2024Activity reportProject-TeamCANARI
RNSR: 202324429H- Research center Inria Centre at the University of Bordeaux
- In partnership with:CNRS, Université de Bordeaux
- Team name: Cryptography ANalysis and ARIthmetic
- In collaboration with:Institut de Mathématiques de Bordeaux (IMB)
- Domain:Algorithmics, Programming, Software and Architecture
- Theme:Algorithmics, Computer Algebra and Cryptology
Keywords
Computer Science and Digital Science
- A4.3.1. Public key cryptography
- A4.3.3. Cryptographic protocols
- A4.3.4. Quantum Cryptography
- A8.5. Number theory
- A8.10. Computer arithmetic
Other Research Topics and Application Domains
- B9.5.1. Computer science
- B9.5.2. Mathematics
- B9.8. Reproducibility
- B9.10. Privacy
1 Team members, visitors, external collaborators
Research Scientists
- Damien Olivier Robert [Team leader, INRIA, Senior Researcher]
- Razvan Barbulescu [CNRS, Researcher]
- Xavier Caruso [CNRS, Senior Researcher]
- Andreas Enge [INRIA, Senior Researcher]
- Fredrik Johansson [INRIA, Researcher]
- Sabrina Kunzweiler [INRIA, ISFP, from Oct 2024]
- Aurel Page [INRIA, Researcher]
- Alice Pellet Mary [CNRS, Researcher]
Faculty Members
- Karim Belabas [UNIV BORDEAUX, Professor]
- Elena Berardini [CNRS, Professor, from Jun 2024]
- Guilhem Castagnos [UNIV BORDEAUX, Associate Professor]
- Henri Cohen [UNIV BORDEAUX, Emeritus]
- Jean-Marc Couveignes [UNIV BORDEAUX, Professor]
- Qing Liu [UNIV BORDEAUX, Associate Professor Delegation, until Aug 2024]
Post-Doctoral Fellows
- Marcel Houben [INRIA, Post-Doctoral Fellow, from Oct 2024]
- Sabrina Kunzweiler [INRIA, Post-Doctoral Fellow, until Sep 2024]
- Wessel Van Woerden [UNIV BORDEAUX, Post-Doctoral Fellow, from Nov 2024]
- Wessel Van Woerden [UNIV BORDEAUX, Post-Doctoral Fellow, until Oct 2024]
PhD Students
- Alix Barraud [UNIV BORDEAUX, from Aug 2024]
- Agathe Beaugrand [UNIV BORDEAUX]
- Pierrick Dartois [IMT]
- Fabrice Etienne [UNIV BORDEAUX]
- Jean Gasnier [UNIV BORDEAUX]
- Afonso Li [UNIV BORDEAUX, from Aug 2024]
- Guilhem Mureau [INRIA]
- Nicolas Sarkis [UNIV BORDEAUX]
- Anne-Edgar Wilke [UNIV BORDEAUX, from Sep 2024]
- Anne-Edgar Wilke [UNIV BORDEAUX, ATER, until Aug 2024]
Technical Staff
- Bill Allombert [CNRS, Engineer]
Interns and Apprentices
- Rayane Bait [INRIA, Intern, from May 2024 until Sep 2024]
Administrative Assistant
- Flavie Blondel [INRIA]
External Collaborators
- Maxime Bombar [UNIV BORDEAUX, from Sep 2024]
- Luca De Feo [IBM RESEARCH EUROPE]
- Benjamin Wesolowski [CNRS]
2 Overall objectives
The primary goals of the Canari project are, firstly, to design
algorithmic solutions to manipulate the objects involved in the Langlands
programme, secondly to develop algorithmic tools to handle the necessary
arithmetic and analysis (real, complex and
The Langlands programme postulates deep relationships between objects of three apparently unrelated worlds: the automorphic world, the world of Galois representations, and the motivic world.
The automorphic world belongs to the realm of analysis and infinite-dimensional vector spaces: its main citizens are automorphic forms, which are certain smooth functions satisfying nice differential equations. The number-theoretic content comes from the domains of these functions: they are defined on so-called arithmetic manifolds, of which many classical objects are special cases: modular curves, moduli spaces of abelian varieties, the space of Euclidean lattices of a given dimension, Arakelov class groups, etc.
The world of Galois representations is about symmetry and algebra. The main
citizen is the group of all symmetries of the field of all algebraic numbers,
the absolute Galois group
The motivic world is about geometry. Its main citizens are algebraic varieties, that is, sets of solutions of polynomial equations, and their associated cohomologies. Important examples are algebraic curves and abelian varieties. One can classify varieties by discrete, or cohomological, invariants such as dimension and genus (integers). On some families of algebraic varieties, after fixing these discrete invariants, the family is classified by a continuous space which is itself an algebraic variety called a moduli space. Moduli spaces of curves and abelian varieties play a key role in number theory and in cryptography.
These worlds are tied together via the central notion of
A strong focus on the team is on making our algorithms available through open source software, notably Pari/GP, Flint (Arb, Calcium) and Mpc.
3 Research program
The team is organised around three axes. The goal of the first axis is to give a systematic computational treatment of objects from the Langlands programme, and to investigate algorithmic insight that can be gained by approching problems in computational number theory from the Langlands programme point of view.
These algorithms will be of two kinds:
exact or of analytic, approximated nature (
3.1 Algorithms for higher dimensional number theory
The goal of this axis is to design and implement efficient algorithms to enumerate, construct, represent, and compute with the fundamental objects of the Langlands programme and to explore their interactions. This will provide versatile tools for mathematicians to progress on difficult problems by directly manipulating intricate objects, and a collection of new problems and algorithms for cryptographers to use for the design of next-generation cryptographic primitives. Since many of these objects have a strong analytic flavour, the methods from our effective analysis axis will be vital.
The main topics of this theme will be:
- Automorphic forms: compute spaces of automorphic forms (Siegel and Hilbert modular forms, ...)
- Galois representations: compute Artin representations using tools
from representation theory, Iwasawa theory,
-adic Hodge theory. - Varieties: abelian varieties, curves of higher genus, Shimura varieties and moduli spaces, hypergeometric motives.
