2024Activity reportProject-TeamCAPSULE
RNSR: 202324388N- Research center Inria Centre at Rennes University
- In partnership with:Université de Rennes
- Team name: Applied Cryptography and Implementation Security
- In collaboration with:Institut de recherche en informatique et systèmes aléatoires (IRISA)
- Domain:Algorithmics, Programming, Software and Architecture
- Theme:Algorithmics, Computer Algebra and Cryptology
Keywords
Computer Science and Digital Science
- A1.2.8. Network security
- A4.3. Cryptography
- A4.3.1. Public key cryptography
- A4.3.2. Secret key cryptography
- A4.3.3. Cryptographic protocols
- A4.6. Authentication
- A4.8. Privacy-enhancing technologies
- A7.1.4. Quantum algorithms
- A8.5. Number theory
Other Research Topics and Application Domains
- B6.4. Internet of things
- B9.5.1. Computer science
- B9.5.2. Mathematics
- B9.10. Privacy
1 Team members, visitors, external collaborators
Research Scientists
- Patrick Derbez [INRIA, from Oct 2024, HDR]
- Aurore Guillevic [INRIA, Researcher, from Mar 2024]
- Andre Schrottenloher [INRIA, Researcher]
- Yixin Shen [INRIA, Researcher, from Jul 2024]
- Alexandre Wallet [INRIA, Researcher, until Apr 2024]
Faculty Members
- Pierre-Alain Fouque [Team leader, UNIV RENNES, Professor, HDR]
- Daniel De Almeida Braga [UNIV RENNES, Associate Professor, from Sep 2024]
- Patrick Derbez [UNIV RENNES, Associate Professor, until Sep 2024, HDR]
- Damien Marion [UNIV RENNES, Associate Professor, from Sep 2024]
PhD Students
- Clemence Chevignard [UNIV RENNES]
- Gael Claudel [INRIA, from Oct 2024]
- Mathieu Degre [UNIV RENNES, from Jan 2024]
- Quentin Edme [ORANGE, CIFRE, from Jan 2024]
- Baptiste Germon [UNIV RENNES, from Oct 2024]
- Aymeric Hiltenbrand [UNIV RENNES]
- Corentin Jeudy [ORANGE LABS, CIFRE, until Oct 2024]
- Thi Thu Quyen Nguyen [IDEMIA, CIFRE, until Oct 2024]
- Phuong Nguyen [UNIV RENNES]
- Guilhem Niot [PQSHIELD, CIFRE, from Apr 2024]
- Aurel Pichollet–Mugnier [INRIA, from Nov 2024]
Technical Staff
- Calvin Abou Haidar [UNIV RENNES, from Feb 2024 until Mar 2024]
- Daniel De Almeida Braga [UNIV RENNES, Engineer, from Apr 2024 until Aug 2024]
- Paul Kirchner [UNIV RENNES, from Sep 2024]
- Damien Marion [UNIV RENNES, until Aug 2024]
- Heorhii Pliatsok [INRIA, Engineer, from Apr 2024 until Aug 2024]
Interns and Apprentices
- Todd Cauet-Male [INRIA, Intern, from Jun 2024 until Sep 2024]
- Gael Claudel [UNIV RENNES, Intern, from Mar 2024 until Aug 2024]
- Paul Delhom [INRIA, Intern, from May 2024 until Oct 2024]
- Thibault Didier [UNIV RENNES, Intern, from Jun 2024 until Jul 2024]
- Baptiste Germon [UNIV RENNES, Intern, from Mar 2024 until Sep 2024]
- Rayan Lachguel [UNIV RENNES, Intern, until Mar 2024]
- Laz Panard [INRIA, Intern, from May 2024 until Oct 2024]
- Jules Rousseau [UNIV RENNES, Intern, from Apr 2024 until Sep 2024]
Administrative Assistant
- Isobelle Kelly [Inria, from Jan 2024]
External Collaborators
- Clément Dell'Aiera [DGA-MI, from Apr 2024]
- Marie Euler [DGA-MI, from Jan 2024]
- Mathieu Goessens [UNIV RENNES, from Sep 2024]
- Tuong-Huy Nguyen [DGA-MI, from Apr 2024]
2 Overall objectives
Nowadays, and contrary to the past decades, the design of cryptographic algorithms follows an integrated approach which considers security, efficiency and implementation requirements at the same time. The research activities of the team CAPSULE tackle these challenges in order to provide more secure cryptographic implementations and applications deployed in the real world.
- Highly efficient symmetric cryptosystems are a prerequisite for all cryptographic infrastructure. Recently, many new designs have been proposed, which aim to perform well under various constraints (e.g., lightweight cryptographic schemes, or schemes tailored for advanced FHE and MPC protocols). The confidence in these schemes is based on cryptanalysis, analyzing their security against classical and quantum adversaries. Our research lies not only in finding new attacks, but also in designing automated audit tools that simplify and systematize this task.
- Post-quantum security is a major challenge that cryptographers are facing right now. As new post-quantum designs for encryption and digital signatures are being standardized by NIST, the CAPSULE team is actively involved in further improving the efficiency of these schemes and their security analysis, both against classical and quantum adversaries.
- Both symmetric and asymmetric cryptosystems need ultimately to be implemented, and these implementations can be vulnerable to various types of side-channel attacks. Finding new attacks and implementing new countermeasures are two sides of the same coin.
- We are also interested in studying the security of well-known deployed systems such as the security of TLS or secure messaging, and on the security of databases.
3 Research program
3.1 Security against post-quantum attackers
The seminal paper of Peter Shor at FOCS 1994 74 shows that if we were able to build quantum computers, then the factorization and discrete logarithm problems could be solved in polynomial time. Since then, there has been a tremendous effort in the cryptographic community to propose cryptosystems that are secured in the presence of quantum computers. Many alternatives to the two number theoretic problems above have been proposed. Among them, our team already has activities and interests in two types of assumptions:
- lattice-based schemes, where security is based on the difficulty on computing short vectors in random euclidean lattices;
- code-based schemes, where security is based on the difficulty on computing low hamming weight words in random codes.
Euclidean lattices are discrete subgroups of
In post-quantum cryptography, lattice-based assumptions take an important place and received an increasing amount of attention in the last decade, thanks to the strong security guarantees provided by these assumptions as well as their flexibility for cryptographic designs. Indeed, Ajtai and Regev presented reductions between, respectively, finding Short Integer Solutions of random linear systems (SIS) or solving random noisy linear systems (“Learning With Errors”, LWE) and computing short vectors in euclidean lattices in the worst case. They both served as the foundation of security to design public-key encryptions, digital signatures, zero-knowledge proof systems, key-encapsulation mechanisms, homomorphic encryption ... In order to improve practical efficiency, "structured" versions of these problems relying on lattices with symmetries have been proposed. Such lattices are related to algebraic objects appearing in the geometry of numbers and some of the resulting schemes have been the clear winners of NIST's call for standardization.
Better Reductions.
Our trust in the hardness of lattice-based constructions relies fundamentally on our understanding of the security reductions between the (many, structured) variants of SIS and LWE. Depending on the additional structure allowed to the designer, they are associated to number rings, ideals, and, more generally, modules over the integer ring of a number field, and related to the corresponding class of lattices with symmetries. Additionally, for LWE the noise distribution is also a parameter of the problem. Overall, this leads to a plethora of variants and versions that need some hierarchizing and a better understanding of the interplay between their related parameters. Thankfully, important classifying works have already been presented, regularly involving members of our team (e.g. 48, 73, 44.
Yet, there are still many unclear results or relations that are not yet satisfyingly understood.
For example, the fundamental reductions of Ajtai and Regev are far from tight, incurring a blowup in important
parameters (sometimes estimated to be in
Algorithms for hard problems and attacks on cryptosystems.
We have proposed some algorithms to study the security of hard computational problems in cyclotomic fields as the Principal Ideal Problem (PIP) in 40, reducing module lattices as a generalization of the LLL algorithm in the ring of integers of a number field in 64 or in a tower of cyclotomic fields in 61. We generalized the BKW algorithm to binary LWE setting in 62 and studied the Learning Parities with Noise (LPN) Problem in 65.
We have also attacked concrete cryptographic schemes. We broke some multivariate schemes such as the SFLASH signature schemes in 54 and variants 58, and the ASASA schemes in 69. We have also broken FHE schemes based on overstretched NTRU parameters in 63 or concrete FHE in 49.
We want to study the resistance of post-quantum cryptosystems and hard problems against classical and quantum adversaries. It is particularly interesting for lattice problems since the cryptanalysis of these problems is very young. One key objective in this line of research would be to find an analog of the BKZ algorithm for structured lattices defined over a number field. It is also interesting to improve the recent work of 37, which suggests that this problem may be weaker than previously thought.
Constructions and practical cryptosystems.
Applications of cryptography usually culminate with the description of an efficient cryptosystem. An important part of our activity in post-quantum cryptography therefore targets the design of new schemes resistant to quantum attackers, providing advanced functionalities to its users, without sacrificing efficiency.
In this area, members of CAPSULE have worked on the lattice-based signature scheme Falcon and its efficiency-security trade-off ModFalcon 50. A first objective would be to extend in a useful way the so-called “trapdoor generation” which is core to the two schemes above. In a nutshell, the secret key corresponds to a basis of short vectors of a lattice, that only the user should be able to compute efficiently. ModFalcon already extended the class of lattices for which this can be done, and it is an interesting question to manage an even larger class of lattice. In terms of applications, this would allow for even more flexibility, which can be particularly useful when the signature scheme is used as a black box inside a larger cryptographic algorithm. It could also allow for other functionalities such as threshold signatures or maybe masked signatures. On this line of thought, we are also interested in designing masked lattice signatures or even multi-party signatures. While there have been very recent proposals (relying on a different paradigm than the Falcon family), the efficiency is still lacking in practice. A success here could lead to concrete industrial applications.
But this is not the only construction on which the team is currently working. There are many interesting cryptographic constructions that need to be studied to obtain efficient post-quantum schemes, such as signatures and zero-knowledge proofs, but also signatures with more properties like group signatures, blind signatures ... and applications like e-voting. Indeed, a lot of progress have been made to obtain efficient signatures and public key encryptions, especially with the NIST competition, but the efficiency of more advanced schemes is still far from existing (but not post-quantum) solutions. One of the big challenges would be to obtain efficient zero-knowledge proof systems, as this primitive is often an easy way to build more advanced primitives.
