPC-Quantum Initiative, France 2030)

    France Hybrid HPC Quantum Initiative, R&D et support

    17 partners in France; we will mainly work with LIP6 and ENS de Lyon

    2021–2027, 165k€ for Bordeaux

  • ANR AGDE

    Arithmetic and geometry of discrete groups

    with Toulouse, Paris

    2021–2025, 45k€ for Bordeaux

  • ANR Ciao

    Isogeny based cryptosystems, applications to verifiable delay functions and post-quantum cryptography (PI D. Robert)

    with Paris, Montpellier

    2019–2024, 150k€ for Bordeaux

  • ANR/NSF Charm

    Cryptographic hardness of module lattices

    with Florida Atlantic, Cornell, ENS Lyon

    2021–2024, 205k€ for Bordeaux

  • ANR NuSCAP

    Numerical safety for computer-aided proofs

    with Lyon, Nantes, Paris, Sophia-Antipolis, Toulouse

    2021–2025

  • ANR PadLEfAn

    p-adic properties of L-functions effective and analytic aspects

    with Besançon, Caen

    2022–2026

  • ANR Sangria

    Secure distributed computation: cryptography, combinatorics and computer algebra

    with Paris and région Occitanie

    2021–2025

  • ANR TOTORO

    Towards new assumptions in lattice-based cryptography (PI A. Pellet--Mary)

    with Toulouse and Telecom Paris

    2023–2027, 186k€

  • PEPS

    Groupe des points des variétés abéliennes sur les corps finis

    E. Berardini and F. Campagna (LMBP, UCA)

    2024, 4000€

10 Dissemination

Participants: Bill Allombert, Razvan Barbulescu, Karim Belabas, Elena Berardini, Xavier Caruso, Guilhem Castagnos, Andreas Enge, Jean-Marc Couveignes, Fredrik Johansson, Sabrina Kunzweiler, Aurel Page, Alice Pellet-Mary, Damien Robert.

10.1 Promoting scientific activities

10.1.1 Scientific events: organisation

  • X. Caruso co-organized a one-week workshop SageDays 125
  • E. Berardini co-organized a two-day symposium called CAIPI (Coding theory, cryptogrAphy, arIthmetic geometry, and comPuter Algebra) three times during 2024 in Marseille (February), Rennes (May) and Limoges (December)
  • A. Enge organized a three-day MPFR/MPC/MPFI/ARB Developers Meeting
  • A. Enge and F. Johansson co-organized a one-week 2024 FLINT development workshop
Member of the conference program committees
  • G. Castagnos was part of the program committee of Crypto 2024
  • G. Castagnos was part of the program committee of SCN 2024
  • F. Johanssson was part of the program committee of ANTS 2024
  • S. Kunzweiler was part of the program committee of PKC 2025
  • A. Pellet-Mary was part of the program committee of Crypto 2024
  • W. van Woerden was part of the program committee of Eurocrypt 2025

10.1.2 Journal

Member of the editorial boards
  • K. Belabas is an editor of Archiv der Mathematik since 2006.
  • X. Caruso is member of the scientific board for the Journal de Théorie des Nombres de Bordeaux since 2022.
  • J.-M. Couveignes is an editor of the Publications mathématiques de Besançon since 2019.
  • J.-M. Couveignes was an editor of the Journal de théorie des nombres de Bordeaux from 2019 to 2023.
  • A. Enge is an editor of Designs, Codes and Cryptography since 2004.
  • A. Page is an associate editor of the LMFDB since 2022.
  • E. Berardini is member of the editorial board of De Cifris Koine

10.1.3 Invited talks

  • Alice Pellet-Mary gave an invited talk at the conference SCN 2024
  • D. Robert gave an invited talk On the efficient representation of isogenies at the conference NuTMiC 2024, and a talk From ideals to modules for isogeny based cryptography at the Leuven Isogeny Days 5. He also gave a talk Quand l’ajout de structure casse un cryptosystème : quelques exemples de cryptanalyse at the Journées Scientifiques Inria.
  • S. Kunzweiler gave an invited talk on Recent developments in isogeny-based cryptography at the conference PQCrypto 2024 , and an invited talk on Isogeny Computations in Higher Dimensions at the workshop ECC 2024.
  • E. Berardini gave an invited talk on From curves to surfaces: a walk through Algebraic Geometry codes at the conference Mathematics for Post-Quantum Cryptanalysis in Budapest, Hungary.