- Bridges from the Langlands programme.
3.2 Effective analysis
The goal of this axis is to develop algorithms
for efficient and reliable arithmetics in various fields (real, complex,
There is a wealth of research questions to address to guarantee convergence, optimal complexities and efficiency at different precisions, as well as the exactness of the results.
The main topics of this theme will be:
- Real and complex analysis: rigorous algorithms for evaluating holonomic functions. For analytic operations like limits, differentiation, summation and integration, develop algorithms with guaranteed accuracy that can handle functions with singularities or pathological behaviour like strong oscillation.
- Symbolic-numeric representations: reduce the cost of computing with algebraic numbers of large degree or height, compute with mixed algebraic and purely transcendental fields.
-
-adic analysis: optimise -adic linear algebra and -adic commutative algebra (including Gröbner bases) with respect to precision loss and instabilities.
3.3 Next generation and post-quantum cryptography
While the objects mentioned in Axis 1 may appear excessively abstract, when suitably instantiated, they become basic building blocks for next generation cryptosystems. First, these algebraic objects make it possible to construct quantum-resistant public key cryptosystems, which may become indispensable to secure communications in a future where large-scale quantum computers have become a reality. Second, the richness of these objects enables the construction of cryptographic schemes with advanced properties, such as homomorphic encryption, decentralised cryptography, secure multiparty computation and verifiable delay functions. The cryptosystems that will be studied in the team are related to (generalisations) of ideals and class groups in number fields: algebraic lattices, actions of class groups of orders in number fields and actions of groupoids constructed from quaternion algebras. Building and analysing these cryptosystems requires a deep understanding of the mathematical structures underlying them, which cannot simply be treated as black boxes.
The main topics of this theme will be:
- Isogenies: new cryptographic protocols from higher dimensional isogenies.
- Lattices: investigate the hardness of finding short vectors in algebraically structured lattices.
- Pairings and discrete logarithms, quantum algorithms to compute unit and class groups .
- Orders of number fields: algorithms for computing with orders in number fields, as well as regulators and class groups. These algorithms can be used to construct groups of unknown order, which find applications in advanced cryptographic primitives, for instance in the area of homomorphic encryption or threshold cryptography.
- Verifiable delay functions.
4 Application domains
Our main existing and future impact is through our software, notably Pari/GP, Flint (Arb, Calcium) and Mpc, which are world leaders in their respective domains. Pari/GP is the leading package used in number theory, and integrated into wider platforms like SageMath. Flint focus on lower level building blocks for number theory, like polynomial arithmetic, interval arithmetic (Arb) and symbolic computations (Calcium). Mpc, with its guarantees of correct rounding for basic complex arithmetic operations, operates on a lower level and thus has a larger scope. It serves as a reference for the GNU C library and is installed alongside GCC on each computer requiring the GNU Compiler Collection. The interval arithmetic of Arb provides a more flexible use case than Mpc, whence it has the widest potential of applications, far beyond the need of algorithmic number theory. It is already used in Mathematica and Maple, and a goal of the team will be to develop its reach even more.
The main impact of Axis 1, apart from the cryptographic applications, will be to give new tools to mathematicians to explore the world of the Langlands programme, construct objects explicitly and carry out experimentations, in particular via Pari/GP.
The main impact of Axis 2 will be the improvement of tools to handle
precision better (floating point,
Concerning Axis 3, the requirement by governmental agencies to have post-quantum cryptographic solutions means that the civil society already needs to pivot towards such solutions. The NIST has an ongoing post-quantum cryptography standardisation process. This is an international process and the Canari team will contribute to the analysis (and improvement) of the security of some of these schemes (notably the isogeny based ones and the ideal lattices ones).
5 Social and environmental responsibility
5.1 Footprint of research activities
The main footprint of our research activites are:
- The ecological impact of attending international conferences. We have signed the University of Bordeaux ecological chart saying that we should try to reduce travel and privilege train as much as possible. Some of us also signed a more restrictive commitment, saying that we will try to limit ourselves to 20 000km traveled by plane over a period of two years.1
- The impact of our computations. Some of our record computations (largest class polynomials, largest primality proof) require using a large cluster for a long time. To reduce this impact we aim to develop faster algorithms.
5.2 Impact of research results
Another possible impact of Axis 3 will be ecological. Moving blockchains from Proof of Work to Proof of Stake is key to reduce their ecological impact. Verifiable delay functions are a core component of proof of stake, so Axis 3 will play a small role in helping this transition. In the same vein, cryptography based on class groups makes it possible to reduce the bandwidth used for certain multiparty protocols.
6 Highlights of the year
Raphaël Pagès defended his PhD thesis Factorisation des opérateurs différentiels en caractéristique positive in February 2024 29.
6.1 Awards
The Pari/GP software won the price Prix science ouverte du logiciel libre de la recherche from the ministère de l’Enseignement supérieur et de la Recherche in the category Communauté.
The paper 20 by P. Dartois, A. Leroux, D. Robert and B. Wesolowski won the best paper award of Eurocrypt 2024.
7 New software, platforms, open data
7.1 New software
7.1.1 PARI/GP
-
Keyword:
Computational number theory
-
Functional Description:
PARI/GP is a cross platform and open-source computer algebra system designed for fast computations in number theory: factorizations, algebraic number theory, elliptic curves, modular forms, L functions... It also contains a wealth of functions to compute with mathematical entities such as matrices, polynomials, power series, algebraic numbers, etc., and a lot of transcendental functions as well as numerical summation and integration routines. PARI is also available as a C library to allow for faster computations.
- URL:
-
Contact:
Aurel Page
-
Participants:
Bill Allombert, Karim Belabas, Henri Cohen, Andreas Enge, Aurel Page
-
Partner:
CNRS
7.1.2 FLINT
-
Name:
Fast Library for Number Theory
-
Keywords:
Computer algebra, Computational number theory, Arithmetic
-
Functional Description:
FLINT is a C library for doing number theory. At its core, FLINT provides arithmetic in standard rings such as the integers, rationals, algebraic, real, complex and p-adic numbers, finite fields, and number fields. It also provides polynomials (univariate and multivariate), power series, and matrices.