3.2 Symmetric Cryptography
Despite being one of the oldest forms of cryptography, symmetric cryptography is a very active research area, with recent activity focusing on new designs optimized for specific operational constraints. For example, the lightweight cryptography competition launched by the NIST1 in 2017 concluded in 2023 by selecting the lightweight cipher family Ascon 53, optimized for hardware implementations. At the same time, many new ciphers have been proposed which are optimized to be integrated in advanced cryptographic protocols, such as the FHE-friendly block cipher LowMC, or protected hardware implementations.
The team CAPSULE studies the security of symmetric primitives such as block ciphers, stream ciphers and hash functions, against various types of attacks. We consider both classical and quantum security, the latter being a prerequisite for post-quantum cryptography architectures.
Tools for discovering new attacks.
Symmetric cryptosystems are widely used because they are the only ones that can achieve some major functionalities such as high-speed or low-cost encryption, fast message authentication, and efficient hashing. But, unlike public-key cryptographic algorithms, secret-key primitives do not have satisfying security proofs. The security of these algorithms is empirically established by cryptanalysis.
It is obvious that this security criterion, despite its success so far, is not completely satisfactory. For instance we may estimate that, for a given primitive, no more than a few dozens of researchers are actively working on breaking it. Hence, due to this weak effort, the non-discovery of an attack against a particular primitive does not mean so much. Besides, finding the best attacks on a given design is a time-consuming work, and errors can lead to under- or over-estimating its security.
Therefore, our team specializes in building tools for automatically finding large classes of attacks. This transforms the statement “we did not find any attack of this kind”, which is only a subjective guarantee, into “the audit tool X did not find any attack”, which is a formal statement, giving a quantifiable objective guarantee.
In the past, the members of the team have proposed many tools, for example for improving attacks on round-reduced versions of AES 45, Demirci-Selçuk attacks on AES 52, and impossible differential attacks 51.
Our more recent work uses tools based on MILP (Mixed Integer Linear Programming), SAT (Satisfiability) or CP (Constraint Programming). In this setting, the search and optimization of an attack are reduced to a problem of a specific form, for which an off-the-shelf solver is used. Besides the actual work of implementing this reduction, our research aims at better understanding the differences between these optimization tools, finding which ones are more adapted for a given problem, and adapting some of these general-purpose software tools to particular cryptographic problems.
Finding and optimizing a cryptanalytic attack in its entirety is an especially interesting problem, since it requires the integration of different steps (for example a good distinguisher and a key-recovery phase). Since the search space is of exponential size, often making the problem intractable, it is possible to first find an approximation of the best attacks and then instantiate precisely the values of the parameters. Also, if MILP, SAT and CP tools quickly give an answer, it is tempting to build ad-hoc tools that can more efficiently take into account the weaknesses discovered by these tools.
Finally, there are only a few tools for analyzing the security of ARX ciphers based on additions, rotations and xor operations. These functions are hard to analyze with the current cryptanalytic techniques, and no attack has really endangered the full Chacha stream cipher proposed by Dan Bernstein or the block cipher Speck proposed by the NSA. They can be implemented very efficiently in x86 processors and currently Chacha is in the most used ciphersuites on TLS, making them prominent targets for cryptanalysis.
New Designs.
Our goal is to analyze the security of the new symmetric-key designs by developing new cryptanalytic techniques. The LowMC block cipher is one of the first symmetric primitives designed for taking into account the efficiency constraints of public-key cryptosystems. It has been built as a FHE-friendly cipher, by minimizing the number of multiplicative gates which are the main efficiency bottleneck for this application. Several attacks have been proposed on LowMC and LowMC v2. LowMC v3 was used in Picnic, a Zero-Knowledge-based post-quantum signature scheme proposed at the NIST competition, which wasn't standardized.
The Keccak hash function has been standardized in 2015 as SHA-3. Keccak brought new interest in a new design called Sponge function and permutation-based primitives. Some round-reduced versions of SHA-3 have been used in many constructions from Pseudo-Random Generator in SHAKE, to the Pseudo-Random Function Farfalle 39, the authenticated encryption scheme Keyak, or the hash function KangarooTwelve proposed as an RFC. Only a few attacks have been proposed against SHA-3 and new cryptanalysis tools need to be designed.
Quantum Cryptanalysis.
Since 2016, many works have been done in the cryptanalysis of symmetric primitives using quantum algorithms. While symmetric cryptosystems are generally believed to hold well against adversaries equipped with a quantum computer, these works have substantiated these claims with dedicated security analyses, such as the best attacks against reduced-round versions of the standard AES 42.
Grover's search algorithm, which can provide a quadratic speedup on exhaustive key search (from
In team CAPSULE, our research in quantum cryptanalysis is three-fold.
First, we develop new quantum algorithms for cryptanalytic problems, which we aim to apply in symmetric cryptography, but may also have applications in public-key cryptography. An example of such a double-edged sword is our recent work on quantum walks 41.
Second, we analyze existing classical cryptanalysis techniques and study how to translate them into quantum cryptanalysis techniques. Intuitively, a primitive that is classically vulnerable should be quantumly broken as well, but this is not always the case, as classical attack strategies are not always exploitable in the quantum setting. Our research in this area focuses on the strategies which can exhibit the largest quantum speedups, quadratic (like Grover's search) or even above by using advanced frameworks.
Finally, after identifying new classes of quantum attacks, we aim at integrating these attacks into automated tools. Indeed, the task of finding and optimizing quantum attacks can be even more challenging that classical ones, since they rely often on different strategies, sometimes counterintuitive. Furthermore, since the resulting procedures are quantum algorithms, the analysis of their time and memory complexities comes with specific technicalities. Our goal is to automatize this step as well in a way that may benefit cryptanalysts interested in this topic but unfamiliar with quantum algorithms.
3.3 Elliptic curves for public-key cryptography
With Aurore Guillevic joining the team in 2024, the research themes extended to elliptic curve cryptography. In public-key cryptography, elliptic curves over finite fields are a mathematical algebraic structure which provides the best trade-off between speed and key-sizes. The group of points on the curve efficiently replaces the multiplicative subgroup of prime finite fields as an implementation choice for discrete-logarithm based protocols. More recently with the rise of proof systems, elliptic curves with dedicated properties are designed. In particular, pairing-friendly elliptic curves are equipped with a bilinear pairing (like a scalar product) that allows to multiply once secret scalars “in the exponents” without revealing them. It led to Succinct Non-interactive ARguments of Knowledge (SNARK), a mechanism that blindly checks the validity of a quadratic equation “in the exponents”. The cornerstone work by Groth in 2016 obtained a SNARK of the smallest cost in terms of pairing computation and allowed the development of many variants tailored for various proof systems. The work in the team includes designing new dedicated and secure elliptic curves (finding parameters of cryptographic size), studying the security of existing curves, and developing software modules implementing fast pairings on new elliptic curves.
3.4 Security of cryptographic implementation and Real-World Cryptography
In this research axis, our aim is to study the security of implementations against various side channels such as fault attacks, power analysis and electromagnetic emanations, as well as timing attacks on various cryptographic schemes deployed in real-world systems. We are also interested in providing security proofs for real-world systems or improving their security.
Hardware and embedded implementations.
Side Channel Attacks (SCA) rely on statistical tools to extract the secret information from leakage traces. Then, algorithmic techniques usually based on previous cryptanalytic results are used to efficiently recover secret data. Indeed, the known black-box attacks are extended by exploiting the leakage information, that gives more information on the internal secret variables, a.k.a. the grey-box model. The SCA information can be for instance the Hamming weight of a limited number of variables. Recently, the white-box model has been proposed, where the adversary can stop the execution of a process and has access to all variables.
Side-channel attacks have been successfully applied to break many embedded implementations these last 20 years. After the information theoretic approach of Ishai, Sahai and Wagner 60 to prove the security of implementations, secure theoretical foundations have been laid by Prouff and Rivain and later Duc et al. in 72, 55. Soon after, some tools have been developed such as 31, 32, 30 to protect software and hardware implementations with masking techniques. Nowadays, we have sound masking schemes. Some of them already have been introduced into lattice-based implementations 33, where generally securing randomness presents an interesting challenge. We aim at extending the results of 33, 34, 68, 57 to other post-quantum alternatives like code-based, multivariate, or hash-based schemes and to provide secure implementations.
More recently, other tools coming from statistical learning (such as deep learning) have been proposed to break embedded implementations. They open the door to powerful techniques and more efficient attacks. Template attacks model the leakage distribution with a Gaussian distribution, approximating the actual distribution by considering its mean and its standard deviation. More standard attacks, a.k.a. Differential Power Analysis (DPA), only consider the mean. However, higher moments can be useful to consider. Deep learning techniques are useful to efficiently extract complex relations between variables even in the presence of noise. Taking into account these more powerful deep learning or white-box attacks as well as developing countermeasures is a hot, trendy topic in SCA. In the former, deep learning allow to find correlations between many points of interest of one curve, a.k.a. horizontal attacks. In the latter, white-box cryptography provides the adversary with the same kind of information, since they can stop the execution of the program and get noiseless information on all of its variables. Taking into account such powerful attackers is one main challenge for side-channel attacks.
Finally, we are interested to work on the new micro-architectural attacks HertzBleed and others. These attacks show that side-channel attacks are also a threat to software implementations. Porting to software some of the many techniques used to secure embedded systems is thus a major topic.
Software implementations.
Constant-time implementation is a programming principle that aims at providing code where the running time and memory accesses are independent of the secret values. Timing leakage can be used to mount attacks on computers and smartphones. There exist many tools in the literature that help developers to avoid these leakage, but insecure implementations are still aplenty. For instance, we recently broke the WPA-3 implementation used in FreeRadius and iwd (iNet Wireless Daemon) 46, and also found other weaknesses.
We want to discover new attacks in open-source libraries and to help developers in order to verify the constant-time property of their codes. For example, some tools are tailored to small pieces of cryptographic codes and do not scale well with more complex codes that rely on many libraries. Our goal is to provide verification tools for analyzing the constant-time property of large source codes. We are also interested in studying the security of DRM systems used in widely deployed systems. We do not have permanent researchers on reverse-engineering, but we work with postdoc students such as Alexandre Gonzalvez, as well as Mohamed Sabt from the Spicy team on this topic. Besides, we co-supervise 3 theses on the security of software implementations.
