2024Activity reportProject-TeamGRACE
RNSR: 201221041Y- Research center Inria Saclay Centre at Institut Polytechnique de Paris
- In partnership with:CNRS, Institut Polytechnique de Paris
- Team name: Geometry, arithmetic, algorithms, codes and encryption
- In collaboration with:Laboratoire d'informatique de l'école polytechnique (LIX)
- Domain:Algorithmics, Programming, Software and Architecture
- Theme:Algorithmics, Computer Algebra and Cryptology
Keywords
Computer Science and Digital Science
- A2.3.1. Embedded systems
- A4.2. Correcting codes
- A4.3.1. Public key cryptography
- A4.3.3. Cryptographic protocols
- A4.4. Security of equipment and software
- A4.6. Authentication
- A4.8. Privacy-enhancing technologies
- A4.9. Security supervision
- A7.1. Algorithms
- A8.1. Discrete mathematics, combinatorics
- A8.4. Computer Algebra
- A8.5. Number theory
Other Research Topics and Application Domains
- B5.11. Quantum systems
- B6.4. Internet of things
- B6.6. Embedded systems
- B9.5.1. Computer science
- B9.5.2. Mathematics
- B9.10. Privacy
1 Team members, visitors, external collaborators
Research Scientists
- Alain Couvreur [Team leader, INRIA, Senior Researcher]
- Daniel Augot [INRIA, Senior Researcher]
- Thomas Debris [INRIA, Researcher]
- Benjamin Smith [INRIA, Researcher]
- Gustavo Souza Banegas [INRIA, ISFP, from Oct 2024]
Faculty Members
- Olivier Blazy [Ecole Polytechnique, Professor]
- Martino Borello [Université Paris 8, Associate Professor Delegation, from Feb 2024 until Jul 2024]
- Françoise Levy-Dit-Vehel [ENSTA, Professor]
- François Morain [Ecole Polytechnique, Professor]
Post-Doctoral Fellows
- Christophe Levrat [INRIA, Post-Doctoral Fellow, from May 2024]
- Rati Ludhani [INRIA, Post-Doctoral Fellow, from Oct 2024]
- Rakhi Pratihar [INRIA, Post-Doctoral Fellow]
- Bruno Sydney Sterner [INRIA, Post-Doctoral Fellow]
PhD Students
- Nadja Aoutouf [INRIA]
- Valentina Astore [INRIA, from Oct 2024]
- Estelle Blin [LIX, from Oct 2024]
- Sana Boussam [THALES, CIFRE]
- Hugo Delavenne [LIX]
- Clément Ducros [UNIV PARIS, until Sep 2024]
- Anaelle Le Devehat [INRIA]
- Pierre Loisel [INRIA]
- Lola-Baie Mallordy [LIX, from Mar 2024]
- Tanguy Medevielle [IRMAR]
- Antoine Moran [CEA, from May 2024]
- Antonio Ras [CEA, from May 2024 until Oct 2024]
- Eric Sageloli [THALES]
- Nihan Tanisali [INRIA]
Interns and Apprentices
- Estelle Blin [LIX, from Mar 2024 until Sep 2024]
- Penelope Forcioli [LIX, until Mar 2024]
- Maxence Jauberty [TELECOM PARIS, Intern, from Sep 2024]
- Elina Roussel [CENTRALESUPELEC, Intern, from Mar 2024 until Aug 2024]
- Alessandro Sferlazza [INRIA, Intern, from May 2024 until Sep 2024]
- Pauline Vinchon [INRIA, Intern, from Jun 2024 until Aug 2024]
Administrative Assistant
- Mariana De Almeida [INRIA]
External Collaborators
- Martino Borello [UNIV PARIS VIII, from Aug 2024]
- Lucien Francois [UNIV DUBLIN, from Oct 2024]
- Guenael Renault [SGDSN]
- Martin Scotti [UNIV PARIS VIII, from Sep 2024]
- Tamara Topalov [LIX, from Feb 2024 until Jun 2024]
- Neehar Verma [UNIV AALTO, from Nov 2024]
2 Overall objectives
2.1 Scientific foundations
Grace combines expertise and deep knowledge in algorithmic number theory and algebraic geometry, to build and analyse (public-key) cryptosystems, design new error correcting codes, with real-world concerns like cybersecurity or blockchains (software and hardware implementations, secure implementations in constrained environments, countermeasures against side channel attacks, white box cryptography).
The foundations of Grace therefore lie in algorithmic number theory (fundamental algorithms primality, factorization), number fields, the arithmetic geometry of curves, algebraic geometry and the theory of algebraic codes.
Arithmetic Geometry is the meeting point of algebraic geometry and number theory: the study of geometric objects defined over arithmetic number systems. In our case, the most important objects are curves and their Jacobians over finite fields; these are fundamental to our applications in both coding theory and cryptology. Jacobians of curves are excellent candidates for cryptographic groups when constructing efficient instances of public-key cryptosystems, of which Diffie–Hellman key exchange is an instructive example.
Coding Theory studies originated with the idea of using redundancy in messages to protect them against noise and errors. While the last decade of the 20th century has seen the success of so-called iterative decoding methods, we see now many new ideas in the realm of algebraic coding, with the foremost example being list decoding, (zero knowledge or not) proofs of computation.
Part of the activities of the team are oriented towards post-quantum cryptography, either based on elliptic curves (isogenies) or code-based. Also the team study relevant cryptography for the blockchain arena.
The group is strongly invested in cybersecurity: software security, secure hardware implementations, privacy, etc.
3 Research program
3.1 Algorithmic Number Theory
Participants: François Morain, Guenaël Renault, Benjamin Smith, Bruno Sterner.
Algorithmic Number Theory is concerned with replacing special cases with general algorithms to solve problems in number theory. In the Grace project, it appears in three main threads:
- fundamental algorithms for integers and polynomials (including primality and factorization);
- algorithms for finite fields (including discrete logarithms);
- algorithms for algebraic curves.
Clearly, we use computer algebra in many ways. Research in cryptology has motivated a renewed interest in Algorithmic Number Theory in recent decades—but the fundamental problems still exist per se. Indeed, while algorithmic number theory application in cryptanalysis is epitomized by applying factorization to breaking RSA public key, many other problems, are relevant to various area of computer science. Roughly speaking, the problems of the cryptological world are of bounded size, whereas Algorithmic Number Theory is also concerned with asymptotic results.
3.2 Arithmetic Geometry: Curves and their Jacobians
Participants: François Morain, Benjamin Smith.
Theme: Arithmetic Geometry: Curves and their Jacobians Arithmetic Geometry is the meeting point of algebraic geometry and number theory: that is, the study of geometric objects defined over arithmetic number systems (such as the integers and finite fields). The fundamental objects for our applications in both coding theory and cryptology are curves and their Jacobians over finite fields.