FLINT covers a wide range of functionality: primality testing, integer factorisation, multivariate polynomial GCD and factorisation, FFTs, multimodular reconstruction, special functions, exact and approximate linear algebra, LLL, finite field embeddings, and more.
- URL:
-
Contact:
Fredrik Johansson
-
Partner:
Technische Universität Kaiserslautern (UniKL)
7.1.3 GNU MPC
-
Functional Description:
Mpc is a C library for the arithmetic of complex numbers with arbitrarily high precision and correct rounding of the result. It is built upon and follows the same principles as Mpfr. The library is written by Andreas Enge, Philippe Théveny and Paul Zimmermann.
-
Release Contributions:
Changes in version 1.3.1, released in December 2022: - Bug fix: It is again possible to include mpc.h without including stdio.h.
Changes in version 1.3.0 ("Ipomoea batatas"), released in December 2022: - New function: mpc_agm - New rounding modes "away from zero", indicated by the letter "A" and corresponding to MPFR_RNDA on the designated real or imaginary part. - New experimental ball arithmetic. - New experimental function: mpc_eta_fund - Bug fixes: - mpc_asin for asin(z) with small |Re(z)| and tiny |Im(z)| - mpc_pow_fr: sign of zero part of result when the base has up to sign the same real and imaginary part, and the exponent is an even positive integer - mpc_fma: the returned 'int' value was incorrect in some cases (indicating whether the rounded real/imaginary parts were smaller/equal/greater than the exact values), but the computed complex value was correct. - Remove the unmaintained Makefile.vc, build files for Visual Studio can be found at https://github.com/BrianGladman/mpc .
- URL:
-
Contact:
Andreas Enge
-
Participants:
Andreas Enge, Mickaël Gastineau, Paul Zimmermann, Philippe Theveny
7.1.4 SQISignHD
-
Keyword:
Cryptography
-
Functional Description:
Compact post-quantum signature algorithm using isogenies in higher dimension.
-
Contact:
Benjamin Wesolowski
7.1.5 SQIsign2d
-
Name:
Compact post-quantum signature algorithm using isogenies in dimension 2
-
Keyword:
Cryptography
-
Functional Description:
Compact post-quantum signature algorithm using isogenies in dimension 2, improving on SQIsign and SQIsignHD
-
Contact:
Luca De Feo
7.1.6 ThetaIsogenies
-
Keyword:
Cryptography
-
Functional Description:
Fast computation of 2n̂ isogenies in dimension 2.
- URL:
-
Contact:
Damien Olivier Robert
7.1.7 Kummer Line
-
Keyword:
Cryptography
-
Functional Description:
Library for the arithmetic of Kummer lines (arithmetic, isogenies, pairings)
- URL:
-
Contact:
Damien Olivier Robert
7.1.8 CM
-
Keyword:
Arithmetic
-
Functional Description:
The Cm software implements the construction of ring class fields of imaginary quadratic number fields and of elliptic curves with complex multiplication via floating point approximations. It consists of libraries that can be called from within a C program and of executable command line applications.
-
Release Contributions:
Version 0.4.3 "Fitzebohnen", released in February 2024, comes with the following new features: - Support FLINT version 3. - Add an upper bound on the permitted class number in ECPP, to avoid choosing discriminants for which class polynomials cannot be computed in reasonable time and with reasonable memory. - Add a binary ecpp-check for checking certificates.
- URL:
-
Contact:
Andreas Enge
-
Participant:
Andreas Enge
8 New results
8.1 Higher dimensional number theory
Participants: Xavier Caruso, Henri Cohen, Aurel Page.
In 34, A. Bartel and A. Page develop a new approach to the isospectrality of the orbifolds constructed by Vignéras.
In 51, H. Cohen explains how to accelerate continued fractions, and then in 50 he builds a database of continued fractions of polynomial type.
Drinfeld modules
In 12,
X. Caruso and Quentin Gazda designed an implemented an efficient
algorithm for computing
In 39,
X. Caruso, Quentin Gazda and Alexis Lucas studied Wieferich primes
in the context of Drinfeld modules. They managed to relate the
property of being Wieferich to the vanihsing of the
Algebraic differential equations
Alin Bostan, X .Caruso and Julien Roques published a survey 11 on the theory of linear differential equations over number fields and finite fields, focusing on algebraic criteria for the existence of algebraic solutions.
8.2 Algorithms for number theory
Participants: Razvan Barbulescu, Karim Belabas, Jean-Marc Couveignes, Andreas Enge, Fabrice Etienne.
In 22, A. Enge presents his implementation of the
FastECPP algorithm for primality proving. He carries out a complexity
analysis with particular emphasis on the parallelisation aspects and
presents the parameter choices that have made possible the record
of a primality proof for
In 42, F. Etienne describes an algorithm to compute class groups by induction with generalised norm relations.
The paper 7 by R. Barbulescu and F. Jouve useing the Elliott-Halberstam conjecture to measure how ECM friendly an elliptic curve with complex multiplication is was published in Acta Arithmetica.
In 8, published in Mathematics of Computation, K. Belabas and D. Simon give an algorithm for power detection in number fields.
8.3 Cryptography
Participants: Guilhem Castagnos.
In 19, L. Braun, G. Castagnos, I. Damgård, F. Laguillaumie, K. Melissaris, C. Orlandi, I. Tucker present distributed key generation and decryption protocols for an additively homomorphic cryptosystem based on class groups, CL, improving on a similar system proposed by Braun, Damgård, and Orlandi at CRYPTO'23. Their key generation is similarly constant round but achieves lower communication complexity than the previous work. This improvement is in part the result of relaxing the reconstruction property required of the underlying integer verifiable secret sharing scheme. This eliminates the reliance on potentially costly proofs of knowledge in unknown order groups. They present a new method to batch zero-knowledge proofs in unknown order groups which strengthens these improvements. They also present a protocol which is proven secure against adaptive adversaries in the single inconsistent player (SIP) model. Theirs protocols are secure in the universal composability (UC) framework and provide guaranteed output delivery. They demonstrate the relative efficiency of our techniques by presenting the running times and communication costs associated with our implementation of the statically secure protocol and provide a direct comparison with alternate state of the art constructions.