Security Proofs of Protocols and Real-World Systems.
We are interested in studying the security of cryptographic protocols deployed in the real-world such as WhatsApp, middlebox, Content-Delivery Network (CDN), TLS, and 5G networks. Recently, we have also considered the security of searchable symmetric encryption, where the goal is to outsource the storage of a database to an untrusted server, while maintaining search capabilities. This last area is a nice application of secure computations and the PhD thesis of R. Bost (P.A. Fouque's PhD student) in this domain received the GDR Security price of the best PhD in 2018. We also work with Cristina Onete, an assistant professor at Limoges on this topic. Currently, we are interested to propose hybridization techniques between pre- and post-quantum cryptography for various protocols such as Signal, IPSEC, ... in the PEPR post-quantum cryptography.
4 Application domains
4.1 Designing, Analyzing and Choosing Cryptographic Standards
The research community is strongly involved in the development and evolution of cryptographic standards. Many standards are developed through open competitions (e.g. AES, SHA-3) where multiple teams propose new designs, and a joint cryptanalysis effort allows to select the most suitable proposals. The analysis of established standards is also an important work, in order to depreciate weak algorithms before they can be exploited. Several members of the team have been involved in this type of effort and we plan to continue this work to ensure that secure algorithms are widely available. We believe that good cryptographic standards have a large socio-economic impact; thus, we are active in proposing schemes to future competitions, and in analyzing schemes proposed to current or future competitions, as well as widely-used algorithms and standards. At the moment, we are involved in the two standardization efforts run by NIST for post-quantum cryptography and lightweight cryptography, and other real-world protocols.
NIST post-quantum competition.
The NIST post-quantum competition aims at standardizing quantum-safe public-key primitives. The goal is to propose a quantum-safe alternative for the schemes based on number theory which are threatened by the advent of quantum computers. It is expected to have a huge and long-term impact on all public-key cryptography. It received 69 proposals in November 2017. The Falcon signature scheme, co-designed by some members of the Capsule team, has been selected by NIST in July 2022. We have also submitted Solmae to the Korean Post-Quantum Competition, which is a variant of Falcon that is easier to implement hence to protect from SCA. Finally, we have also proposed BAT 56, an encryption scheme that follows the design rationale of Falcon. We plan to submit this scheme to the IETF as it enjoys interesting properties in terms of bandwidth, that are not displayed by NIST's selected key encapsulation scheme, Kyber.
In June 2023, we have submitted the PROV and VOX signature schemes to NIST's new call for digital signatures. These two schemes are based on multivariate cryptography problems, and are variants of the unbalanced Oil-and-Vinegar signature schemes, proposed in 1997 by Patarin. PROV has a security proof, while VOX is a stronger version of UOV that avoids known weaknesses (namely, UOV has a large set of isotropic vectors common to all quadratic forms of the public key).
NIST competition on lightweight symmetric encryption.
The NIST lightweight cryptography standardization process is an initiative to develop and standardize new authenticated encryption algorithms suitable for constrained devices. There is a real need for new standards in lightweight cryptography, and the selected algorithms are expected to be widely deployed within the Internet of Things, as well as on more constrained devices such as contactless smart cards, or medical implants. The NIST received 56 submissions in February 2019. Team Capsule has studied the security of some of these schemes.
Monitoring Current Standards.
While we are very involved in the design phase of new cryptographic standards, we also monitor the algorithms that are already standardized. We look at some implementations of WPA3 and we discovered a micro-architectural attack 47. We also studied the privacy of the EME standard (Encrypted Media Extensions) for Digital Rights Managments in browsers in 70.
5 Social and environmental responsibility
5.1 Impact of research results
After the discovery of some privacy issues in EME, our findings have been timely communicated to all concerned parties following responsible disclosure processes. Mozilla Firefox was quite responsive, and we got rewarded via their bug bounty program. The Mozilla EME team investigated our findings and released a patch to address the identified privacy issues and acknowledged us in the Mozilla Hall of Fame. Regarding Client ID being in clear in renewal requests, we first contacted the EME Chrome team that reviewed our disclosure report and showed concerns about its privacy consequence, namely the EME user-agent. They confirmed our intuition that the problem is caused by the Widevine CDM. Therefore, we filed a Widevine bug report about missing Privacy Mode on VMP systems, and are still in communication with them.
Concerning our micro-architectural attack on WPA3, we disclosed our findings to the hostap security team in December 2021. We contacted other affected projects (iwd/ell from Intel and FreeRadius) in January 2022. hostap promptly reacted, asking us to review a patch, which later was committed, and a security advisory has been published. Intel decided to fix their cryptographic library, ell, and also asked us to review their patch. Both iwd and hostap released a new stable version patching the vulnerability soon after our disclosure. FreeRadius has committed our patch to their project. We contacted OpenSSL and WolfSSL in May 2022 to disclose our second vulnerability. Both acknowledged our analysis, but argued that it is the developers' responsibility to avoid calling their leaky functions with secret-dependent values.
6 Highlights of the year
Our work on reducing the number of qubits in quantum algorithms for factoring and Discrete Logarithm 1 was accepted to the QIP 2025 (Quantum information processing) conference. It will be presented as a short plenary talk (the conference has only 13 plenary talks out of 138 in total).
7 New software, platforms, open data
7.1 New software
7.1.1 TNFS-alpha
-
Name:
alpha for the Tower Number Field Sieve algorithm
-
Keyword:
Cryptography
-
Functional Description:
This library implements a simulation tool for the tower number field sieve algorithm computing discrete logarithms in extension fields of small degree (tested up to 54). The library contains an implementation of the exact computation of alpha, the bias between the expected smoothness of an integer and the expected smoothness of a norm of an algebraic integer in a number field made of two extensions. The algorithm is a generalization to extensions of the exact implementation of alpha in the software CADO-NFS. The software contains an implementation of the E-function of B. A. Murphy (Murphy's E) which estimates the quality of the polynomial selection step in TNFS through a simulation of the yield of the relation collection in the TNFS algorithm. Finally, it contains a database of pairing-friendly curve seeds with the estimated level of security w.r.t. a discrete logarithm computation in the corresponding finite field.
-
News of the Year:
In 2024, the new pairing-friendly elliptic curves obtained in the work by Gasnier and Guillevic were included in the library as a few family of curves like BN, BLS or KSS. The library was extended to consider the curves selected in Aranha, Fotiadis and Guillevic at the 192-bit security level.
- URL:
- Publications:
-
Contact:
Aurore Guillevic
-
Participant:
Aurore Guillevic
7.1.2 ALPINAC
-
Name:
ALgorithmic Process for Identification of Non-targeted Atmospheric Compounds
-
Keyword:
Chemistry
-
Functional Description:
ALPINAC identifies up to 95% of the measured signal obtained from an Electron-Impact Time-of-Flight High Resolution Mass Spectrometer (EI ToF HRMS) on air sampling, without a-priori knowledge on the encountered chemical compounds, without database search. The software was successfully tested on mass spectrum ranging from 23 m/z to 330 m/z.
- URL:
- Publication:
-
Contact:
Aurore Guillevic
-
Partner:
EMPA
8 New results
8.1 Symmetric Cryptanalysis of Constructions
Key Committing Attacks against AES-based AEAD Schemes
Participants: Patrick Derbez, Pierre-Alain Fouque, André Schrottenloher.
The security of authenticated encryption with associated data (AEAD) cryptosystems in the context of key commitment has been the topic of several recent works 67. In this context, in addition to ensuring authenticity and confidentiality of the data, the cryptosystem should ensure that an adversary cannot produce two sets of key and messages that would be encrypted into the same ciphertext. This property appears to be particularly useful for real-world scenarios such as encrypted messaging. In this work, we show that the schemes AEGIS and Rocca-S are not key-committing.
Part of the results obtained in this work originated from our security analysis of Rocca-S, performed during 2023 under a contract with KDDI (Japan)
Improving Generic Attacks Using Exceptional Functions
Participants: André Schrottenloher.
The paper 11 with Xavier Bonnetain (Inria team CARAMBA), Rachelle Heim Boissier and Gaëtan Leurent (Inria team COSMIQ) proposes new attacks on symmetric constructions using the statistical properties of random functions. The starting point is a technique of Gilbert et al. 59, who gave a new forgery attack on the Duplex authenticated encryption mode by finding exceptional random functions. These exceptional functions are those for which their graph admits a large component with an exceptionally small graph.
This work first improves the attack of Gilbert et al. from an asymptotic complexity
8.2 Symmetric Cryptanalysis of Primitives and Tools
A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool
Participants: Patrick Derbez.
The paper 12 presents a new algorithm dedicated to the key recovery of differential attacks. This algorithm, under some assumptions on the ciphers, allows to determine the optimal order in which the key bits involved in the key recovery should be guessed. We also propose an efficient implementation of this algorithm, the KiRiDi tool, and improved several differential attacks. We have made this tool available on the Inria Gitlab platform.
Alternative Key Schedules for the AES
Participants: Patrick Derbez.
In the paper 13 we study alternative key schedules for the different versions of the AES. We focused on permutations and differential cryptanalysis. The main result of this paper is the new framework we introduce to search for the best permutation to be used as a key schedule. Our approach relies on two MILP models, one to generate permutations and a second to search for differential characteristics activating less than
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Participants: Patrick Derbez.
In the paper 16, we show the similarities between two cryptanalysis techniques: boomerang attacks and differential-linear attacks. We then use this to propose new models to search the best differential-linear distinguishers on a large number of ciphers. As a result we found many new distinguishers, improving the best known results regarding this cryptanalysis technique.
Equivalence of Generalised Feistel Networks
Participants: Patrick Derbez, Marie Euler.
Generalized Feistel Networks (GFN) are defined by their internal branch-permutations. To find the best GFN, we thus have to exhaust the space of permutations which grows exponentially with the number of branches. To reduce the number of permutations to study it is important to rely on equivalence classes. Therefore in the work 6 we propose a new equivalence class regarding the diffusion round, which is the number of rounds required to achieve full diffusion. As a result, the search space is much smaller than with previous approaches and we were able to find better permutations for the cipher WARP.
Cryptanalysis of Full-Round BipBip
Participants: Patrick Derbez.