10.1.4 Scientific expertise

  • X. Caruso was part of the HCERES committee that evaluates the LAGA (Université Paris 13).

10.1.5 Research administration

  • K. Belabas is Vice président en charge du numérique (vice-president in charge of digital strategy and policies) at the University of Bordeaux since March 2022.
  • X. Caruso is vice-head of Institut de Mathématiques de Bordeaux, in charge of the IT department.
  • J.-M. Couveignes is Chargé de mission pour la sécurité numérique at the University of Bordeaux.
  • D. Robert is Chargé de mission Développement logiciel at the Institut Mathématiques de Bordeaux since 2018.
  • A. Page and A. Enge are members of the Conseil d'Administration of the Société Arithmétique de Bordeaux, which publishes the Journal de Théorie des Nombres de Bordeaux and provides financial support for the organisation of number theory events.
  • A. Enge is an elected member of the CAP chercheurs at Inria since 2023.
  • A. Enge is a member of the Comité Parité et Égalité des Chances of Inria since 2024.
  • G. Castagnos is responsible for the master's degree in cryptography and IT security of the University of Bordeaux since 2024.

10.2 Teaching - Supervision - Juries

  • Andreas Enge has given a series of lectures on elementary, analytic and algorithmic number theory at the CIMPA school Algèbre, géométrie algébrique et applications à la théorie de l'information in Douala (Cameroun) https://­douala2024.­gaati.­org/.
  • Alice Pellet-Mary has given a series of lectures on lattice based cryptography at the same CIMPA school in Douala (Cameroun).
  • Sabrina Kunzweiler gave a lecture at the autumn school in supersingular isogenies in Taipei (Taiwan).
  • K. Belabas
    • 64h course on computer algebra, Master 2 (preparation for the Agrégation national competitive examination), University of Bordeaux
    • 35h course on quantum algorithms, Master 2, University of Bordeaux
  • X. Caruso
    • 35h course on quantum computing, Master 2, University of Bordeaux
  • G. Castagnos
    • 24h course on cryptology, Master 1, University of Bordeaux
    • 36h course on advanced cryptography, Master 2, University of Bordeaux
    • 35h course on algorithmics of integers and polynomials, Bachelor, University of Bordeaux
  • J.-M. Couveignes
    • 25h course on algorithmic arithmetics, Master, Université of Bordeaux
    • 160h course at CPBX (undegraduate program for student in engineering)
  • A. Page
    • 27h exercise sessions on computer algebra, Master 2 (preparation for the Agrégation national competitive examination), University of Bordeaux
  • E. Berardini
    • 24h course on information theory, Master 1, University of Bordeaux
    • 16h course on arithmetic and cryptology, Licence 3, University of Bordeaux

10.2.1 Supervision

  • PhD in progress: Anne-Edgar Wilke, Enumerating integral orbits of prehomogeneous representations, since September 2019, supervised by K. Belabas.
  • PhD in progress: Agathe Beaugrand, Conception de systèmes cryptographiques utilisant des groupes de classes de corps quadratiques, since September 2021, supervised by Guilhem Castagnos and Fabien Laguillaumie.
  • PhD in progress: Fabrice Étienne, Techniques d'induction pour l'algorithmique des représentations galoisiennes, since September 2022, supervised by Aurel Page.
  • PhD in progress: Nicolas Sarkis, Recherche de courbes planes de genre 2 adaptée à la factorisation des entiers, since September 2022, supervised by Razvan Barbulescu and Damien Robert.
  • PhD in progress: Pierrick Dartois Improvement and security analysis of isogeny-based cryptographic schemes, since September 2022, supervised by Damien Robert and Benjamin Wesolowski.
  • PhD in progress: Jean Gasnier, Algorithmique des isogénies et applications, since October 2022, supervised by Jean-Marc Couveignes.
  • PhD in progress: Fabrice Drain, Codes for the sum-rank metric, since September 2023, supervised by Elena Berardini and Xavier Caruso.
  • PhD in progress: Guilhem Mureau, Isomorphism of algebraic lattices, since September 2023, supervised by Alice Pellet--Mary and Renaud Coulangeon.
  • PhD in progress: Alix Barraud, Algebraic geometry codes from surfaces and quantum codes, since September 2024, supervised by Elena Berardini and Gilles Zémor.