8.4 Isogeny based cryptography
Participants: Bill Allombert, Pierrick Dartois, Sabrina Kunzweiler, Aurel Page, Damien Robert, Benjamin Wesolowski.
The paper 20, P. Dartois, A. Leroux, D. Robert and B. Wesolowski, which present the SQISignHD protocol, has been published in Eurocrypt 2024 and won the best paper awards.
The verification step of SQISignHD requires computing dimension 4 2e-isogenies. The algorithmic aspects of this task was tackled in 40 by P. Dartois, using theta coordinates.
In 18, published at Asiacrypt 2024, A. Basso, L. de Feo, P. Dartois, A. Leroux, L. Maino, G. Pope, D. Robert, and B. Wesolowski introduce the SQISign2d protocol (in its West variant). This version improves on the SQISignHD version by keeping the fast signature and strong security proof while improving significantly on the verification time.
In 44, S. Kunzweiler, L. Maino T. Moriya C. Petit, G. Pope D. Robert, M. Stopar and Y.B. Ti look at hash functions from isogeny graphs in dimension up to
The paper 27, by D. Robert, written for the NuTMiC 2024 invited talk, contains a survey on the representation of isogenies. It notably focus on the recent HD representation, which allows to give an efficient representation of any isogeny, and which had tremendous impacts on the field of isogeny based cryptography.
In 47, D. Robert introduces MIKE (module isogeny key exchange) a new Non Interactive Key Exchange protocol, which combine the best advantages of CSIDH and full non commutative supersingular isogeny graphs.
Using commutative isogeny graphs, like in CSIDH, allow to build a NIKE. But the graphs result from a commutative group action (by ideals of a class group), and the protocol is susceptible to a subexponential quantum attack. The idea of exploiting non commutative supersingular graphs was used in SIDH, but the protocol relied on extra torsion information (due to the difficulty of building a NIKE on a non commutative graph), and was spectacularly broken in 2022.
The idea of MIKE is to replace the ideal action by a Hermitian module action to get the benefit of a nice NIKE without the subexponential attack. In 47, D. Robert shows that supersingular graphs fit into this framework via their Weil restriction, which can be described by a rank 2 module action.
In 31, B. Allombert, J-F. Biasse, J. K. Eriksen, P. Kutas, C. Leonardi, A .Page, R .Scheidler, M. T. Bagi give new efficient parameters for SCALLOP, an isogeny based (full) group action. The main difference compared to SCALLOP is that they start from a non trivial class group at the top of the volcano. This required a large class group computation, done via tweaks to the Pari/GP algorithm.
The paper 6 by S. Arpin, J. Clements, P .Dartois, J. K. Eriksen, P. Kutas and B Wesolowski on finding orientations was published in esigns, Codes and Cryptography.
The paper 17 by B. Wesolowski on attacking the isogeny path problems in Drinfeld modules was published in IACR Communications in Cryptology.
The paper 21 by P. Dartois, L. Maino, G. Pope and
D. Robert, using optimised formula for
The paper 26 by A. Page and B. Wesolowski on the equivalence between the one endomorphism and the full endomorphism problem for supersingular elliptic curves has been published in Eurocrypt 2024.
8.5 Elliptic curves and abelian varieties
Participants: Elena Berardini, Andreas Enge, Sabrina Kunzweiler, Aurel Page, Damien Robert, Nicolas Sarkis.
In 15, published at ANTS 2024, S. Kunzweiler and D. Robert give a new method, using deformation and higher dimensional isogenies, to compute modular polynomials on elliptic curves. The algorithm is quasi-linear and does not rely on any assumption.
In 16, published in IACR Communications in Cryptology, D. Robert and N. Sarkis improve some formulas for computing 2-isogenies between Kummer lines, notably on variants of the Montgomery models.
They use these results in 46 to give new (faster) formulas for scalar multiplications on Montgomery curves.
A. Enge and M. Streng have completely rewritten their preprint 41. Using Shimura reciprocity and quadratic forms over totally real number fields they provide an easy to implement algorithm for deciding whether special values of Siegel modular functions of higher level define moduli of polarised abelian varieties and lead to class invariants defining unramified abelian field extensions. In this case, they determine a complete set of Galois conjugates. They also examine in detail under which conditions the invariants are real.
In 37 E. Berardini, A. Giangreco–Maidana and S. Marseglia characterize abelian surfaces defined over finite fields containing no curves of genus less than or equal to 3. They complete and expand the characterisation of isogeny classes of abelian surfaces with no curves of genus up to 2, then show that for simple abelian surfaces, containing a curve of genus 3 is equivalent to admitting a polarisation of degree 4. Thanks to this result, they can use existing algorithms to check which isomorphism classes in the isogeny classes containing no genus 2 curves have a polarisation of degree 4. Besides, they describe absolutely irreducible genus 3 curves lying on abelian surfaces containing no curves of genus less than or equal to 2, and show that their number of rational points is far from the Serre–Weil bound.
The paper 14 by J. Kieffer, A. Page and D. Robert on computing isogenies from modular polynomials in dimension 2 was published in Journal of Algebra.
8.6 Pairings
Participants: Damien Robert, Jean Gasnier.
In 45, D. Robert give new formulas to compute pairings on elliptic curves and abelian varieties by developing the arithmetic of biextensions and cubical arithmetic.
In 43, J. Gasnier and A. Guillevic given an algebraic point of view on the generation of pairing-friendly curves.
8.7 Lattices and Lattice-based cryptography
Participants: Guilhem Mureau, Alice Pellet-Mary, Wessel van Woerden.
In June 2023, the NIST started an additional post-quantum signature standardization process.2 The objective of this new call is to standardize one or more post-quantum signature scheme, different from the ones standardized so far. Members of the Canari team have studied the security of some of the new submissions, based on lattices and codes.