Cryptographic Capability Computing (C3) is the first stateless memory safety mechanism that eliminates the need for additional metadata storage. C3 relies on an ultra-low-latency cipher to prevent load delays, requiring a block size as small as 24 bits. This is the context in which the block cipher BipBip was designed. In the paper 9 we mount an advanced meet-in-the-middle attack against the full cipher, showing that the security offered by BipBip is lower than expected by its designers.
8.3 Quantum Algorithms and Cryptanalysis
Does quantum lattice sieving require quantum RAM?
Participants: Yixin Shen.
This paper studies the requirement for quantum random access memory (QRAM) in quantum lattice sieving, a fundamental algorithm for lattice-based cryptanalysis.
First, we obtain a lower bound on the cost of quantum lattice sieving with a bounded size QRAM. We do so in a new query model encompassing a wide range of lattice sieving algorithms similar to those in the classical sieving lower bound by Kirshanova and Laarhoven [CRYPTO 21]. This implies that, under reasonable assumptions, quantum speedups in lattice sieving require the use of QRAM. In particular, no quantum speedup is possible without QRAM.
Second, we investigate the trade-off between the size of QRAM and the quantum speedup. We obtain a new interpolation between classical and quantum lattice sieving. Moreover, we show that further improvements require a novel way to use the QRAM by proving the optimality of some subroutines. An important caveat is that this trade-off requires a strong assumption on the efficient replacement of QRAM data, indicating that even speedups with a small QRAM are already challenging.
Finally, we provide a circuit for quantum lattice sieving without using QRAM. Our circuit has a better depth complexity than the best classical algorithms but requires an exponential amount of qubits. To the best of our knowledge, this is the first quantum speedup for lattice sieving without QRAM in the standard quantum circuit model. We explain why this circuit does not contradict our lower bound, which considers the query complexity.
Single-Query Quantum Hidden Shift Attacks
Participants: André Schrottenloher.
This paper with Xavier Bonnetain (Inria team CARAMBA) introduces a new family of quantum attacks in the superposition query model (also named Q2 in the literature), which perform forgery or key-recovery for some authenticated encryption (AE) schemes.
Traditionally Q2 attacks use a period-finding algorithm such as Simon's algorithm to recover some secret information. The exponential acceleration offered by such algorithms, they allow to break some classically secure primitives. However, such breaks require superposition query access, which is a rather theoretical model (in particular, the schemes attacked in our paper remain secure against standard quantum adversaries).
In this paper, we use a different period-finding algorithm than Simon's, allowing to succeed in some cases where only one such superposition query is allowed, usually as the result of using a nonce in the mode. This leads to attacks against Rocca, Rocca-S, Tiaoxin-346 and AEGIS-128L.
Quantum Procedures for Nested Search Problems: with Applications in Cryptanalysis
Participants: André Schrottenloher.
In this paper we study the family of nested search algorithms, which often arise in the context of cryptanalysis. These algorithms perform an exhaustive search in several layers, where each layer introduces a new degree of freedom and / or constraints.
While it is well known that Grover's algorithm and Amplitude Amplification speed up generically these nested searches, the analysis of such algorithm has often been performed in a case-by-case manner. To remedy this issue, and allow for an easier estimation of the overall complexities, we introduce a generic framework and tools to transform a classical nested search into a quantum procedure. We give generic complexity formulas and reach further improvements using numerical optimization. We demonstrate our framework by giving a tighter analysis of quantum attacks on reduced-round versions of the block cipher AES.
Reducing the Number of Qubits in Quantum Information Set Decoding.
Participants: Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher.
This paper optimizes the number of qubits used in the quantum variant of Prange's Information Set Decoding (ISD) algorithm, which was originally proposed by Bernstein 38. This algorithm is especially important for post-quantum cryptography, as it largely determines the level of quantum security that one can expect from code-based cryptosystems.
This algorithm has a very simple structure: it performs a Grover search which, at each iteration, inverts a matrix. Our contribution focuses on the matrix inversion circuit. Here, we show that this inversion can be performed in an implicit way, reducing the number of qubits from quadratic to linear in the code length (i.e., the security parameter of the cryptosystem). We give several trade-offs and perform a precise estimation of the resources required by this circuit, which is supported by a full implementation. We have made this implementation available on the Inria Gitlab platform. As an example, while the computational complexity remains asymptotically unchanged, our new trade-offs reduce the number of qubits from millions to tens of thousands in attacking the Classic McEliece scheme.
Reducing the Number of Qubits in Quantum Factoring.
Participants: Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher.
This paper obtains a significant reduction in the number of qubits in Shor's factoring algorithm. The main idea of the paper is to realize explicitly the output compression technique of May and Schlieper 66. Indeed, Shor's algorithm needs to find the period of a modular exponentiation function: the space then depends on the size of the input (
In this work, we designed a new classical reversible circuit for the operation
In order to perform precise resource estimates, we have fully implemented the circuits and made these implementations available on the Inria Gitlab platform. The full version of the paper is currently a preprint and it will be presented as a plenary talk in the upcoming QIP 2025 conference 1.
8.4 Public-key cryptography
8.4.1 Lattices
Smoothing Parameter and Shortest Vector Problem on Random Lattices
Participants: Yixin Shen.
Lattice problems have many applications in various domains of computer science.
There is currently a gap in the understanding of these problems with respect to their worst-case complexity and their average-case behaviour.
For instance, the Shortest Vector problem (SVP) on an n-dimensional lattice has worst-case complexity
In this paper 27, we try to bridge the gap between worst-case and heuristic algorithms.
Using the formalism of random real lattices developed by Siegel 75,
we show a tighter upper bound on an important lattice parameter called the smoothing parameter that applies to almost all random lattices.
This allows us to obtain a
Discrete gaussian sampling for BKZ-reduced basis
Participants: Yixin Shen.
Discrete Gaussian sampling on lattices is a fundamental problem in lattice-based cryptography.
In this paper 22, we revisit the Markov chain Monte Carlo (MCMC)-based Metropolis-Hastings-Klein (MHK) algorithm proposed by Wang and Ling
and study its complexity under the Geometric Series Assuption (GSA) when the given basis is BKZ-reduced.
We give experimental evidence that the GSA is accurate in this context, and we give a very simple approximate formula
for the complexity of the sampler that is accurate over a large range of parameters and easily computable.
We apply our results to the dual attack on LWE of 71 and significantly improve the complexity estimates of the attack.
Finally, we provide some results of independent interest on the Gaussian mass of a random
Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices
Participants: Guilhem Niot.
We propose a new framework based on random submersions — that is projection over a random subspace blinded by a small Gaussian noise — for constructing verifiable short secret sharing and showcase it to construct efficient threshold lattice-based signatures in the hash-and-sign paradigm, when based on noise flooding. This is, to our knowledge, the first hash-and-sign lattice-based threshold signature. Our threshold signature enjoys the very desirable property of robustness, including at key generation. In practice, we are able to construct a robust hash-and-sign threshold signature for threshold and provide a typical parameter set for threshold T = 16 and signature size 13kB. Our constructions are provably secure under standard MLWE assumptions in the ROM and only require basic primitives as building blocks. In particular, we do not rely on FHE-type schemes.
Computing e-th roots in number fields
Participants: Pierre-Alain Fouque.
We describe several algorithms for computing e-th roots of elements in a number field K, where e is an odd prime-power integer. In particular, we generalize Couveignes’ and Thomé’s algorithms originally designed to compute square-roots in the context of the General Number Field Sieve algorithm for integer factorization. Our algorithms cover most cases of e and K and their complexity is better than general root finding algorithms. Our (publicly available) Python implementation compares extremely well in performance to the implementation of these generic algorithms in well-known computer algebra softwares, allowing us to obtain reasonable timings even for large degree number fields and huge exponents e, which correspond to previously intractable cases using these softwares.
One important application of our algorithms consists in computing S-unit groups used by the Twisted-PHS algorithm for the cryptanalysis of the Ideal-SVP problem over cyclotomic fields in post-quantum cryptography. Indeed, in order to assess concretely the efficiency of these so-called S-unit attacks, it is necessary to compute S-unit groups in meaningfully large dimensions, say over a few hundreds. As proposed by Bernard et al. in Asiacrypt 2022 36, in cyclotomic fields this can be achieved by first considering S-units coming from the maximal totally real subfield and Stickelberger generators; then, a saturation step is required, which comes down to computing e-th roots where e is a — potentially huge — prime-power factor of the relative class number, our largest example being a 93-bits prime e. This paper tackles all cases, except for a few small e‘s, allowing explicitly computing full S-unit groups even in dimension 200. To our knowledge, this had never been achieved before for general (non-smooth) conductors, and clears the path towards further cryptanalytic investigations.
Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets
Participants: Corentin Jeudy.
Preimage sampling is a fundamental tool in lattice-based cryptography, and its performance directly impacts that of the cryptographic mechanisms relying on it. In 2012, Micciancio and Peikert proposed a new way of generating trapdoors (and an associated preimage sampling procedure) with very interesting features. Unfortunately, in some applications such as digital signatures, the performance may not be as competitive as other approaches like Fiat-Shamir with Aborts. In an effort to improve preimage sampling for Micciancio-Peikert (MP) trapdoors, Lyubashevsky and Wichs (LW) introduced a new sampler which leverages rejection sampling but suffers from strong parameter requirements that hampered performance. As a consequence it seemed to be restricted to theoretical applications and has not been, to our knowledge, considered for real-world applications.
Our first contribution is to revisit the LW sampler by proposing an improved analysis which yields much more compact parameters. This leads to gains on the preimage size of about 60% over the LW sampler, and up to 25% compared to the original MP sampling technique. It thus sheds a new light on the LW sampler, opening promising perspectives for the efficiency of advanced lattice-based constructions relying on such mechanisms. To provide further improvements, we show that it perfectly combines with the approximate trapdoors approach by Chen, Genise and Mukherjee, but with a smaller preimage error.
Building upon those results, we introduce a hash-and-sign signature scheme called Phoenix. The scheme is based on the M-LWE and M-SIS assumptions and features attractive public key and signature sizes which are even smaller than those of the most recent gadget-based construction Eagle of Yu, Jia and Wang (Crypto’23). Moreover, Phoenix is designed to support a broad variety of distributions (uniform, spherical Gaussian, etc.) which can facilitate implementation, in particular in constrained environments.
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
Participants: Georgii Pliatsok, Alexandre Wallet.