An algebraic plane curve
(Not every curve is planar—we may have more variables, and more
defining equations—but from an algorithmic point of view,
we can always reduce to the plane setting.)
The genus
The simplest curves with nontrivial Jacobians are
curves of genus 1,
known as elliptic curves;
they are typically defined by equations of the form
3.3 Curve-Based cryptology
Participants: François Morain, Anaëlle Le Dévéhat, Benjamin Smith, Gustavo Souza–Banegas, Bruno Sterner.
Theme: Curve-Based Cryptology
Jacobians of curves are excellent candidates for cryptographic groups when constructing efficient instances of public-key cryptosystems. Diffie–Hellman key exchange is an instructive example.
Suppose Alice and Bob want to establish a secure communication
channel. Essentially, this means establishing a common secret
key, which they will then use for encryption and decryption.
Some decades ago, they would have exchanged this key in person, or
through some trusted intermediary; in the modern, networked world,
this is typically impossible, and in any case completely unscalable.
Alice and Bob may be anonymous parties who want to do e-business, for
example, in which case they cannot securely meet, and they have no way
to be sure of each other's identities. Diffie–Hellman key exchange
solves this problem. First, Alice and Bob publicly agree on a
cryptographic group
This simple protocol has been in use, with only minor modifications,
since the 1970s. The challenge is to create examples of groups
The classic example of a group suitable for the Diffie–Hellman protocol
is the multiplicative group of a finite field
This is where Jacobians of algebraic curves come into their own.
First, elliptic curves and Jacobians of genus 2 curves do not have a
subexponential index calculus algorithm: in particular, from the point
of view of the DLP, a generic elliptic curve is currently as
strong as a generic group of the same size. Second, they provide
some diversity: we have many degrees of freedom in choosing
curves over a fixed
3.4 Algebraic Coding Theory
Participants: Daniel Augot, Alain Couvreur, Françoise Levy-Dit-Vehel, Clément Ducros.
Theme: Coding theory
Coding Theory studies originated with the idea of using redundancy in messages to protect against noise and errors. The last decade of the 20th century has seen the success of so-called iterative decoding methods, which enable us to get very close to the Shannon capacity. The capacity of a given channel is the best achievable transmission rate for reliable transmission. The consensus in the community is that this capacity is more easily reached with these iterative and probabilistic methods than with algebraic codes (such as Reed–Solomon codes).
However, algebraic coding is useful in settings other than the Shannon context. Indeed, the Shannon setting is a random case setting, and promises only a vanishing error probability. In contrast, the algebraic Hamming approach is a worst case approach: under combinatorial restrictions on the noise, the noise can be adversarial, with strictly zero errors.
These considerations are renewed by the topic of list decoding after the breakthrough of Guruswami and Sudan at the end of the nineties. List decoding relaxes the uniqueness requirement of decoding, allowing a small list of candidates to be returned instead of a single codeword. List decoding can reach a capacity close to the Shannon capacity, with zero failure, with small lists, in the adversarial case. The method of Guruswami and Sudan enabled list decoding of most of the main algebraic codes: Reed–Solomon codes and Algebraic–Geometry (AG) codes and new related constructions “capacity-achieving list decodable codes”. These results open the way to applications against adversarial channels, which correspond to worst case settings in the classical computer science language.
Another avenue of our studies is AG codes over various geometric objects. Although Reed–Solomon codes are the best possible codes for a given alphabet, they are very limited in their length, which cannot exceed the size of the alphabet. AG codes circumvent this limitation, using the theory of algebraic curves over finite fields to construct long codes over a fixed alphabet. The striking result of Tsfasman–Vladut–Zink showed that codes better than random codes can be built this way, for medium to large alphabets. Disregarding the asymptotic aspects and considering only finite length, AG codes can be used either for longer codes with the same alphabet, or for codes with the same length with a smaller alphabet (and thus faster underlying arithmetic).
From a broader point of view, wherever Reed–Solomon codes are used, we can substitute AG codes with some benefits: either beating random constructions, or beating Reed–Solomon codes which are of bounded length for a given alphabet.
Another area of Algebraic Coding Theory with which we are more recently concerned is the one of Locally Decodable Codes. After having been first theoretically introduced, those codes now begin to find practical applications, most notably in cloud-based remote storage systems.
3.5 Post-quantum cryptography
Participants: Olivier Blazy, Alain Couvreur, Thomas Debris–Alazard, Anaëlle Le Dévéhat, Pierre Loisel, Antoine Moran, Antonio Ras, Benjamin Smith, Gustavo Souza–Banegas, Bruno Sterner.
Theme: Cryptography
A huge amount of work is being put into developing an efficient quantum computer. But even if the advent of such a computer may wait for decades, it is urgent to deploy post-quantum cryptography (PQC), i.e: solutions on our current devices that are quantum-safe. Indeed, an attacker could store encrypted sessions and wait until a quantum computer is available to decrypt. In this context the National Institute of Standard Technology (NIST) has launched in 2017 (see this website) a call for standardizing public-key PQC schemes (key exchanges and signatures). Among the mathematical objects to design post quantum primives, one finds error correcting codes, Euclidean lattices and isogenies. Furthermore, in order to increase the diversity in the future post-quantum standardized crypto-systems the NIST has launched in 2023 (see this website) a second call for standardization.
We are currently in the final step of the standardization of the NIST and most of the selected solutions are based on codes and lattices. These preliminary results tend to show that codes and lattices will be in a near future at the ground of our numerical security. If isogenies are less represented, they remain of deep interest since they appear to be the post quantum solution providing the smallest key sizes. The purpose of our research program is to bring closer these solutions for a post-quantum security in order to improve their efficiency, diversity and to increase our trust in these propositions.
3.6 Proofs of Computation
Participants: Daniel Augot, François Morain.
Proofs of computation are cryptographic protocols which allow a prover to convince a verifier that a statement or an output of a computation is correct. The prover is untrusted in the sense that it may try to convince the verifier that a false statement is true. On the other hand the prover is computationnally restricted, and have very small prower: the proof should be short and easy to verify. They can be interactive or not.
While the topic originates back to 1990, several important steps towards praticality has been made in last decade, with efficient, real-life implementations and industrial deployments in the last years, thanks to huge fundings.
There are several cryptographic paths for designing such proof systems. Within Grace, two main techniques are investigated. The first one relies on elliptic curves and pairings, and produce very short (constant-size) proofs. Youssef El Housni defended his PhD on this topic, in particular on the arithmetic and implementation aspects. The second techniques relies on algebraic coding theory, with smaller cryptographic assumptions (cryptographic hash functions), and is post-quantum, but provides longer proofs.