In 24, published in Crypto 2024, Felicitas Hörmann and Wessel van Woerden described a polynomial time attack against a NIST submission called FuLeeca. This submission uses codes in the Lee metric, which make the algorithmic problems very similar to lattice problems. Exploiting this connection with lattices, the authors were able to exploit leakage from the signatures to obtain a key-recovery attack against the scheme.
In 25, Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok and Alexandre Wallet studied the hardness of the module lattice isomorphism problem (module-LIP), which serve as a foundation for the security of Hawk, another signature scheme submitted to the NIST competition. The authors showed that when instantiated over totally real fields, the module-LIP problem becomes easy, and can be heuristically solved in polynomial time (when the modules have rank 2). This does not threaten the Hawk signature scheme since they use modules over a totally complex field, which is not subject to the attack.
In 13, published in Acta Crystallographica, M. D. Sikirić and W. van Woerden give a Complete classification of six-dimensional iso-edge domains.
In 28, published in Asiacrypt 2024, W. van Woerden shows that dense and smooth lattices exist in any genus.
8.8 Quantum algorithms for cryptanalysis
Participants: Razvan Barbulescu.
In 32, Razvan Barbulescu, Muguel Barcau and Vicentiu Pasol extended Regev's quantum algorithm to elliptic curves. Indeed, the extension is not direct because there is no natural notion of smallness for the points of an elliptic curve over a finite field. The speedup with respect to Shor tends to infinity with the input size and corresponds to a speedup pf factor 4 for some curves of the NIST list.
In 33, Razvan Barbulescu and Gaëtan Bisson proposed a variant of Regev's algorithm for hyperelliptic curves. When the genus g is large the speed-up is
8.9 Coding theory
Participants: Elena Berardini, Xavier Caruso, Fabrice Drain.
In a series of paper 10, 35, E. Berardini and X. Caruso defined new families of codes for the sum-rank metric. They first introduced linearized versions of Algebraic Geometry codes and studied their parameter, showing in particular that the obtained codes beat the (sum-rank analogue of the) Gilbert–Varshamov bound. They also introduced a linearized analogue of Reed–Muller codes.
In 38, X. Caruso and F. Drain obtained a complete classification of self-dual skew cyclic and skew negacyclic codes. They also provided efficient algorithms for sampling and enumerating them.
In 9, E. Berardini, A. Caminata and A. Ravagnani investigate CSS and CSS-T quantum error-correcting codes from the point of view of their existence, rarity, and performance.
In 36, E. Berardini, R. Dastbasteh, J. Etxezarreta Martinez, S. Jain and O. Sanz Larrarte give a new construction of binary quantum codes that enables the generation of a CSS-T code from any given CSS code. Using this construction, they prove the existence of asymptotically good binary CSS-T codes, resolving a previously open problem in the literature.
8.10 Effective analysis and certified arithmetic
Participants: Fredrik Johansson.
In 23, F. Johansson and J. van der Hoeven gave efficient algorithms to take advantage of precomputations when evaluating elementary functions in multiple precision arithmetic.
In 48, L .Stempfle, A .James, J .Josse, T .Gauss, F .Johansson study interpretable machine learning models with missing data.
9 Partnerships and cooperations
Participants: Bill Allombert, Razvan Barbulescu, Karim Belabas, Elena Berardini, Xavier Caruso, Guilhem Castagnos, Andreas Enge, Jean-Marc Couveignes, Fredrik Johansson, Sabrina Kunzweiler, Aurel Page, Alice Pellet-Mary, Damien Robert.
9.1 International research visitors
9.1.1 Visits of international scientists
Other international visits to the team
The following international speakers gave a talk at the Canari seminar in 2024: Thomas Decru (KU Leuven), Semyon Novoselov (University of Kaliningrad), Rocco Mora (CISPA), Dmitrii Koshelev (Ethereum Foundation), Simona Etinski (CWI), Lars Ran (Radboud University), Oana Padurariu (Max-Planck-Institut für Mathematik, Bonn), Bram Bekker (TU Delft), Valentijn Karemaker (Universiteit Utrecht), Eric Ahlqvist (University of Edinburgh), Maria Corte-Real Santos (University College London), Reza Dasbasteh (Universidad de Navarra), Sam Frengley (University of Bristol), Florian Breuer (University of Newcastle, Australia), Rob de Jeu (Vrije Universiteit Amsterdam).
9.2 National initiatives
-
PEPR Technologies Quantiques
Integrated project PQ-TLS: Post-quantum padlock for web browser
with Inria teams Grace, Cosmiq, Prosecco Universities of Bordeaux, Rennes, Limoges, Versailles–St. Quentin, Rouen, St. Étienne, and ENS Lyon and CEA
2022–2027, total budget 4180k€, of which 456k€ for Bordeaux
-
PEPR Cybersécurité
Integrated project CRYPTANALYSE: Cryptanalysis of classical cryptographic primitives
with Inria teams Caramba, Cosmiq, Universities of Rennes, Amiens, Sorbonne, and CNRS
2023–2028, total budget 5000k€, of which about 90k€ for Bordeaux
-
HQI project (HPC-Quantum Initiative, France 2030)
France Hybrid HPC Quantum Initiative, R&D et support
17 partners in France; we will mainly work with LIP6 and ENS de Lyon
2021–2027, 165k€ for Bordeaux
-
ANR AGDE
Arithmetic and geometry of discrete groups
with Toulouse, Paris
2021–2025, 45k€ for Bordeaux
-
ANR Ciao
Isogeny based cryptosystems, applications to verifiable delay functions and post-quantum cryptography (PI D. Robert)
with Paris, Montpellier
2019–2024, 150k€ for Bordeaux
-
ANR/NSF Charm
Cryptographic hardness of module lattices
with Florida Atlantic, Cornell, ENS Lyon
2021–2024, 205k€ for Bordeaux
-
ANR NuSCAP
Numerical safety for computer-aided proofs
with Lyon, Nantes, Paris, Sophia-Antipolis, Toulouse
2021–2025
-
ANR PadLEfAn
-adic properties of -functions effective and analytic aspectswith Besançon, Caen
2022–2026
-
ANR Sangria
Secure distributed computation: cryptography, combinatorics and computer algebra
with Paris and région Occitanie
2021–2025
-
ANR TOTORO
Towards new assumptions in lattice-based cryptography (PI A. Pellet--Mary)
with Toulouse and Telecom Paris
2023–2027, 186k€
-
PEPS
Groupe des points des variétés abéliennes sur les corps finis
E. Berardini and F. Campagna (LMBP, UCA)
2024, 4000€
10 Dissemination
Participants: Bill Allombert, Razvan Barbulescu, Karim Belabas, Elena Berardini, Xavier Caruso, Guilhem Castagnos, Andreas Enge, Jean-Marc Couveignes, Fredrik Johansson, Sabrina Kunzweiler, Aurel Page, Alice Pellet-Mary, Damien Robert.