The Lattice Isomorphism Problem (LIP) is a classical topic in the algorithmic
geometry of numbers. It consists informally in computing an isometry between two
lattices
Our work proposes a first step in that direction. We break a different, but close, variant of the problem when the lattices correspond to rank 2 modules over a totally real number field — such fields appear naturally as a large subfield in any power-of-two cyclotomic field. More precisely, we provide a polynomial time heuristic algorithm to solve the problem, and an implementation mixing sagemath and pari-gp to support the validity of our attack. This does not affect Hawk, but it provides insights on the hardness of its corresponding problem.
8.4.2 Elliptic curves
Participants: Aurore Guillevic.
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level
The paper 2 is an overview of pairing-friendly elliptic curves at the (classical) 192-bit security level, that can be of interest for hybridation. It comes with a security analysis with respect to a discrete logarithm computation with the Tower Number Field Sieve algorithm (TNFS) in the target finite field of the elliptic curves. For practical considerations, the curves are implemented and benchmarked within the open-source library RELIC toolkit.
Embedded Curves and Embedded Families for SNARK-Friendly Curves
With Simon Masson, the paper 26 generalizes the Bandersnatch curve construction and analyses the scarcity of such curves. These curves are used in Succinct Non-interactive ARguments of Knowledge (SNARK).
An algebraic point of view on the generation of pairing-friendly curves
The paper 25 with Jean Gasnier from the CANARI Team
(Bordeaux) is the achievement of Jean Gasnier's Masters internship in 2022
co-advised in Bordeaux by Jean-Marc Couveignes and remotely from Denmark by
Aurore Guillevic.
It aims to generalize The Kachisa–Schaefer–Scott technique to find new
parameterized families of pairing-friendly curves. The method allowed to obtain
new curves for interesting embedding degrees, such as
8.5 Side-Channel Attacks
Masking the GLP Lattice-Based Signature Scheme at Any Order
Participants: Pierre-Alain Fouque.
This paper is the journal version of a Eurocrypt 2018 paper. Recently, numerous physical attacks have been demonstrated against lattice-based schemes, often exploiting their unique properties such as the reliance on Gaussian distributions, rejection sampling and FFT-based polynomial multiplication. As the call for concrete implementations and deployment of postquantum cryptography becomes more pressing, protecting against those attacks is an important problem. However, few countermeasures have been proposed so far. In particular, masking has been applied to the decryption procedure of some lattice-based encryption schemes, but the much more difficult case of signatures (which are highly nonlinear and typically involve randomness) has not been considered until now. In this paper, we describe the first masked implementation of a lattice-based signature scheme. Since masking Gaussian sampling and other procedures involving contrived probability distributions would be prohibitively inefficient, we focus on the GLP scheme of Güneysu, Lyubashevsky and Pöppelmann (CHES 2012). We show how to provably mask it in the Ishai–Sahai–Wagner model (CRYPTO 2003) at any order in a relatively efficient manner, using extensions of the techniques of Coron et al. for converting between arithmetic and Boolean masking. Our proof relies on a mild generalization of probing security that supports the notion of public outputs. We also provide a proof-of-concept implementation to assess the efficiency of the proposed countermeasure.
8.6 Real-World Cryptography
They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks
Participants: Daniel de Almeida Braga, Pierre-Alain Fouque.
This paper is a survey we set up to ask 44 developers of 27 widespread cryptographic libraries about their awareness and practices regarding side-channel threats. Side channel attacks have been known for decades, but still plague current cryptographic implementations, and not a year passes without new published attacks, targeting widespread implementation. Most academic work toward solving these issues focuses on suggesting new designs that are not affected by these attacks, or providing analysis tools to detect them. The residual side channel vulnerabilities reflect a gap between academic research and real-world engineering. The goal of this survey is to understand the source of that gap, and identify ways to reduce it, by asking feedback to the very people who will handle the practical deployment of solutions. The main findings highlight a leaky pipeline in the process of treating the cause of side-channels: all candidates were aware of the side-channel threat, but only part of them included it in the threat model, to prioritize other issues. Some of the main aspects hindering the use of academic tools include their usability, and lack of consideration to real-world constraints (CI/CD, delta mode, ...). Based on these observations, we made a list of recommendations addressed to tool developers and library developers.
“These results must be false”: A usability evaluation of constant-time analysis tools
Participants: Daniel de Almeida Braga, Pierre-Alain Fouque.
The paper 21 is a follow-up study on our previous work 17. In the first work, we higlighted usability as one of the main hinderance to the constant-time anlysis tool's deployment. The goal of this paper is to study the elements that make this specific class of tool "usable". As the previous paper focused on a survey, asking theoretical questions, we designed this study to gain knowledge on practical elements related to tools usage. To do so, we conducted a two-part usability study on 6 tools across various tasks that emulate the learning of each tool on textbook exercises, and on real-world contexts. We found that all tools face similar usability issues at different levels, hindering their use in all cases. Based on these observations, we addressed a series of recommendations, as a checklist for future tool developers, and complemented the documentation and bootstrapping of the tools involved in our study, to ease future use.
9 Bilateral contracts and grants with industry
9.1 Bilateral Grants with Industry
-
Resque: (T0: 09/2022 –> 08/2026)
BPi France project.
Lead by Thales.
Participants: Pierre-Alain Fouque, Guilhem Niot, Daniel De Almeida Braga, Damien Marion.
Participating entities on the industrial side: Thales SIX and DIS, TheGreenBow, CryptoExperts, CryptoNext. Participating entities on the public side: Inria, ANSSI.
In this project, Inria is represented by two teams: Capsule (Inria Rennes), with Pierre-Alain Fouque as the coordinator; and Cascade (Inria Paris), with Céline Chevalier as collaborator.
Resque project, "Résilience Quantique" aims at combining two use-cases allowing the construction of two software and hardware components: i) VPN [virtual private network] hybrid and agile and a HSM [hardware security module] robust and efficient, providing the security of exchanged information. The cryptographic agility will allow to perform regular and continuous updates of the post-quantum algorithms.
-
Hyperform: (T0: 09/2022 –> 08/2026)
Participants: Alexandre Wallet, Heorhii Pliatsok.
BPi France project.
Lead by Idemia.
Participating entities on the industrial side: Idemia, Atempo, PrimX, CryptoNext, Sinacktiv. Participating entities on the public side: Inria, ANSSI, CEA.
In this project, Inria is represented by two teams: Grace (Inria Saclay), with Ben Smith as the coordinator; and Capsule (Inria Rennes), with Alexandre Wallet as collaborator.
Hyperform aims at being an international leading force in the development of quantum-resilient secure elements for embedded systems, as well as a primary actor in the design of hybrid solutions at scale, that is, mixing pre- and post-quantum cryptography in a provably secure way, formally verified, into industrial products. One essential goal of the project is to produce a demonstrator: a secure element with dedicated hardware/software embedding post-quantum cryptographic algorithms, providing a level of resilience against side-channel attackers while maintaing a high level of performance on par with the demands of real-world situations.
-
Ascon-CAT: (T0: 10/2024 –> 09/2027)
Participants: Andre Schrottenloher, Aurel Pichollet–Mugnier.
AID “RAPID” project.
Coordinated by Alice&Bob.
Industrial partners: Alice&Bob, Thales SIX. Academic partners: Inria.
The goal of this project is to perform an integrated quantum security analysis of the lightweight symmetric primitive ASCON, recently selected as a NIST standard. The project will combine the development and analysis of new quantum algorithms, as well as a precise estimation of the resources needed to run them, and a study of implementations in the “cat qubits” platform which is developed by Alice&Bob.
10 Partnerships and cooperations
10.1 European initiatives
10.1.1 Horizon Europe
- ERC SoBaSyC (2024 –> 2029)
Participants: Patrick Derbez (Expert Contributor, involved at 20%).
Symmetric cryptography, essential for enabling secure communications, has benefited from an explosion of new results in the last two decades, in big part due to several standardization efforts: many public competitions have been launched since 1997, where the community proposes cryptographic constructions and simultaneously evaluates their security and performance. The security of symmetric cryptography is based on cryptanalysis: we only gain confidence in a symmetric cryptographic function through extensive and continuous scrutiny. However, the current context has not allowed the community to digest all the new findings, as can be seen from several recurrent issues. The two main ones are: 1) primitives proposed at top-tier venues often get broken by slight modifications of already known techniques; 2) published cryptanalysis at top conferences sometimes include mistakes, are not optimal, or are often re-invented and re-named. The main challenge of SoBaSyC is to establish solid bases for symmetric cryptography.
Using cryptanalysis as the starting point, the aim is to unify the knowledge obtained through the years on the different families of attacks, to transform it with an algorithmic approach and to endow it with optimizations. The final result will be a toolbox congregating all our newly proposed optimized algorithms, that will provide the best known attacks on a given construction, through an easy application. Next, the plan is to derive from this algorithmic approach some theoretical bounds, as well as some properties that will be included in the security proofs of symmetric constructions, providing more meaningful and realistic security arguments. This would allow, for the first time, to ensure that any newly proposed primitive or construction is already resistant to all known attacks, and will considerably increase the confidence on these functions. It will also save a considerable amount of time and allow the field to advance, at last, on solid ground.
The PI of this project is María Naya-Plasencia from the Inria team COSMIQ.
10.2 National initiatives
-
The PQTLS (01/2022 –> 12/27)
Participants: Alexandre Wallet, Pierre-Alain Fouque, André Schrottenloher, Yixin Shen, Clemence Chevignard.
Post-quantum padlock for web browser
PEPR Quantique
Partners: GREYC (Caen), ENS Lyon, Inria GRACE, Inria Cosmiq, Inria Prosecco, Inria Caramba, Inria Lfant, Inria Capsule, UVSQ, Cryptis, ARCAD, SESAM, CEA LETI, University of Rouen, Rennes, Bordeaux.
The famous "padlock" appearing in browsers when one visits websites whose address is preceded by "https" relies on cryptographic primitives that would not withstand a quantum computer. This integrated project aims to develop in 5 years post-quantum primitives in a prototype of "post-quantum lock" that will be implemented in an open source browser. The evolution of cryptographic standards has already started, the choice of new primitives will be made quickly, and the transition will be made in the next few years. The objective is to play a driving role in this evolution and to make sure that the French actors of post-quantum cryptography, already strongly involved, are able to influence the cryptographic standards of the decades to come.
-
Cryptanalyse (12/2023 –> 12/28)
Participants: Patrick Derbez, Aurore Guillevic, André Schrottenloher.