Daniel Augot is advising Hugo Delavenne on the second topic, more precisely on the interplay on model of computations and so called arithmetization, to which is applied the cryptographic treatment itself (curve-based or code-based). Daniel Augot is also co-advisor of Tangue Medevielle with Jade Nardi (IRMAR, CNRS, Rennes) on the algebraic and coding side. Hugo Delavenne and Tanguy Medevielle are collaborating on the two facets of the topic.
4 Application domains
4.1 Application Domain: cybersecurity
Participants: Olivier Blazy, François Morain, Antoine Moran, Guenaël Renault, Benjamin Smith, Gustavo Souza–Banegas.
We are interested in developing interactions between cryptography and cybersecurity. In particular, we are carrying out research in embedded security (side channels and fault attacks), software security (finding vulnerabilities efficiently and defining efficient countermeasures), and privacy (security of TOR).
4.2 Application Domain: blockchains
Participants: Daniel Augot.
While basic and standard blockchain ideas rely, on the cryptographic side, on very basic and standard cryptographic primitives like signatures and hash functions, more elaborate techniques from crypto can alleviate some shortcomings of blockchain, like the poor bandwith and the lack of privacy.
The topic of verifiable computation consists in verifying heavy computations done by a remote computer, using a lightweight computer which is not able to do the computation. The remore computer, called the prover, is allowed to provide a proof aside the result of the computation. This proof must be very short and fast to verify. It can also be made zero-knowledge, where the prover hides some inputs to the computation, and yet prove the result is correct.
These proofs allows to move data and computation off chain, pushing the burden to off-chain servers that play the role of provers, who then commit short commitments of the updated data , accompanied by short proofs which are easy to verify onchain, where validators play the role of verifiers. This mecanism is called a rollup and is at the core of the proposed path for scaling Ethereum, a predominant blockchain, which will be “rollup-centric”.
Also Daniel Augot, together with Julien Prat (economist, ENSAE), is co-leading a Polytechnique teaching and research “chair”, called Blockchain and B2B plaforms, funded by CapGemini, Caisse des dépots and NomadicLabs. This is patronage, which funded Sarah Bordage's PhD thesis. This gives visiblity and outreach beyond the academic sphere.
4.3 Cloud storage
Participants: Françoise Levy-dit-Vehel.
The team is concerned with several aspect of reliability and security of cloud storage, obtained mainly with tools from coding theory. On the privacy side, we build protocols for so-called Private Information Retrieval which enable a user to query a remote database for an entry, while not revealing his query. For instance, a user could query a service for stock quotes without revealing with company he is interested in. On the availability side, we study protocols for proofs of retrievability, which enable a user to get assurance that a huge file is still available on a remote server, with a low bandwith protocol which does not require to download the whole file. For instance, in a peer-to-peer distributed storage system, where nodes could be rewarded for storing data, they can be audited with proof of retrievability protocols to make sure they indeed hold the data.
We investigate these problems with algebraic coding theory for the effective constuction of protocols. To this respect, we mainly use locally decodable codes and in particular high-rate lifted codes.
Maxime Roméas is a PhD student of the team. (PhD grant from IP Paris/Ecole Polytechnique for a 3-year doctorate, Oct 2019-Sept 2022). The subject of his thesis is "The Constructive Cryptography paradigm applied to Interactive Cryptographic Proofs".
The Constructive Cryptography framework, introduced by Maurer in 2011, redefines basic cryptographic primitives and protocols starting from discrete systems of three types (resources, converters, and distinguishers). This not only permits to construct them effectively, but also lighten and sharpen their security proofs. One strength of this model is its composability. The purpose of the PhD is to apply this model to rephrase existing interactive cryptographic proofs so as to assert their genuine security, as well as to design new proofs. The main concern here is security and privacy in Distributed Storage settings. Another axis of the PhD is to augment the CC model by, e.g., introducing new functionalities to a so-called Server Memory Resource.
5 Social and environmental responsibility
5.1 Impact of research results
The works of Olivier Blazy on age verification is cited as a reference basis by ARCOM in their October 2024 report. See page 7 of this report.
6 Highlights of the year
6.1 Awards
- Maxime Bombar, a former PhD student recieved the PhD Award in computer science of Institut Polytechnique de Paris.
- Bruno Sterner won the ANTSy (best lightning talk) award at ANTS-XVI.
7 New software, platforms, open data
7.1 New software
7.1.1 snark-2-chains
-
Name:
Families of SNARK-friendly 2-chains of elliptic curves
-
Keywords:
Cryptography, Cryptocurrency, Blockchain
-
Functional Description:
This library implements finite field and elliptic curve arithmetic for BN curves (Barreto-Naehrig), BLS (Barreto-Lynn-Scott), KSS (Kachisa-Schaefer-Scott), and 2-chains made of BW6 (Brezing-Weng curves of embedding degree 6), CP8, CP12 (Cocks-Pinch curves of embedding degree 8 and 12) for use with zk-snarks (zero-knowledge succinct non-interactive argument of knowledge). The cryptographic applications are: pairing, scalar multiplication on the curves, hashing on the curves. The code is a proof of concept tied to two papers and is not optimized.
- URL:
- Publications:
-
Contact:
Aurore Guillevic
7.1.2 WaveSign
-
Name:
Wave Signatures: Reference Implementation
-
Functional Description:
This software provides a complete and functional reference implementation in C99 for Wave, a post-quantum digital signature scheme based on hard problems in coding theory. Key generation, signing, and verification functions are provided, compliant with the API specified by NIST for their post-quantum signature on-ramp call. The emphasis is on portability, rather than targeted optimizations.
- URL:
-
Contact:
Nicolas Sendrier
8 New results
8.1 Mathematical foundations
8.1.1 A Freiman-like Theorem for function fields
Participants: Alain Couvreur.
A famous Theorem of additive number theory due to Freiman claims that given
satisfies
then
Motivated by question from coding theory, secret sharing and code-based cryptography, Alain Couvreur in a collaboration with Gilles Zémor (Institut de Mathématiques de Bordeaux) obtained the following result in 28.
Theorem. Let
satisfies
Then
8.1.2 Decoding of rank metric Reed–Muller codes
Participants: Alain Couvreur, Rakhi Pratihar.
The notion of
where
For
In a joint work 26, Alain Couvreur and Rakhi Pratihar address the following decoding problem for
Problem: Given
The authors give a method for reconstructing the error
Theorem. Let
8.2 Post–quantum cryptography
8.2.1 Quantum oblivious LWE sampling and insecurity of standard model lattice-based SNARKs
Participants: Thomas Debris–Alazard.
The Learning With Errors (
In this work, we did not focus on the hardness of
Motivated by the task of invalidating the security assumption used in almost all known lattice-based SNARKs (claiming to be safe even against quantum computers), Thomas Debris–Alazard
in collaboration with Pouria Fallahpour (ENS Lyon) and Damien Stehlé (CryptoLab) designed in 18 an efficient algorithm that generates
8.2.2 Isogeny formulæ in dimension 2
Participants: Benjamin Smith.