10.1 Promoting scientific activities
10.1.1 Scientific events: organisation
- X. Caruso co-organized a one-week workshop SageDays 125
- E. Berardini co-organized a two-day symposium called CAIPI (Coding theory, cryptogrAphy, arIthmetic geometry, and comPuter Algebra) three times during 2024 in Marseille (February), Rennes (May) and Limoges (December)
- A. Enge organized a three-day MPFR/MPC/MPFI/ARB Developers Meeting
- A. Enge and F. Johansson co-organized a one-week 2024 FLINT development workshop
Member of the conference program committees
- G. Castagnos was part of the program committee of Crypto 2024
- G. Castagnos was part of the program committee of SCN 2024
- F. Johanssson was part of the program committee of ANTS 2024
- S. Kunzweiler was part of the program committee of PKC 2025
- A. Pellet-Mary was part of the program committee of Crypto 2024
- W. van Woerden was part of the program committee of Eurocrypt 2025
10.1.2 Journal
Member of the editorial boards
- K. Belabas is an editor of Archiv der Mathematik since 2006.
- X. Caruso is member of the scientific board for the Journal de Théorie des Nombres de Bordeaux since 2022.
- J.-M. Couveignes is an editor of the Publications mathématiques de Besançon since 2019.
- J.-M. Couveignes was an editor of the Journal de théorie des nombres de Bordeaux from 2019 to 2023.
- A. Enge is an editor of Designs, Codes and Cryptography since 2004.
- A. Page is an associate editor of the LMFDB since 2022.
- E. Berardini is member of the editorial board of De Cifris Koine
10.1.3 Invited talks
- Alice Pellet-Mary gave an invited talk at the conference SCN 2024
- D. Robert gave an invited talk On the efficient representation of isogenies at the conference NuTMiC 2024, and a talk From ideals to modules for isogeny based cryptography at the Leuven Isogeny Days 5. He also gave a talk Quand l’ajout de structure casse un cryptosystème : quelques exemples de cryptanalyse at the Journées Scientifiques Inria.
- S. Kunzweiler gave an invited talk on Recent developments in isogeny-based cryptography at the conference PQCrypto 2024 , and an invited talk on Isogeny Computations in Higher Dimensions at the workshop ECC 2024.
- E. Berardini gave an invited talk on From curves to surfaces: a walk through Algebraic Geometry codes at the conference Mathematics for Post-Quantum Cryptanalysis in Budapest, Hungary.
10.1.4 Scientific expertise
- X. Caruso was part of the HCERES committee that evaluates the LAGA (Université Paris 13).
10.1.5 Research administration
- K. Belabas is Vice président en charge du numérique (vice-president in charge of digital strategy and policies) at the University of Bordeaux since March 2022.
- X. Caruso is vice-head of Institut de Mathématiques de Bordeaux, in charge of the IT department.
- J.-M. Couveignes is Chargé de mission pour la sécurité numérique at the University of Bordeaux.
- D. Robert is Chargé de mission Développement logiciel at the Institut Mathématiques de Bordeaux since 2018.
- A. Page and A. Enge are members of the Conseil d'Administration of the Société Arithmétique de Bordeaux, which publishes the Journal de Théorie des Nombres de Bordeaux and provides financial support for the organisation of number theory events.
- A. Enge is an elected member of the CAP chercheurs at Inria since 2023.
- A. Enge is a member of the Comité Parité et Égalité des Chances of Inria since 2024.
- G. Castagnos is responsible for the master's degree in cryptography and IT security of the University of Bordeaux since 2024.
10.2 Teaching - Supervision - Juries
- Andreas Enge has given a series of lectures on elementary, analytic and algorithmic number theory at the CIMPA school Algèbre, géométrie algébrique et applications à la théorie de l'information in Douala (Cameroun) https://douala2024.gaati.org/.
- Alice Pellet-Mary has given a series of lectures on lattice based cryptography at the same CIMPA school in Douala (Cameroun).
- Sabrina Kunzweiler gave a lecture at the autumn school in supersingular isogenies in Taipei (Taiwan).
- K. Belabas
- 64h course on computer algebra, Master 2 (preparation for the Agrégation national competitive examination), University of Bordeaux
- 35h course on quantum algorithms, Master 2, University of Bordeaux
- X. Caruso
- 35h course on quantum computing, Master 2, University of Bordeaux
- G. Castagnos
- 24h course on cryptology, Master 1, University of Bordeaux
- 36h course on advanced cryptography, Master 2, University of Bordeaux
- 35h course on algorithmics of integers and polynomials, Bachelor, University of Bordeaux
- J.-M. Couveignes
- 25h course on algorithmic arithmetics, Master, Université of Bordeaux
- 160h course at CPBX (undegraduate program for student in engineering)
- A. Page
- 27h exercise sessions on computer algebra, Master 2 (preparation for the Agrégation national competitive examination), University of Bordeaux
- E. Berardini
- 24h course on information theory, Master 1, University of Bordeaux
- 16h course on arithmetic and cryptology, Licence 3, University of Bordeaux
10.2.1 Supervision
- PhD in progress: Anne-Edgar Wilke, Enumerating integral orbits of prehomogeneous representations, since September 2019, supervised by K. Belabas.