PEPR Cybersécurité
Partners: Inria GRACE, Inria Cosmiq, Almasty, Inria Caramba, Inria Lfant, Inria Capsule, Crypto, Eco, Canari, UGA.
The Cryptanalyse project focuses on the study and standardization of cryptographic primitives. Modern cryptography has become an indispensable tool for securing personal, commercial and institutional communications. This project will provide an estimate of the difficulties involved in solving the underlying problems, and deduce the level of security conferred by the use of these primitives. The aim is to evaluate the security of cryptographic algorithms.
-
ANR AMIRAL (01/2022 –> 12/2024)
Digital signatures from lattice-based assumptions
ANR ASTRID, Appel 2021
Partners: GREYC (Caen), Inria Lyon
The focus of AMIRAL is the improvement of lattice-based digital signature schemes at large. More precisely, three research axes are considered. First, we will design concrete improvements and novel tweaks for the optimization of NIST's selected candidates (Falcon and Dillithium) or to extend their use cases to a larger surface of scenarios. Second is the conception and study of signatures with advanced properties (such as: aggregated, threshold, ...) in order to substantially improve the state-of-the-art. Third, the study of the interplay between the improvements in the design of signatures and the efficiency of broader, more complex cryptographic primitives such as attribute-based encryption.
-
CROWD (2023 –> 2027).
Participants: Pierre-Alain Fouque, Andre Schrottenloher, Clemence Chevignard.
Code-based practical cryptography
ANR-DFG
Partners: TU Munich, IRMAR (Rennes), Inria (Rennes)
The aim of this project is the examination of skew metrics and their application in cryptography. These metrics can be considered as a generalization of the so-called rank metric, which has significant applications in coding theory, cryptography, data storage, and network coding. The connection of these metrics lies in the non-commutativity of Euclidean rings, called Ore rings, which extend the classical notation of commutative polynomial rings by 'skewing' (twisting) multiplication. These operations allow the development of metrics and new codes with efficient arithmetic operations. This holds promise for secure and efficient cryptographic implementations. Three avenues are explored: 1) investigates the foundations of algebraic codes in these skew-metrics; 2) design novel decoding algorithms and cryptographic schemes from these codes, and assess their security from a cryptanalytic and side-channel point of view; 3) produce practically efficient implementation of core cryptographic primitive, such as digital signatures, with the goal of entering the next turn of the NIST standardization.
-
ANR IDROMEL (2021 –> 2025)
Participants: Damien Marion.
Improving the Design of secure systems by a Reduction Of Micro-architectural Effects on side-channeL Attacks
Partners: LAAS-CNRS, LIP6, CEA, ARM, IRISA
The IDROMEL project aims to contribute to the design of secure systems against side-channel attacks based on power and electromagnetic observations, for a wide range of computing systems (from IoT devices to mobile phones). IDROMEL will investigate the impact of the processor micro-architecture on power and electromagnetic side-channel attacks as a key concern for the design of secure systems. IDROMEL will produce:
-
ANR OREO (2023 –> 2026)
Participants: Patrick Derbez, Andre Schrottenloher.
MILP for Cryptography
Partners: Univ Rennes, UVSQ, Loria
In symmetric-key cryptography, a popular technique for proving resistance against classical attacks is to model the behaviour of the cipher as a Mixed Integer Linear Programming (MILP) problem and solve it by some MILP solver. This method was applied for the first time by Mouha et al. [MWGP11] and by Wu and Wang [WW11] for finding the minimum number of differentially and linearly active Sboxes and provides in such a way a proof of resistance against these two classical attacks. Since then, the use of MILP not only by designers but also by cryptanalysts has increased, the advantage being that many cryptanalytic problems are relatively easy to translate into linear constraints (typically on bits) and available solvers (e.g. Gurobi, CPLEX) are most often very efficient to solve them.
Currently, MILP solvers are mainly used for differential cryptanalysis, including the search for sophisticated boomerang distinguishers, and for integral cryptanalysis by exhausting division trails on a cipher. But we are reaching a point where describing the problem into a MILP model and solving it naively is not enough. Thus there are many open problems related to MILP applied to cryptography and the aim of this new ANR project is to tackle them. Our main objective is to handle more complex cryptographic problems, relying on both a theoretical work on cryptanalysis techniques and an improvement of MILP models. The project is composed of 4 axis: handling more complex cryptographic problems using MILP solvers, automatically searching for key-recovery attacks, side-channels cryptanalysis and conception of cryptographic primitives.
-
ANR JCJC QATS (2025 –> 2029): Quantum Attacks and new Tools for Symmetric Cryptanalysis
Participants: Andre Schrottenloher.
Nowadays, symmetric cryptanalysis relies heavily on automatic tools. These tools model the search for an attack as an optimization problem, which is solved using off-the-shelf solvers. Regarding quantum security, at the moment, only a few quantum attacks have been integrated into such tools. Besides, significant human effort is still required to determine precisely the complexity of the attack, especially in the quantum setting.
The goal of the ANR JCJC QATS project is to synthesize a single toolchain to output fully specified quantum attack algorithms, and their complexities. Primitives such as block ciphers and hash functions will be analyzed, starting from well-established designs and moving towards more recent ones. This toolchain is expected to simplify the study of quantum attacks, especially the computation of their complexity. We aim to a where the quantum security of a primitive can be estimated with only basic knowledge of symmetric cryptanalysis and quantum algorithms. This would be helpful for designers of new algorithms, and more generally, cryptographers interested in quantum security estimates.
11 Dissemination
Participants: Aurore Guillevic, Damien Marion, Andre Schrottenloher, Yixin Shen, Patrick Derbez, Pierre-Alain Fouque, Daniel De Almeida Braga.
11.1 Promoting scientific activities
11.1.1 Scientific events: organisation
Member of the organizing committees
- Séminaire CRYPTO (IRMAR, IRISA, Rennes): Aurore Guillevic, Damien Marion, André Schrottenloher, Yixin Shen
- Séminaire Joint CRYPTO en ligne (ENSL, CWI, KCL, IRISA): Yixin Shen
11.1.2 Scientific events: selection
Chair of conference program committees
- EUROCRYPT 2025: Pierre-Alain Fouque (Program co-chair)
Member of the conference program committees
- EUROCRYPT 2024 (May 26-30, 2024, Zurich, Switzerland): Patrick Derbez, Pierre-Alain Fouque (Area Chair), André Schrottenloher
- CRYPTO 2024 (August 18-22, 2024, Santa Barbara, USA): André Schrottenloher
- CRYPTO 2024 artifact evaluation committee: André Schrottenloher
- Inscrypt 2024 (December 14-16, 2024, Kunming, China): Patrick Derbez, André Schrottenloher
- INDOCRYPT 2024 (December 18-21, 2024, Chennai, INDIA): Yixin Shen
- QUEST-IS 2025 (December 1-4th, 2025, Saclay, France): André Schrottenloher
- Selected Areas in Cryptography 2024 (August 26-30, 2024, Montréal, Québec): Aurore Guillevic
- PKC 2025 (May 12-15, 2025, Røros, Norway): Aurore Guillevic
Reviewer
- André Schrottenloher: INDOCRYPT 2024, QIP 2024, TQC 2024, Nature Scientific Reports
11.1.3 Journal
Member of the editorial boards
- Transactions on Symmetric Cryptology (ToSC) associate editor: André Schrottenloher (2023-2024 and 2024-2025)
Reviewer - reviewing activities
- Design, Codes and Cryptography: André Schrottenloher
11.1.4 Invited talks
- Pierre-Alain Fouque - Summer School on PQC co-organized with IACR, 2 talks on Quantum Factorization and Falcon signature, July 14-17, 2024, Warsaw, Poland
- Pierre-Alain Fouque - Summer School on PQC - Introduction to lattice-based cryptography, 2 courses, September 9-13, 2024, Corsica, France
- Pierre-Alain Fouque - Post-Quantum Cryptography Journée Scientifique Inria, August 28-30, 2024, Grenoble, France
- Pierre-Alain Fouque - Transition Post-Quantique - Journée scientifique du PEPR Cybersécurité, December 11, 2024, Campus Cyber, Paris, France
- Patrick Derbez - KiRiDi Tool for Key recovery in Differential attacks - Dagsthul Seminar, January 21-26, 2024, Dagsthul, Germany
- Aurore Guillevic - Elliptic curves for SNARK and proof systems - Journées Numération, Arithmétique, Cryptographie February 29 – March 1st 2024, Jussieu, Paris, to celebrate the retirement of Jean-Claude Bajard
- André Schrottenloher - Quantum Security of Symmetric Cryptosystems - QSI Spring School on post-quantum cryptography, March 12-15, 2024, Porto (Portugal)
- Patrick Derbez - Alternative Key Schedules for the AES - September 25, 2024, NTT, Japan
- Aurore Guillevic - Introduction on Elliptic Curves, Introduction on Pairings and on the CM Method - School on Elliptic Curve Cryptography (ECC), Taipei, Taiwan, October 28-29, 2024
- Aurore Guillevic - Elliptic Curves for SNARK and Proof Systems - ECC 2024, Taipei, Taiwan, October 30 - November 1, 2024
- André Schrottenloher - Single-query Quantum Hidden Shift Attacks - ASK 2024, Kolkata, India, December 14-17, 2024
- Patrick Derbez - Alternative Key Schedules for the AES - ASK 2024, Kolkata, India, December 14-17, 2024
11.2 Teaching - Supervision - Juries
11.2.1 Teaching
- Master: Pierre-Alain Fouque, Advanced Course in Cryptography for security (BCS), 16 hours, M2, University of Rennes, France;
- Master: Pierre-Alain Fouque, Basic Course in Cryptography (BC), 12 hours, M1, University of Rennes, France;
- Master: Pierre-Alain Fouque, Design and Analysis of Algorithm (ADA), 32 hours, M1, University of Rennes, France;
- Master: Pierre-Alain Fouque, Security Proof, 7,5 hours, M2, University of Rennes, France;
- Master: Pierre-Alain Fouque, Security of Data (SDATA), 12 hours, M1, University of Rennes.