While the basic arithmetic of genus-2 Jacobians and Kummer surfaces
has matured, and cryptographic applications have driven great improvements
in the efficiency of the resulting formulæ and algorithms, the corresponding explicit
theory of isogenies lags behind.
Just as elliptic isogenies factor naturally into compositions of scalar multiplications and isogenies with prime cyclic
kernel (i.e., isomorphic to
In 12, we give a general method for deriving explicit
formulæ for isogenies of fast Kummer surfaces—the most relevant
surfaces for genus-2 isogeny-based cryptography—exploiting their high
symmetry to optimize the approach of Bruin, Flynn, and Testa.
Our approach is elementary in the sense that it avoids explicitly
using the heavy machinery of theta functions
(though of course theta functions implicitly play a fundamental role
behind the scenes). We apply these methods to give explicit examples
for
8.3 Secure multiparty computation: FOLEAGE
Participants: Alain Couvreur, Clément Ducros.
Secure Multiparty Computation is a famous paradigm where each player
has secret data and are able to perform a computation involving all
these secret data without getting more information than the result of
the computation. Following the seminal work from Beaver
37, efficient secure multi party computation can be
performed thanks to a precomputation step where the parties receive
correlated pseudo-random strings called Oblivious Linear
Evaluation (OLE). In 16, we proposed an
optimised construction of OLE's over
8.4 Verifiable computation
Participants: Daniel Augot.
Suppose a user of a small device requires a powerful computer to perform a heavy computation for him. The computation can not be performed by the device. After completion of the computation, the powerful computer reports a result. Suppose now that the user has not full confidence that the remote computer performs correctly or behaves honestly. How can the user be assured that the correct result has been returned to him, given that he can not redo the computation ?
The topic of verifiable computation deals with this issue. Essentially it is a cryptographic protocol where the prover (i.e. the remote computer) provides a proof to a waek verifier (i.e. the user) that a computation is correct. The protocol may be interactive, in which case there may be one or more rounds of interactions between the prover and the verifier, or non interactive, in which case the prover sends a proof that the computation is correct.
These protocols incorporate zero-knowledge variants, where the scenario is different. A service performs a computation on date, part of which remaining private (for instance statistics on citizen's incomes). It is possible for the service to prove the correctness of the result without revealing the data (which has to be committed anyway).
Two directions for building these protocols are discrete logarithms (and pairings) in elliptic curves or a coding theoretical setting (originating to the PCP theorem). Both variants admit a zero-knowledge version, and the core of the research is more on provable computation than the zero-knowledge aspect, which comes rather easily in comparison.
8.4.1 Verifiable computation based on coding theory
Participants: Daniel Augot, Hugo Delavenne, Tanguy Medevielle, Élina Roussel.
In the coding theoretic setting, these protocols are made popular, in particular in the blockchain area, under the name of (ZK-)STARKS, Scalable Transparent Arguments of Knowledge, introduced in 2018. The short non interactive proofs are derived for protocols which are called IOPs Interactive Oracle Proofs, which are combination of IPs Interactive Proofs and PCPs Probabilistically Checkable Proofs, for combining the best of both worlds, and making PCPs pratical.
At the core of these protocols lies the following coding problem: how to decide, with high confidence, that a very long ambient word is close to a given code, while looking at very few coordinates of it.
An Interactive Oracle Proof of Proximity (IOPP) has been designed for codes on graphs. The soundness is significantly improved compared to the FRI, the complexity parameters are comparable, the domain of validity is provably better, and there are no restrictions on the field used, enabling to consider new codes to design code-based SNARKs. Under submission.
8.5 Algorithmic number theory
8.5.1 Modular polynomials
Participants: François Morain.
Basic isogeny computations require the use of modular polynomials in two ways. The roots of a modular polynomial first indicate the existence of curves isogenous to the curve of interest. Second, these isogenous curves are computed using explicit formulas involving derivatives of the modular polynomial, as first described by Atkin for two families of modular polynomials. The height of the polynomial is critical, since it is the dominant parameter in the complexity analysis of the various methods used to compute them. In our investigations, we resumed some old work of Fricke, see the two preprints 32 and 33. In particular, new formulas for the final isogeny computation were worked out.
8.5.2 Factoring over number fields
Participants: François Morain.
This is an exploratory topic aiming at transposing classical integer
factoring algorithms into the realm of euclidean number fields. The
traditional strategy to factor an integer of a number field is to
factor its norm over
8.5.3 Cryptographic smooth twins
Participants: Bruno Sterner.
A pair of consecutive integers is a smooth twin
if their product is
In our new work 20, we allow repeated linear factors and some quadratic factors. The overall smoothness probability is either better than or comparable with that of the prior polynomials. Here is a degree-8 example:
We use these polynomials to search for large smooth twins whose sum is prime. We thus find 384 and 512-bit twins with significantly smaller smoothness bounds than those found at EUROCRYPT 2021.
9 Bilateral contracts and grants with industry
9.1 Bilateral contracts with industry
Participants: Daniel Augot, Guénaël Renault, Benjamin Smith.
- Through École polytechnique, Daniel Augot is leader of a teaching and research chair on Blockchains "Blockchains and B2B platforms", funded by CapGemini, NomadicLabs and Caisse des dépôts, under the French patronage laws. This chair aims at fostering teaching and doing research in topics related to blockchains, from the points of view of both computer science and economics. This chair has a co-leader, Julien Prat from the department of economics. This started in 2018, for a five years duration. Another mission of the chair is networking and outreach, (see this website). Sarah Bordage (PhD since 2019) was funded by this chair.
10 Partnerships and cooperations
10.1 International research visitors
10.1.1 Visits of international scientists
Other international visits to the team
Lucien François
-
Status
PhD Student
-
Institution of origin:
University College Dublin
-
Country:
Ireland
-
Dates:
From October 7th 2024 to July 6th 2025.
-
Context of the visit:
Secondment visit in the context of ENCODE Project. The thesis of Lucien François concerns tensor codes i.e. subspaces of tensor products of
finite dimensional vector spaces and decoding problems related to such spaces. - Mobility program/type of mobility:
Neehar Verma
-
Status
PhD Student
-
Institution of origin:
University of Aalto
-
Country:
Finland
-
Dates:
From November 1st 2024 to February 28th 2025.