- PhD in progress: Agathe Beaugrand, Conception de systèmes cryptographiques utilisant des groupes de classes de corps quadratiques, since September 2021, supervised by Guilhem Castagnos and Fabien Laguillaumie.
- PhD in progress: Fabrice Étienne, Techniques d'induction pour l'algorithmique des représentations galoisiennes, since September 2022, supervised by Aurel Page.
- PhD in progress: Nicolas Sarkis, Recherche de courbes planes de genre 2 adaptée à la factorisation des entiers, since September 2022, supervised by Razvan Barbulescu and Damien Robert.
- PhD in progress: Pierrick Dartois Improvement and security analysis of isogeny-based cryptographic schemes, since September 2022, supervised by Damien Robert and Benjamin Wesolowski.
- PhD in progress: Jean Gasnier, Algorithmique des isogénies et applications, since October 2022, supervised by Jean-Marc Couveignes.
- PhD in progress: Fabrice Drain, Codes for the sum-rank metric, since September 2023, supervised by Elena Berardini and Xavier Caruso.
- PhD in progress: Guilhem Mureau, Isomorphism of algebraic lattices, since September 2023, supervised by Alice Pellet--Mary and Renaud Coulangeon.
- PhD in progress: Alix Barraud, Algebraic geometry codes from surfaces and quantum codes, since September 2024, supervised by Elena Berardini and Gilles Zémor.
10.2.2 Juries
- X. Caruso
- Cécile Armana (HDR), Université de Bourgogne Franche-Comté, 2024: Contributions à l’étude des formes modulaires sur les corps de fonctions
- Bianca Gouthier, Université de Bordeaux, 2024: Actions rationnelles de schémas en groupes infinitésimaux
- Raphaël Pagès, Université de Bordeaux, 2024: Factorisation des opérateurs différentiels en caractéristique positive
- Martin Weimann (HDR), Université Caen-Normandie, 2024: Incursions en géométrie algébrique effective et calcul formel
- G. Castagnos
- Ambroise Fleury, Université Paris-Saclay, 2024: Amélioration des algorithmes de crible. Application à la factorisation des entiers (report)
- A. Enge
- Sorina Ionica (HDR), Université de Picardie Jules Verne, 2024: Variétés abéliennes, multiplication complexe et cryptographie (report)
- S. Kunzweiler
- Jonathan Komada Eriksen, Norwegian University of Science and Technology (Trondheim, Norway), 2024: Supersingular Endomorphism Rings: Algorithms and Applications
- E. Berardini
- Raphaël Pagès, Université de Bordeaux, 2024: Factorisation des opérateurs différentiels en caractéristique positive
- Antonio de Marti i Olius, University of Navarra–TECNUN (San Sebastian, Spain), 2024: Decoding Algorithms for Quantum Error Correcting Codes
- Antoine Leudière, Université de Lorraine, 2024: Morphismes de modules de Drinfeld et leurs algorithmes
10.3 Popularization
- X. Caruso gave a general audience talk “Les idéaux d'Emmy Noether” at the Bibliothèque Nationale de France in the programme Un texte, un mathématicien
10.3.1 Productions (articles, videos, podcasts, serious games, ...)
- X. Caruso and Pierre Grangé-Pradéras realized an art exposition Théorèmes; they presented several times this exposition to various audiences (including pupils and high school students).
10.3.2 Participation in Live events
- A. Pellet-Mary organized 4 “ateliers” for high school female students during the week “Moi informaticienne Moi Mathématicienne” at IMB.
- X. Caruso participated to the programmes “Fête de la Science” and “Village des Sciences”
- E. Berardini participated to the “Circuit Scientifique Bordelais", leading a workshop on error-correcting codes
11 Scientific production
11.1 Major publications
- 1 inbookCan we dream of a 1-adic Langlands correspondence?2313Mathematics Going ForwardLecture Notes in MathematicsSpringer International Publishing2023, 537-560HALDOI
-
2
articleComputation of classical and
-adic -series of -motives.Research in Number Theory2024. In press. HAL - 3 inbookComputational Number Theory, Past, Present, and Future.2313Mathematics Going ForwardLecture Notes in MathematicsSpringer International Publishing2023, 561-578HALDOI
- 4 inproceedingsSQIsignHD: New Dimensions in Cryptography.Eurocrypt 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14651Lecture Notes in Computer ScienceZurich (CH), SwitzerlandSpringer Nature SwitzerlandApril 2024, 3-32HALDOI
- 5 proceedingsD.Damien Robert, eds. Breaking SIDH in polynomial time.Advances in Cryptology – EUROCRYPT 202314008Lecture Notes in Computer ScienceSpringer Nature Switzerland; Springer Nature SwitzerlandMarch 2023, 472-503HALDOI
11.2 Publications of the year
International journals
- 6 articleFinding Orientations of Supersingular Elliptic Curves and Quaternion Orders.Designs, Codes and Cryptography9211November 2024, 3447-3493HALDOIback to text
- 7 articleECM And The Elliott-Halberstam Conjecture For Quadratic Fields.Acta Arithmetica21342024, 289-324HALDOIback to text
- 8 articlePower detection over number fields.Mathematics of Computation93348February 2024, 1953-1961HALDOIback to text
- 9 articleStructure of CSS and CSS-T Quantum Codes.Designs, Codes and Cryptography9210May 2024, 2801-2823HALDOIback to text
- 10 articleAlgebraic Geometry codes in the sum-rank metric.IEEE Transactions on Information Theory705April 2024, 3345-3356HALDOIback to text
- 11 articleAlgebraic solutions of linear differential equations: An arithmetic approach.Bulletin of the American Mathematical Society6142024, 609-658HALDOIback to text
-
12
articleComputation of classical and
-adic -series of -motives.Research in Number Theory2024. In press. HALback to text - 13 articleComplete classification of six-dimensional iso-edge domains.Acta Crystallographica Section A : Foundations and Advances [2014-...]811January 2025, 9-15HALDOIback to text