10.2.2 Juries

  • X. Caruso
    • Cécile Armana (HDR), Université de Bourgogne Franche-Comté, 2024: Contributions à l’étude des formes modulaires sur les corps de fonctions
    • Bianca Gouthier, Université de Bordeaux, 2024: Actions rationnelles de schémas en groupes infinitésimaux
    • Raphaël Pagès, Université de Bordeaux, 2024: Factorisation des opérateurs différentiels en caractéristique positive
    • Martin Weimann (HDR), Université Caen-Normandie, 2024: Incursions en géométrie algébrique effective et calcul formel
  • G. Castagnos
    • Ambroise Fleury, Université Paris-Saclay, 2024: Amélioration des algorithmes de crible. Application à la factorisation des entiers (report)
  • A. Enge
    • Sorina Ionica (HDR), Université de Picardie Jules Verne, 2024: Variétés abéliennes, multiplication complexe et cryptographie (report)
  • S. Kunzweiler
    • Jonathan Komada Eriksen, Norwegian University of Science and Technology (Trondheim, Norway), 2024: Supersingular Endomorphism Rings: Algorithms and Applications
  • E. Berardini
    • Raphaël Pagès, Université de Bordeaux, 2024: Factorisation des opérateurs différentiels en caractéristique positive
    • Antonio de Marti i Olius, University of Navarra–TECNUN (San Sebastian, Spain), 2024: Decoding Algorithms for Quantum Error Correcting Codes
    • Antoine Leudière, Université de Lorraine, 2024: Morphismes de modules de Drinfeld et leurs algorithmes

10.3 Popularization

  • X. Caruso gave a general audience talk “Les idéaux d'Emmy Noether” at the Bibliothèque Nationale de France in the programme Un texte, un mathématicien

10.3.1 Productions (articles, videos, podcasts, serious games, ...)

  • X. Caruso and Pierre Grangé-Pradéras realized an art exposition Théorèmes; they presented several times this exposition to various audiences (including pupils and high school students).

10.3.2 Participation in Live events

  • A. Pellet-Mary organized 4 “ateliers” for high school female students during the week “Moi informaticienne Moi Mathématicienne” at IMB.
  • X. Caruso participated to the programmes “Fête de la Science” and “Village des Sciences”
  • E. Berardini participated to the “Circuit Scientifique Bordelais", leading a workshop on error-correcting codes

11 Scientific production

11.1 Major publications

  • 1 inbookX.Xavier Caruso, A.Agnès David and A.Ariane Mézard. Can we dream of a 1-adic Langlands correspondence?2313Mathematics Going ForwardLecture Notes in MathematicsSpringer International Publishing2023, 537-560HALDOI
  • 2 articleX.Xavier Caruso and Q.Quentin Gazda. Computation of classical and v-adic L-series of t-motives.Research in Number Theory2024. In press. HAL
  • 3 inbookH.Henri Cohen. Computational Number Theory, Past, Present, and Future.2313Mathematics Going ForwardLecture Notes in MathematicsSpringer International Publishing2023, 561-578HALDOI
  • 4 inproceedingsP.Pierrick Dartois, A.Antonin Leroux, D.Damien Robert and B.Benjamin Wesolowski. SQIsignHD: New Dimensions in Cryptography.Eurocrypt 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14651Lecture Notes in Computer ScienceZurich (CH), SwitzerlandSpringer Nature SwitzerlandApril 2024, 3-32HALDOI
  • 5 proceedingsD.Damien Robert, eds. Breaking SIDH in polynomial time.Advances in Cryptology – EUROCRYPT 202314008Lecture Notes in Computer ScienceSpringer Nature Switzerland; Springer Nature SwitzerlandMarch 2023, 472-503HALDOI

11.2 Publications of the year

International journals

International peer-reviewed conferences

Doctoral dissertations and habilitation theses

Reports & preprints

11.3 Cited publications