-
Context of the visit:
Secondment visit in the context of ENCODE Project. The beginning of Neehar Verma's PhD was dedicated to analyzing Private Information Retrieval (PIR) over graph-based distributed storage systems. Following a work of Raviv, Tamo and Yaakobi in 2020, we encode the files of a database, and distribute parts of each encoded file to a set of servers. This file dispersion induces a hypergraph, where the servers are the vertices and each file corresponds to a hyperedge consisting of the subset of servers that contain part of its encoding. Raviv et al. considered 2-replication, and modeled the privacy leakage by means of cycles in the induced graph. We extend their result to (MDS) encoding. We model and quantify the privacy leakage in terms of the presence of polychromatic cycles in the coloured multigraph corrresponding to the induced hypergraph.
- Mobility program/type of mobility:
10.2 European initiatives
10.2.1 Horizon Europe
ENCODE
ENCODE project on cordis.europa.eu
-
Title:
European Network in Coding Theory and Applications
-
Duration:
From March 1, 2023 to February 28, 2027
-
Partners:
- INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET AUTOMATIQUE (INRIA), France
- UNIVERSITY COLLEGE DUBLIN, NATIONAL UNIVERSITY OF IRELAND, DUBLIN (NUID UCD), Ireland
- WORLDLINE (WORLDLINE), France
- INSTITUT POLYTECHNIQUE DE PARIS, France
- Bitwards Oy, Finland
- AALTO KORKEAKOULUSAATIO SR (AALTO), Finland
- UNIVERSITE DE NEUCHATEL (UNINE), Switzerland
- DEUTSCHES ZENTRUM FUR LUFT - UND RAUMFAHRT EV (DLR), Germany
- NXP SEMICONDUCTORS NETHERLANDS BV, Netherlands
- WITHSECURE OYJ (WITHSECURE CORPORATION), Finland
- TECHNISCHE UNIVERSITEIT EINDHOVEN (TU/e), Netherlands
- Roseman Labs B.V. (Roseman Labs), Netherlands
-
Inria contact:
Françoise Levy-dit-Vehel
-
Summary:
Coding theory is a cornerstone of the mathematics of communications. It an interdisciplinary field, lying at the intersection of mathematics, computer science and electrical engineering. It is a fundamental tool of every system of digital communications, with applications to error-correction, distributed storage, wireless communications, secure multi-party computation and post-quantum cryptography. The ENCODE doctoral network will focus on fundamentals and applications of coding theory to security, privacy and efficiency of distributed communication & computation. The DN will leverage the complementary expertise of 7 academic and 5 non-academic partners, to guide its 8 DCs to address and solve deep problems in coding theory and its applications. The DN will offer a superior supervisory experience for each DC, who will each benefit from the expertise of multiple advisors in academia and industry. The non-academic partners include 5 companies working at the cutting edge of cybersecurity, who will offer invaluable contributions to the training programme via hosting of DCs and input in advanced training sessions. DCs will be exposed to current technical challenges faced by industry and will have the opportunity to apply mathematics to tackle real-world problems during industrial secondments. ENCODE will create a unique training programme, designed to equip its DCs with the scientific tools and transferable skills required for them to become future leaders in the field, both in academia and in industry. The ENCODE programme will implement all EC Principles for Innovative Doctoral Training, adhere to best practice as outlined in the EU Charter & Code, the MSCA Green Charter, and ensure gender equality in all aspects of its activities, to create a lasting international, intersectoral, interdisciplinary doctoral network, dedicated to excellence in science, ethical standards & communications that will extend far beyond the DN.
10.3 National initiatives
10.3.1 ANR CIAO
Participants: Benjamin Smith.
ANR CIAO (Cryptography, Isogenies, and Abelian varieties Overwhelming) is a JCJC 2019 project, led by Damien Robert (Inria EP LFANT). This project, which started in October 2019, will examine applications of higher-dimensional abelian varieties in isogeny-based cryptography.
10.3.2 ANR COLA
Participants: Alain Couvreur, Thomas Debris–Alazard.
ANR COLA (An interface between COde and LAttice-based cryptography) is a project from (Appel à projets générique, Défi 9, Liberté et sécurité de l’Europe, de ses citoyens et de ses résidents, Axe 4 ; Cybersécurité). This project (ANR JCJC), starting in october 2021 led by Thomas Debris-Alazard focusses on bringing closer post-quantum solutions based on codes and lattices to improve our trust in cryptanalysis and to open new perspectives in terms of design.
10.3.3 ANR BARRACUDA
Participants: Daniel Augot, Alain Couvreur, Françoise Levy-dit-Vehel.
BARRACUDA is a collaborative ANR project accepted in 2021 and led by Alain Couvreur .
Website : barracuda.inria.fr
The project gathers specialists of coding and cryptology on one hand and specialists of number theory and algebraic geometry on the other hand. The objectives concern problems arising from modern cryptography which require the use of advanced algebra based objects and techniques. It concerns for instance mathematical problems with applications to distributed storage, multi-party computation or zero knowledge proofs for protocols.
10.3.4 ANR SANGRIA
Participants: Olivier Blazy.
SANGRIA is a collaborative ANR project accepted in 2021.
Website : lip6.fr/Damien.Vergnaud/projects/sangria/
The main scientific challenge of the SANGRIA (Secure distributed computAtioN - cryptoGRaphy, combinatorIcs and computer Algebra) project are (1) to construct specific protocols that take into account practical constraints and prove them secure, (2) to implement them and to improve the efficiency of existing protocols significantly. The SANGRIA project (for Secure distributed computAtioN: cryptoGRaphy, combinatorIcs and computer Algebra) aims to undertake research in these two aspects while combining research from cryptography, combinatorics and computer algebra. It is expected to impact central problems in secure distributed computation, while enriching the general landscape of cryptography.
10.3.5 ANR Priva-SiQ
Participants: Benjamin Smith, Olivier Blazy, Thomas Debris–Alazard.
Priva-Siq is a collaborative ANR project accepted in 2023.
Website : anr.fr/Projet-ANR-23-CE39-0008
The Priva SIQ projects aims to manage threats to user-privacy in secure-channel establishment, at all levels. In this project, the goal is to specifically tackle the following threats:
- Interception: Privacy with respect to person-in-the-middle adversaries (exterior to the communication and aiming to track, deanonymize, or identify an endpoint of the channel);
- Subversion: Providing privacy-enhancing countermeasures against mass-surveillance attacks;
- Quantum adversaries: Designing protocols that preserve both user-privacy and security against powerful quantum adversaries.
10.3.6 ANR TRUST
Participants: Olivier Blazy.
Trust is a collaborative ANR project accepted in 2023.
Website : anr.fr/Project-ANR-23-CE39-0009
TRUST focuses on personal data protection measures to meet the objectives of the RGPD but also the texts in preparation such as the "Data Act" or the "Data Governance Act". This project aims to study and develop new security solutions, based on advanced cryptography, for use cases involving the reuse of personal data. These use cases will present various configurations in terms of actors, type of data and processing, opening the way to different technical and legal issues. This is done in order to anticipate legal evolutions and prepare technical architectures to allow the reuse of personal data in compliance with the various legal frameworks.