- 14 articleComputing isogenies from modular equations in genus two.Journal of Algebra666March 2025, 331-386HALDOIback to text
- 15 articleComputing modular polynomials by deformation.Research in Number Theory111December 2024, 10HALDOIback to text
- 16 articleComputing 2-isogenies between Kummer lines.IACR Communications in CryptologyApril 2024HALDOIback to text
- 17 articleComputing isogenies between finite Drinfeld modules.IACR Communications in CryptologyApril 2024HALDOIback to text
International peer-reviewed conferences
- 18 inproceedingsSQIsign2D-West The Fast, the Small, and the Safer.ASIACRYPT15486Lecture Notes in Computer ScienceKolkata, IndiaSpringer Nature SingaporeDecember 2024, 339-370HALDOIback to text
- 19 inproceedingsAn Improved Threshold Homomorphic Cryptosystem Based on Class Groups.Lecture Notes in Computer ScienceSCN 2024 - 14th International Conference on Security and Cryptography for NetworksLNCS-14974Security and Cryptography for NetworksAmalfi, ItalySpringer Nature SwitzerlandSeptember 2024, 24-46HALDOIback to text
- 20 inproceedingsSQIsignHD: New Dimensions in Cryptography.Eurocrypt 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14651Lecture Notes in Computer ScienceZurich (CH), SwitzerlandSpringer Nature SwitzerlandApril 2024, 3-32HALDOIback to textback to text
- 21 inproceedingsAn Algorithmic Approach to (2, 2)-isogenies in the Theta Model and Applications to Isogeny-based Cryptography.Advances in Cryptology – ASIACRYPT 202415486Lecture Notes in Computer ScienceKolkata, IndiaSpringer Nature Singapore; Springer Nature SingaporeDecember 2025, 304-338HALDOIback to text
- 22 inproceedingsFastECPP over MPI.Mathematical Software – ICMS 202414749Lecture Notes in Computer ScienceDurham, United KingdomSpringer Nature SwitzerlandJuly 2024, 36-45HALDOIback to text
- 23 inproceedingsFast multiple precision exp(x) with precomputations.2024 IEEE 31st Symposium on Computer Arithmetic (ARITH)Malaga, SpainIEEE; IEEEJuly 2024, 80-87HALDOIback to text
- 24 inproceedingsFuLeakage: Breaking FuLeeca by Learning Attacks.Crypto 202414925Lecture Notes in Computer ScienceSanta Barbara, CA, United StatesSpringer Nature SwitzerlandAugust 2024, 253-286HALDOIback to text
- 25 inproceedingsCryptanalysis of rank-2 module-LIP in Totally Real Number Fields.Advances in Cryptology – EUROCRYPT 202443rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VIIEurocrypt 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14657Lecture Notes in Computer ScienceZurich, SwitzerlandSpringer Nature SwitzerlandApril 2024, 226-255HALDOIback to text
- 26 inproceedingsThe supersingular Endomorphism Ring and One Endomorphism problems are equivalent.Advances in Cryptology -- EUROCRYPT 202414656Lecture Notes in Computer ScienceZurich (CH), SwitzerlandSpringer Nature SwitzerlandApril 2024, 388-417HALDOIback to text
- 27 inproceedingsOn the efficient representation of isogenies: A survey for NuTMiC 2024.Lecture Notes in Computer ScienceNUTMIC 2024 - Number-Theoretic Methods in CryptologySzczecin, PolandJune 2024HALback to text
- 28 inproceedingsDense and Smooth Lattices in Any Genus.Asiacrypt 202415487Lecture Notes in Computer ScienceKolkata, IndiaSpringer Nature SingaporeDecember 2025, 386-417HALDOIback to text
Doctoral dissertations and habilitation theses
- 29 thesisFactoring differential operators in positive characteristic..Université de BordeauxFebruary 2024HALback to text
Reports & preprints
- 30 miscFast basecases for arbitrary-size multiplication.January 2025HAL
- 31 miscPEARL-SCALLOP: Parameter Extension Applicable in Real Life for SCALLOP.October 2024HALback to text
- 32 miscA comprehensive analysis of Regev's quantum algorithm.December 2024HALback to text
- 33 miscRegev's attack on hyperelliptic cryptosystems.December 2024HALback to text
- 34 miscVignéras orbifolds: isospectrality, regulators, and torsion homology.July 2024HALback to text
- 35 miscReed-Muller codes in the sum-rank metric.May 2024HALback to text
- 36 miscAsymptotically good CSS-T codes exist.December 2024HALback to text
- 37 miscAbelian surfaces over finite fields containing no curves of genus 3 or less.September 2024HALback to text
- 38 miscSelfdual skew cyclic codes.October 2024HALback to text
- 39 miscWieferich primes for Drinfeld modules.December 2024HALback to text
- 40 miscFast computation of 2-isogenies in dimension 4 and cryptographic applications.July 2024HALback to text
- 41 miscSchertz style class invariants for higher degree CM fields.2024HALback to text
- 42 miscComputing class groups by induction with generalised norm relations.November 2024HALback to text
- 43 miscAn Algebraic Point of View on the Generation of Pairing-Friendly Curves.December 2024HALback to text
- 44 miscRadical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3.December 2024HALback to text
- 45 miscFast pairings via biextensions and cubical arithmetic.December 2024HALback to text
- 46 miscHalving differential additions on Kummer lines.2024HALback to text
- 47 miscThe module action for isogeny based cryptography.October 2024HALback to textback to text
- 48 miscExpert Study on Interpretable Machine Learning Models with Missing Data.2024HALDOIback to text
11.3 Cited publications
- 49 softwareversion 0.4.3 February 2024 Software Heritage back to text
- 50 miscA Database of Continued Fractions of Polynomial Type.2024, URL: https://arxiv.org/abs/2409.06086back to text
- 51 miscApéry Acceleration of Continued Fractions.2024, URL: https://arxiv.org/abs/2401.17720back to text