- Master: André Schrottenloher, Enjeux de la cryptographie post-quantique, 7.5h eqTD, CentraleSupélec Rennes
- Engineer cycle: André Schrottenloher, Théorie de la cryptologie - Introduction à la cryptographie post-quantique, 15h eqTD, IMT Atlantique
- Master: Aurore Guillevic, Advanced Course in Cryptography for security (BCS), 16.5 hours lab sessions, M2, University of Rennes, France;
- Master: Aurore Guillevic, Mathematics for security (MSEC), 12 hours lectures, 2
12 hours lab sessions, M1, University of Rennes, France; - Master: Aurore Guillevic, Unix refresher crash course, 6 hours lab sessions, M1, University of Rennes, France;
- Master: Daniel De Almeida Braga, Cybersécurité: Menaces et organisations, hygiène numérique (SENV), 6 hours lectures, 10.5 hours lab sessions, M1, University of Rennes, France;
- Master: Daniel De Almeida Braga, Sécurité avancée des SI d'entreprise (SSYS2), 18 hours lectures, 36 hours lab sessions, M2, University of Rennes, France;
- Master: Daniel De Almeida Braga, Low Level Programming (LLP), 19.5 hours lab sessions, M1, University of Rennes, France;
- Master: Daniel De Almeida Braga, Project Security, 24 hours eqTD, M1, University of Rennes, France;
- Master: Daniel De Almeida Braga, Basic Course in Cryptography (BC), 12 hours lab sessions, M1, University of Rennes, France;
- Bachelor: Daniel De Almeida Braga, Introduction à la Securité (ISE), 1.5 hour lecture, 3 hours lab sessions, L1, University of Rennes, France;
- Bachelor: Patrick Derbez, Introduction à la Sécurité (ISE), 5.25 hours eqTD, L1, University of Rennes, France;
- Bachelor: Patrick Derbez, Introduction à la Programmation Impérative (IPI), 28.5 hours eqTD, L1, University of Rennes, France;
- Bachelor: Patrick Derbez, Algorithmique et Complexité (ACO), 56.25 hours eqTD, L2, University of Rennes, France;
- Bachelor: Patrick Derbez, Arithmétique pour la cybersecurite (ARIC), 18 hours eqTD, L2, University of Rennes, France;
- Master: Patrick Derbez, Project Security, 24 hours eqTD, M1, University of Rennes, France;
- Master: Patrick Derbez, Cryptanalyse, 24 hours eqTD, M2, University of Rennes, France;
- Master: Damien Marion, Security of Data (SDATA), 32 hours, M1, University of Rennes;
- Master: Damien Marion, Secured Implementation for Cryptography (SIMP), 25 hours, M2, University of Rennes (with students from INSA, IMT-Atlantique and CentraleSupélec rennes).
- Bachelor: Damien Marion, Enjeux sociétaux et empreinte écologique du numérique (3EN), 18 hours, L3, University of Rennes, France;
- Master: Damien Marion, project supervision, 12 hours, M1, University of Rennes;
- Master: Damien Marion, database security, 12 hours, M1, University of Rennes;
- André Schrottenloher was Oral examiner for fundamental computer science in the entrance examinations of the ENS (Écoles Normales Supérieures). (20 hours of examinations).
11.2.2 Supervision
- PhD: Corentin Jeudy, Design of Advanced Post-Quantum Signature Schemes, Defended on June 18th, 2024. Supervisors: Pierre-Alain Fouque and Adeline Roux-Langlois.
- PhD: Thi Thu Quyen Nguyen, Déploiements des signatures fondées sur les réseaux euclidiens, Defended on December 12, 2024. Supervisors: Adeline Roux-Langlois (GREYC, Caen), Paul Dischamp (Idemia) and Alexandre Wallet.
- PhD in progress: Phuong Hoa Nguyen, MILP and symmetric-key cryptanalysis, started October 2021. Supervisors: Patrick Derbez and Pierre-Alain Fouque.
- PhD in progress: Clémence Chevignard, Module-LIP: réductions, cryptanalyse, algorithmes, started November 2023. Supervisors: Pierre-Alain Fouque, Alexandre Wallet and Rémi Giraud (Qualcomm).
- PhD in progress: Mathieu Degré, Nouveaux modèles MILP adaptés aux problèmes cryptographiques, started January 2024. Supervisors: Patrick Derbez, André Schrottenloher.
- PhD in progress: Aurel Pichollet–Mugnier, Security of ASCON and Lightweight Symmetric Primitives against Quantum Attackers, started November 2024. Supervisors: Patrick Derbez, André Schrottenloher, Zoé Amblard (Thales SIX)
- PhD in progress: Baptiste Germon, Independence hypothesis in differential cryptanalysis, started October 2024. Supervisors: Patrick Derbez, Christina Boura (IRIF)
- PhD in progress: Gaël Claudel, Analyse des attaques par canaux auxiliaires de schémas de signature post quantique : approches combinées. Supervisors: Patrick Derbez, Damien Marion, Aurore Guillevic, Benoît Gérard (ANSSI)
- PhD in progress: Aymeric Hiltenbrand, Attaques par canaux auxiliaires sur la cryptographie post-quantique, from December 2023. Supervisors: Guenael Renault (ANSSI), Pierre-Alain Fouque .
- PhD in progress: Guilhem Niot, Threshold Post-Quantum Cryptography. Supervisors: Pierre-Alain Fouque and Thomas Prest (PQShield).
- Internship: Baptiste Germon (M2): On the quasidifferential framework (April - September 2024). Supervisor: Patrick Derbez
- Internship: Gaël Claudel (M2)
- Internship: Todd Cauet-Male
- Internship: Jules Rousseau (M2): Cube cryptanalysis of Ascon and Gift (April-September 2024). Supervisors: André Schrottenloher, Patrick Derbez
- Internship: Laz Panard (M2):
Se débarrasser de l'arithmétique à virgule flottante : Preuve de concept et
benchmarking du cryptosystème de signature numérique
alcon (May-October 2024). Supervisors: Aurore Guillevic, Daniel De Almeida Braga, Pierre-Alain Fouque - Internship: Thibault Didier (L3): Optimisation d'un circuit multi-somme réversible pour la factorisation quantique (June-July 2024). Supervisor: André Schrottenloher
11.2.3 Juries
- Pierre-Alain Fouque was a reviewer of the PhD thesis of Clara Pernot (February 2, 2024, Inria Paris and Université Paris Cité, France).
- Pierre-Alain Fouque was a member (advisor) for the Ph.D. thesis committee of Corentin Jeudy (June 18, 2024, Université de Rennes, France).
- Pierre-Alain Fouque was reviewer for the Ph.D. thesis of Augustin Bariant (June 27, 2024, Sorbonne Université, France).
- Pierre-Alain Fouque was reviewer for the Ph.D. thesis of Pouria Fallahpour (July 5, 2024, École normale supérieure de Lyon, France).
- Pierre-Alain Fouque was member for the Ph.D. thesis committee of Margot Funk (October 14, 2024, Université de Versailles-Saint-Quentin-en-Yvelines, France).
- Pierre-Alain Fouque was president of the Ph.D. thesis committee of Rachelle Heim Boissier (October 15, 2024, Université Paris-Saclay, France).
- Pierre-Alain Fouque was member for the Ph.D. thesis committee of Hugo Beguinet (November 18, 2024, Université Paris sciences et lettres, France).
- Yixin Shen was member (examinor) for the Ph.D. thesis committee of Clément Ducros (November 12, 2024, Université Paris Cité).
11.3 Popularization
11.3.1 Participation in Live events
- André Schrottenloher was a panelist at the event Techno conférence Voyage au centre du Quantique - Capteurs, Communications, Informatique organized by Images et Réseaux (April 4th, 2024)
12 Scientific production
12.1 Major publications
- 1 inproceedingsReducing the Number of Qubits in Quantum Factoring.QIP 2025 - 28th Annual Conference on Quantum Information ProcessingRaleigh, North Carolina, United StatesFebruary 2025HALback to textback to text
12.2 Publications of the year
International journals
- 2 articleA short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level.IACR Communications in Cryptology13October 2024, 44HALback to text
- 3 articleMasking the GLP Lattice-Based Signature Scheme at Any Order.Journal of Cryptology371January 2024, 5HALDOIback to text
- 4 articleSingle-Query Quantum Hidden Shift Attacks.IACR Transactions on Symmetric Cryptology20243September 2024, 266-297HALDOIback to text
- 5 articleFinding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs.IACR Transactions on Symmetric Cryptology20243September 2024, 84-176HALDOI
- 6 articleEquivalence of Generalised Feistel Networks.IACR Transactions on Symmetric Cryptology2024March 2024, 412 - 440HALDOIback to textback to text
- 7 articleKey Committing Attacks against AES-based AEAD Schemes.IACR Transactions on Symmetric Cryptology20241March 2024, 135-157HALDOIback to text
- 8 articleQuantum Procedures for Nested Search Problems: with Applications in Cryptanalysis.IACR Communications in CryptologyOctober 2024, 1-38HALDOIback to text
- 9 articleCryptanalysis of Full-Round BipBip.IACR Transactions on Symmetric Cryptology202422024, 68-84HALDOIback to textback to text
International peer-reviewed conferences
- 10 inproceedingsComputing e -th roots in number fields.ALENEX 2024 - SIAM Symposium on Algorithm Engineering and ExperimentsAlexandria, United StatesSociety for Industrial and Applied MathematicsJanuary 2024, 207-219HALDOIback to text
- 11 inproceedingsImproving Generic Attacks Using Exceptional Functions.LNCSCRYPTO 2024 - 44th Annual International Cryptology Conference14923Santa Barbara, United StatesSpringer2024, 105-138HALDOIback to textback to text
- 12 inproceedingsA Generic Algorithm for Efficient Key Recovery in Differential Attacks – and its Associated Tool.EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14651Lecture Notes in Computer ScienceZurich, SwitzerlandSpringer Nature SwitzerlandApril 2024, 217-248HALDOIback to textback to text
- 13 inproceedingsAlternative Key Schedules for the AES.LNCS : Applied Cryptography and Network SecurityACNS 2024 - 22nd International Conference on Applied Cryptography and Network Security14584Abu Dhabi, United Arab Emirates2024, 485-506HALDOIback to textback to text
- 14 inproceedingsReducing the Number of Qubits in Quantum Information Set Decoding.Lecture Notes in Computer ScienceASIACRYPT 2024 - International Conference on the Theory and Application of Cryptology and Information SecurityKolkata, IndiaSpringer2024, 1-36HALback to text