10.3.7 PEPR sur les technologues quantiques - Projet intégré "Un cadenas post-quantique pour les navigateurs web"
Participants: Alain Couvreur, Thomas Debris–Alazard, Anaëlle Le Dévéhat, Rakhi Pratihar, Antonio Ras, Benjamin Smith.
This projet intégré aims to develop post quantum cryptographic primitives in 5 years which would be implemented in an open source web browser. The evolution of cryptographic standards has already begun. The choice of new primitives will be made soon and the transition should be operated in a few years. The objective of the project is to play a crucial role in this evolution so that french researchers, which are already strongly implied in this process could influence the choice of cryptographic standards in the next years.
10.3.8 Inria AEx CACHAÇA
Participants: Anaëlle Le Dévéhat, Guenaël Renault, Benjamin Smith, Bruno Sterner.
The Action Exploratoire CACHAÇA, led by Benjamin Smith and based at Campus Cyber, started in 2022. CACHAÇA aims to bring high-assurance techniques from formal methods to the initial design and implementation phase for new postquantum cryptosystems, to produce fast, safe, and portable software implementations, especially for constrained environments such as IoT devices. Guenael Renault has associate researcher status, and so CACHAÇA is an anchor-point for collaborations between GRACE and the Secure Components laboratory at ANSSI. It will also englobe GRACE's contribution to planned industrial consortia (expected to begin in 2023).
10.3.9 HYPERFORM
Participants: Olivier Blazy, Guenaël Renault, Benjamin Smith, Bruno Sterner, Alessandro Sferlazza.
Benjamin Smith is coordinating Inria's involvement in the Bpifrance-funded HYPERFORM industrial consortium (2023–2026), which aims to develop a pre- and post-quantum hybrid cryptographic reference platform.
10.4 Public policy support
10.4.1 Regulation
Participants: Daniel Augot.
Daniel Augot participates to a working group jointly managed by ACPR (autorité de contrôle prudentiel et de résolution) and AMF (autorité des marchés financiers). This working group will report on proposals and recommendations for the regulation of smart contracts in the context of decentralized finance (blockchains).
10.4.2 Academia of Science and Technology
Daniel Augot contributed as an expert to a report on blockchains from Académie des sciences et technologies.
10.4.3 Eidas 2
Participants: Olivier Blazy.
Olivier Blazy participates to working groups supervised by the European commission around the implementation of the new European digital identity and wallet.
11 Dissemination
11.1 Promoting scientific activities
11.1.1 Scientific events: organisation
- Daniel Augot and Alain Couvreur organised the second Encode Training School for ENCODE project at Institut Henri Poincaré from April 29 to may 3rd 2024. This workshop was a sequence of mini-lectures and discussion dedicated to the training of the ENCODE PhD students.
Member of the organizing committees
- Benjamin Smith was lightning talks chair at ANTS-XVI.
11.1.2 Scientific events: selection
Member of the conference program committees
- Alain Couvreur served on the program committees of
-
Daniel Augot
served on the program committee of
- WCC 2024 (workshop on Coding and Cryptography);
- CBT 2024 (International Workshop on Cryptocurrencies and Blockchain Technology)
- ESORICS 2024 (European Symposium on Research in Computer Security)
- WTSC 24 (Workshop on Trusted Smart Contracts);
- ICBC 2024 (IEEE International Conference on Blockchain and Cryptocurrency)
-
Benjamin Smith
served on the program committees of
- ANTS-XVIANTS-XVI (16th Algorithmic Number Theory Symposium)
- SAC 2024 (Selected Areas in Cryptography)
- CT-RSA 2025
- PQCrypto 2025
- Olivier Blazy served on the program committees of
Reviewer
- Alain Couvreur was external reviewer for the conferences
- Thomas Debris–Alazard was external reviewer for the conferences
- François Morain was external reviewer for the conferences
- Daniel Augot was external reviewer for
-
Benjamin Smith
was an external reviewer for
- ISIT 2024;
- AGC2T 2023 (post-proceedings);
- ASIACRYPT 2024;
- FSTTCS 2024.
- Bruno Sterner was external reviewer for
11.1.3 Journal
Member of the editorial boards
- Alain Couvreur is associate editor in the journals
- Thomas Debris–Alazard has been guest editor for a special issue dedicated to coding theory in the journal Designs, Codes and Cryptography.
- Benjamin Smith is a member of the editorial board for IACR Communications in Cryptology.
- Olivier Blazy is a member of the editorial board for Computer law and security reviews
Reviewer - reviewing activities
- Alain Couvreur was reviewer for the journals:
-
Rakhi Pratihar
was reviewer for the journals:
- Journal of Algebra and its applications;
- Designs Codes and Cryptography;
- Combinatorial Theory
- Benjamin Smith was reviewer for Mathematics of Computation.
- Bruno Sterner was reviewer for Designs, Codes and Cryptography.
11.1.4 Invited talks
-
Olivier Blazy
was an invited speaker at
- SAC 2024
- Stanford Cyber Policy Center Spring Seminar
- Alain Couvreur gave a talk at the Algebraic Coding Theory session at the joint AMS-UMI workshop 2024 in Palermo.
- Thomas Debris–Alazard was invited speaker at:
- Rakhi Pratihar gave invited talks at
- Benjamin Smith was an invited speaker at
11.1.5 Leadership within the scientific community
- Olivier Blazy and Alain Couvreur were co-responsible of the Groupe de Travail Codes et Cryptographie (C2) of the GdR's Informatique Mathématiques and Sécurité Informatique.
11.1.6 Scientific expertise
- Alain Couvreur was evaluator for the Cum Laude Judicum (an exceptional award for the PhD degree) for TUe (Eindhoven).
- Olivier Blazy was evaluator for the Horizon Cybersecurity Call CL3-CS-01
- Benjamin Smith is a member of the Comité de Pilotage, Stratégie Nationale Quantique (volet Normalisation)
11.1.7 Research administration
- Daniel Augot was member of a recruiting committee (Comité de sélection) for a Chargé de conférences at University of Bordeaux.
- Daniel Augot was member of a recruiting committee (Comité de sélection) for a Chargé de conférences at University of Grenoble.
- Olivier Blazy was a member of recruitment committees for Mâitre de conférences positions in Amiens, and Clermont-Ferrand.
- Olivier Blazy was president of the recruitement committee for Professor at Ecole polytechnique.
- Alain Couvreur is elected member of Inria's Commission d'Évaluation. He served in the recruitment jury CRCN centre Inria de Lille.
- Alain Couvreur is coordinator for Inria of the Axis PQ-TLS of PEPR quantique and in charge of the work package on code-based cryptography with Philippe Gaborit (University of Limoges).