- 15 inproceedingsFlood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices.CRYPTO 2024 - Annual International Cryptology Conference14926Lecture Notes in Computer ScienceSanta Barbara, United StatesSpringer Nature SwitzerlandAugust 2024, 425-458HALDOIback to text
- 16 inproceedingsRevisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.LNCSCRYPTO 2024 - 44th Annual International Cryptology Conference14923Lecture Notes in Computer ScienceSanta barbara, United StatesSpringer Nature SwitzerlandAugust 2024, 38-72HALDOIback to textback to text
- 17 inproceedingsThey’re not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.ASE 2024 - 21st Workshop on Automotive Software EngineeringLinz (AUSTRIA), AustriaGesellschaft für Informatik e.V.2024HALDOIback to textback to text
- 18 inproceedingsPhoenix: Hash-and-Sign with Aborts from Lattice Gadgets.PQCrypto 2024 - 15th International Conference on Post-Quantum Cryptography14771Lecture Notes in Computer ScienceOxford, United KingdomSpringer Nature SwitzerlandJune 2024, 265 - 299HALDOIback to text
- 19 inproceedingsCryptanalysis of rank-2 module-LIP in Totally Real Number Fields.Advances in Cryptology – EUROCRYPT 202443rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VIIEurocrypt 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques14657Lecture Notes in Computer ScienceZurich, SwitzerlandSpringer Nature SwitzerlandApril 2024, 226-255HALDOIback to text
Conferences without proceedings
- 20 inproceedingsReducing the Number of Qubits in Quantum Factoring.QIP 2025 - 28th Annual Conference on Quantum Information ProcessingRaleigh, North Carolina, United StatesFebruary 2025HALback to text
- 21 inproceedings"These results must be false": A usability evaluation of constant-time analysis tools.2024 - 33rd USENIX Security SymposiumPhiladelphia, Pennsylvania, USA, United StatesAugust 2024, 1-18HALback to textback to text
- 22 inproceedingsDiscrete gaussian sampling for BKZ-reduced basis.ArcticCrypt 2025Longyearbyen, Svalbard, NorwayJuly 2025HALback to textback to text
Doctoral dissertations and habilitation theses
- 23 thesisDesign of advanced post-quantum signature schemes.Université de RennesJune 2024HAL
Reports & preprints
- 24 misc Does quantum lattice sieving require quantum RAM? 2024 HAL DOI back to text
- 25 miscAn Algebraic Point of View on the Generation of Pairing-Friendly Curves.December 2024HALback to text
- 26 miscEmbedded Curves and Embedded Families for SNARK-Friendly Curves.October 2024HALback to text
- 27 miscSmoothing Parameter and Shortest Vector Problem on Random Lattices.2024HALback to textback to text
- 28 reportCube-based cryptanalysis of Ascon and Gift.Université de rennes; Irisa Institut de Recherche en Informatique et Systèmes AléatoiresSeptember 2024, 32HAL
12.3 Cited publications
-
29
inproceedingsSolving the Shortest Vector Problem in
Time Using Discrete Gaussian Sampling: Extended Abstract.STOCACM2015, 733--742back to text - 30 inproceedingsmaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.ESORICS (1)11735Lecture Notes in Computer ScienceSpringer2019, 300--318back to text
- 31 inproceedingsVerified Proofs of Higher-Order Masking.EUROCRYPT (1)9056Lecture Notes in Computer ScienceSpringer2015, 457--485back to text
- 32 inproceedingsStrong Non-Interference and Type-Directed Higher-Order Masking.CCSACM2016, 116--129back to text
- 33 inproceedingsMasking the GLP Lattice-Based Signature Scheme at Any Order.EUROCRYPT (2)10821Lecture Notes in Computer ScienceSpringer2018, 354--384back to textback to text
- 34 inproceedingsGALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.CCSACM2019, 2147--2164back to text
- 35 inproceedingsNew directions in nearest neighbor searching with applications to lattice sieving.SODASIAM2016, 10--24back to text
- 36 inproceedingsLog-S-unit Lattices Using Explicit Stickelberger Generators to Solve Approx Ideal-SVP.ASIACRYPT (3)13793Lecture Notes in Computer ScienceSpringer2022, 677--708back to text
- 37 inproceedingsTwisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices.ASIACRYPT (2)12492Lecture Notes in Computer ScienceSpringer2020, 349--380back to text
- 38 inproceedingsGrover vs. McEliece.PQCrypto6061Lecture Notes in Computer ScienceSpringer2010, 73--80back to text
- 39 articleFarfalle: parallel permutation-based cryptography.IACR Trans. Symmetric Cryptol.201742017, 1--38back to text
-
40
inproceedingsComputing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in
and Application to the Cryptanalysis of a FHE Scheme.EUROCRYPT (1)10210Lecture Notes in Computer Science2017, 60--88back to text - 41 inproceedingsFinding Many Collisions via Reusable Quantum Walks - Application to Lattice Sieving.EUROCRYPT (5)14008Lecture Notes in Computer ScienceSpringer2023, 221--251back to text
- 42 articleQuantum Security Analysis of AES.IACR Trans. Symmetric Cryptol.201922019, 55--93URL: https://doi.org/10.13154/tosc.v2019.i2.55-93DOIback to text
- 43 inproceedingsBeyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes.EUROCRYPT (3)13277Lecture Notes in Computer ScienceSpringer2022, 315--344back to text
- 44 inproceedingsTowards Classical Hardness of Module-LWE: The Linear Rank Case.ASIACRYPT (2)12492Lecture Notes in Computer ScienceSpringer2020, 289--317back to text
- 45 inproceedingsAutomatic Search of Attacks on Round-Reduced AES and Applications.CRYPTO6841Lecture Notes in Computer ScienceSpringer2011, 169--187back to text
- 46 inproceedingsDragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild.ACSACACM2020, 291--303back to text
- 47 inproceedingsFrom Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.EuroS&PIEEE2023, 707--723back to text
- 48 inproceedingsClassical hardness of learning with errors.STOCACM2013, 575--584back to text
- 49 inproceedingsCryptanalysis of the New CLT Multilinear Map over the Integers.EUROCRYPT (1)9665Lecture Notes in Computer ScienceSpringer2016, 509--536back to text
- 50 inproceedingsModFalcon: Compact Signatures Based On Module-NTRU Lattices.AsiaCCSACM2020, 853--866back to text
- 51 inproceedingsAutomatic Search of Meet-in-the-Middle and Impossible Differential Attacks.Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II9815Lecture Notes in Computer ScienceSpringer2016, 157--184DOIback to text
- 52 inproceedingsExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.FSE8424Lecture Notes in Computer ScienceSpringer2013, 541--560back to text
- 53 articleAscon v1.2: Lightweight Authenticated Encryption and Hashing.J. Cryptol.3432021, 33back to text
- 54 inproceedingsPractical Cryptanalysis of SFLASH.CRYPTO4622Lecture Notes in Computer ScienceSpringer2007, 1--12back to text
- 55 inproceedingsUnifying Leakage Models: From Probing Attacks to Noisy Leakage.EUROCRYPT8441Lecture Notes in Computer ScienceSpringer2014, 423--440back to text
- 56 articleBAT: Small and Fast KEM over NTRU Lattices.IACR Trans. Cryptogr. Hardw. Embed. Syst.202222022, 240--265URL: https://doi.org/10.46586/tches.v2022.i2.240-265DOIback to text
- 57 inproceedingsKey Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.EUROCRYPT (3)12107Lecture Notes in Computer ScienceSpringer2020, 34--63back to text
- 58 inproceedingsKey Recovery on Hidden Monomial Multivariate Schemes.EUROCRYPT4965Lecture Notes in Computer ScienceSpringer2008, 19--30back to text
- 59 inproceedingsGeneric Attack on Duplex-Based AEAD Modes Using Random Function Statistics.EUROCRYPT (4)14007Lecture Notes in Computer ScienceSpringer2023, 348--378back to text
- 60 inproceedingsPrivate Circuits: Securing Hardware against Probing Attacks.CRYPTO2729Lecture Notes in Computer ScienceSpringer2003, 463--481back to text
- 61 inproceedingsFast Reduction of Algebraic Lattices over Cyclotomic Fields.CRYPTO (2)12171Lecture Notes in Computer ScienceSpringer2020, 155--185back to text
- 62 inproceedingsAn Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.CRYPTO (1)9215Lecture Notes in Computer ScienceSpringer2015, 43--62back to text
- 63 inproceedingsRevisiting Lattice Attacks on Overstretched NTRU Parameters.EUROCRYPT (1)10210Lecture Notes in Computer Science2017, 3--26back to text
- 64 inproceedingsAn LLL Algorithm for Module Lattices.ASIACRYPT (2)11922Lecture Notes in Computer ScienceSpringer2019, 59--90back to text
- 65 inproceedingsAn Improved LPN Algorithm.SCN4116Lecture Notes in Computer ScienceSpringer2006, 348--359back to text
- 66 articleQuantum Period Finding is Compression Robust.IACR Trans. Symmetric Cryptol.202212022, 183--211back to text
- 67 inproceedingsContext Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More.EUROCRYPT (4)14007Lecture Notes in Computer ScienceSpringer2023, 379--407back to text
- 68 inproceedingsMasking Dilithium - Efficient Implementation and Side-Channel Evaluation.ACNS11464Lecture Notes in Computer ScienceSpringer2019, 344--362back to text
- 69 articleKey-Recovery Attacks on ASASA.J. Cryptol.3132018, 845--884back to text
- 70 articleYour DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME.Proc. Priv. Enhancing Technol.202342023, 306--321back to text
- 71 inproceedingsProvable Dual Attacks on Learning with Errors.EUROCRYPT (6)14656Lecture Notes in Computer ScienceSpringer2024, 256--285back to text
- 72 inproceedingsMasking against Side-Channel Attacks: A Formal Security Proof.EUROCRYPT7881Lecture Notes in Computer ScienceSpringer2013, 142--159back to text
- 73 inproceedingsOn the Ring-LWE and Polynomial-LWE Problems.EUROCRYPT (1)10820Lecture Notes in Computer ScienceSpringer2018, 146--173back to text
- 74 inproceedingsAlgorithms for Quantum Computation: Discrete Logarithms and Factoring.FOCSIEEE Computer Society1994, 124--134back to text
- 75 articleA mean value theorem in geometry of numbers.Annals of Mathematics4621945, 340--347back to text