- Alain Couvreur was member of a recruiting committee (Comité de sélection) for a Chaire de Professeur Junior at University of Rennes.
- François Morain is a member of the Board of Master Parisien de Recherche en Informatique (MPRI).
- François Morain is a member of the board of the Cybersecurity track in the CS Master of IPParis.
- François Morain represents the axis networks and security at the "conseil de direction" of LIX.
- Benjamin Smith was a member of a recruitment committee (Comité de sélection) for a Mâitre de conférences position at the University of Nancy.
- Benjamin Smith is co-leader of the PEPR PQ-TLS work package on isogeny-based cryptography with Benjamin Wesolowski (CNRS).
- Benjamin Smith is the Inria coordinator for the HYPERFORM industrial consortium.
11.2 Teaching - Supervision - Juries
11.2.1 Teaching
- Licence:
- Olivier Blazy : CSE101: Introduction to Computer Programming (Tutorials), 31.5h, L1, École polytechnique, France
- Maxime Bombar : INF361: Introduction à l'informatique (tutorials), 40h (equiv TD), 1st year (L3), École polytechnique.
- Thomas Debris–Alazard , Exercises for INF361: “Introduction à l'informatique”, 15h (equiv TD), 1st year (L3), École polytechnique.
- François Morain , Lectures for INF361: “Introduction à l'informatique”, 15h (equiv TD), 1st year (L3), École polytechnique. Coordinator of this module (350 students).
- Bruno Sterner , Tutorials for CSE103: Introduction to Algorithms, 28h, L1, École polytechnique.
- Master:
- Daniel Augot designed with Julien Prat the cursus of a course in blockchains and economics, and made lectures on zero-knowledge.
- Master : Olivier Blazy : Lectures and Labs for Authentification, VPN et Chiffrement, 6h, M2, Telecom Sud Paris, France
- Thomas Debris–Alazard : Lectures for CSC_51063_EP: “Information Theory”, 36h, M1, École Polytechnique
- Thomas Debris–Alazard : Lectures for INF563: “Information Theory”, 36h, M1, École Polytechnique
- Thomas Debris–Alazard : Lectures for MDC_51002_EP: “Quantum Information and Computing”, 18h, M1, École Polytechnique
- Thomas Debris–Alazard : Lectures for INF587: “Introduction to quantum computer science”, 36h, École polytechnique.
- Alain Couvreur and Thomas Debris–Alazard : Lectures in MPRI 2-13-2: Error Correcting codes and applications to cryptography
- François Morain , INF558, Lectures and labs Introduction to cryptology, 36h, M1, École Polytechnique
- Françoise Levy-dit-Vehel , Lectures on discrete maths, 21h, M1, ENSTA
- Françoise Levy-dit-Vehel , Lectures on cryptography, 24h, M2, ENSTA.
- Matthieu Lequesne , INF558, labs Introduction to cryptology, 36h, M1, École Polytechnique
- Guenaël Renault : Lectures and Labs for INF565: Information Systems Security, 60h, M1, École polytechnique, France
- Guenaël Renault : Lectures and Labs for INF648: Embedded security: side-channel attacks; javacard, 60h, M2, École polytechnique, France
- Master : Guenaël Renault : Coordinator for INF637: Reverse engineering vs Obfuscation, 2h, M2, École polytechnique, France
- Benjamin Smith : INF568: Advanced Cryptography, 45h, M1, École polytechnique, France
- Benjamin Smith : MPRI 2-12-2: Algorithmes Arithmétiques pour la Cryptologie, 22.5h, M2, Master Parisien de Recherche en Informatique, France.
- Daniel Augot : Structures de données distribuées, avec un focus sur les blockchains (2024-2025), 8h, M1 École polytechnique
11.2.2 Supervision
- Martino Borello advised the Master Project of Valentina Astore.
- Françoise Levy-dit-Vehel advised the Cybersecurity M2 IP Paris Internship of Elouan Gros on “Private Information Retrieval with Resut Verification”.
-
Benjamin Smith
supervised
- Alessandro Sferlazza 's M2 internship (SNS Pisa)
- Pauline Vinchon 's M1 internship (ENSTA)
- Cezara Petrui 's Bachelor Thesis (École polytechnique Bachelor, L3)
- Hongjie Zhang 's Executive MSc&T Cybersecurity masters project (Renault and École polytechnique)
- Luc Papadopoulos 's Executive MSc&T Cybersecurity masters project (Crédit Agricole and École polytechnique)
- Franck Wetie 's Executive MSc&T Cybersecurity masters project (École polytechnique)
11.2.3 Juries
-
Alain Couvreur
was referee for the PhD theses of
- Victor Dyseryn (Univerity of Limoges);
- Antoine Leudière (University of Lorraine).
- Alain Couvreur was president of the jury for the PhD thesis of Quyen Ngyen (University of Caen);
- Alain Couvreur was jury member for the HDR of Martin Weimann (University of Caen);
- Daniel Augot was jury member of the thesis of Karima Maklouf (Institut Polytechnique de Paris)
-
Daniel Augot
was reviewer of the following theses:
- Loïc Demange (Sorbonne Université)
- Thomas Lavaur (Université de Toulouse)
-
Benjamin Smith
was referee for the PhDs of
- Marc Houben (Leiden Universiteit, Netherlands)
- Jonathan Komada Eriksen (NTNU Trondheim, Norway)
-
Thomas Debris–Alazard
was jury member for the PhD theses:
- Pouria Fallahpour (ENS Lyon);
- Étienne Burle (Université of Rouen).
-
Olivier Blazy
was president for the PhD theses:
- Thibaut Jacques (Université de Limoges)
- Charles Olivier-Anclin (Université de Clermont-Ferrand)
- Hugo Beguinet (Ecole Normale Supérieure)
-
Olivier Blazy
was reviewer for the PhD theses:
- Corentin Jeudy (Université de Rennes)
- Calvin Abou Haidar (École normale supérieure de Lyon)
- Colin Putman (Royal Holloway London)
11.3 Popularization
11.3.1 Productions (articles, videos, podcasts, serious games, ...)
-
Nadja Aoutouf
and Nihan Tanısalı
are
Encode members and
published two YouTube videos about Coding Theory
- YouTube channel AliceandBob
- Coding Theory (Part 1/2)
- Coding Theory (Part 2/2)
11.3.2 Participation in Live events
- Benjamin Smith was a panel member for the Webinar Forum InCyber – ONE ConferenceYour Cryptography Will Be Broken. Prepare now! A NL-FR exchange of views at Campus Cyber, La Défense Paris.
11.3.3 Others science outreach relevant activities
Participants: Daniel Augot, Christophe Levrat, Pierre Loisel.
We received a whole afternoon the whole promotion of M1 students of University of Versailles Saint-Quentin, to introduce them to cryptography, coding and INRIA.
12 Scientific production
12.1 Major publications
- 1 articleEfficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes.Designs, Codes and Cryptography2022HALDOI
- 2 proceedingsG.Gustavo Banegas, K.Koen Zandberg, E.Emmanuel Baccelli, A.Adrian Herrmann and B.Benjamin Smith, eds. Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices.13269Lecture Notes in Computer ScienceSpringer International PublishingJune 2022, 872-891HALDOI
- 3 inproceedingsHow fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.USENIX 2023 - The 32nd USENIX Security SymposiumUSENIX 2023 - The 32nd USENIX Security SymposiumAnaheim, United StatesAugust 2023HAL
- 4 inproceedingsOn Codes and Learning With Errors over Function Fields.Lecture Notes in Computer ScienceCRYPTO 202213508Advances in Cryptology – CRYPTO 2022Santa Barbara (CA), United StatesSpringer Nature SwitzerlandOctober 2022, 513-540HALDOI
- 5 articleAn Algorithmic Reduction Theory for Binary Codes: LLL and more.IEEE Transactions on Information TheoryJanuary 2022HALDOI
- 6 inproceedingsEfficient Proofs of Retrievability using Expander Codes.Cryptography and Network Security, CANS 2022Abu Dhabi, United Arab EmiratesNovember 2022HAL
- 7 articleDeterministic factoring with oracles.Applicable Algebra in Engineering, Communication and ComputingSeptember 2021HALDOI
12.2 Publications of the year
International journals
- 8 articleOuter strong blocking sets.The Electronic Journal of CombinatoricsMarch 2024. In press. HAL
- 9 articleA proof of the Brill-Noether method from scratch.ACM Communications in Computer Algebra574March 2024, 200-229HALDOI
- 10 articleThe geometry of intersecting codes and applications to additive combinatorics and factorization theory.Journal of Combinatorial Theory, Series A2025. In press. HAL
- 11 articleNew Solutions to Delsarte’s Dual Linear Programs.IEEE Transactions on Information Theory711January 2025, 297-316HALDOI
-
12
articleEfficient
-isogenies on fast Kummer surfaces.Research in Number Theory111January 2025, 25HALDOIback to text - 13 articleQuantum State Synthesis: Relation with Decision Complexity Classes and Impossibility of Synthesis Error Reduction.Quantum Information & Computation249&10July 2024, 745-765HALDOI
International peer-reviewed conferences
- 14 inproceedingsMinRank Gabidulin Encryption Scheme on Matrix Codes.Lecture Notes in Computer ScienceASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information SecurityLNCS-15487Advances in Cryptology – ASIACRYPT 2024KOLKATA, IndiaSpringer Nature SingaporeDecember 2024, 68-100HALDOI
- 15 inproceedingsCryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs.Progress in Cryptology - AFRICACRYPT 2024AFRICACRYPT 2024 - 15th International Conference on Cryptology14861Lecture Notes in Computer ScienceDouala, CameroonSpringer Nature Singapore2024, In pressHAL
- 16 inproceedingsFOLEAGE: F 4 OLE-Based Multi-Party Computation for Boolean Circuits.Advances in Cryptology – ASIACRYPT 2024ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security15489Lecture Notes in Computer ScienceKolkata, IndiaSpringer Nature SingaporeDecember 2024, 69-101HALDOIback to text
- 17 inproceedingsOn the Properties of the Ortho-Derivatives of Quadratic Functions.WCC 2024 - The Thirteenth International Workshop on Coding and CryptographyPerugia, ItalyJune 2024HAL
- 18 inproceedingsQuantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs.STOC 2024 - 56th Annual ACM Symposium on Theory of ComputingVancouver BC, CanadaACMJune 2024, 423-434HALDOIback to text
- 19 inproceedingsExploiting Signature Leakages: Breaking Enhanced pqsigRM.2024 IEEE International Symposium on Information Theory (ISIT)Athens, FranceIEEEJuly 2024, 2903-2908HALDOI
- 20 inproceedingsTowards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications.Selected Areas in Cryptography SAC 2024Montreal (Canada), CanadaAugust 2024HALback to text
Conferences without proceedings
- 21 inproceedingsUpdatable Encryption from Group Actions.PQCOxford, United KingdomJune 2024HAL
Edition (books, proceedings, special issue of a journal)
- 22 proceedingsSelected Areas in Cryptography: 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers.SAC 2022 - International Conference on Selected Areas in CryptographyLNCS-13742Selected Areas in CryptographySpringer International Publishing; Springer2024HALDOI
Doctoral dissertations and habilitation theses
- 23 thesisMultiparty Computation from the Hardness of Coding Theory.Université Paris CitéNovember 2024HALback to text
Reports & preprints
- 24 miscA geometric invariant of linear rank-metric codes.January 2025HAL
- 25 miscThe geometry of covering codes in the sum-rank metric.2024HAL
- 26 miscDecoding rank metric Reed-Muller codes.January 2025HALback to text
- 27 miscOn the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis.December 2024HAL
-
28
miscFreiman's
Theorem for Function Fields.September 2024HALback to text - 29 miscInteractive Oracle Proofs of Proximity to Codes on Graphs.2025HAL
-
30
miscHigher weight spectra and Betti numbers of Reed-Muller codes
.January 2025HAL -
31
miscHomotopy type of shellable
-complexes and their homology groups.March 2024HAL - 32 miscUsing Fricke modular polynomials to compute isogenies.February 2024HALback to text
- 33 miscUsing modular polynomials for eta products to compute isogenies.January 2024HALback to text
- 34 miscA lattice framework for generalizing shellable complexes and matroids.July 2024HAL
- 35 miscDihedral Quantum Codes.May 2024HAL
12.3 Cited publications
- 36 articleRank-metric codes over arbitrary Galois extensions and rank analogues of Reed-Muller codes.SIAM Journal on Applied Algebra and Geometry5226 pages, 1 figureJanuary 2021, 165-199HALDOIback to text
- 37 inproceedingsEfficient Multiparty Protocols Using Circuit Randomization.Advances in Cryptology --- CRYPTO '91Berlin, HeidelbergSpringer Berlin Heidelberg1992, 420--432back to text
- 38 inproceedingsCorrelated Pseudorandomness from the Hardness of Quasi-Abelian Decoding.Lecture Notes in Computer ScienceLNCS-14084Advances in Cryptology -- CRYPTO 2023Santa Barbara, United StatesSpringer Nature SwitzerlandAugust 2023, 567-601HALDOIback to text
- 39 articleAmortized efficient zk-SNARK from linear-only RLWE encodings.J. Comm. Netw.2023back to text
- 40 articleRinocchio: SNARKs for Ring Arithmetic.J. Cryptol.2023back to text
- 41 inproceedingsLattice-Based ZK-SNARKs from Square Span Programs.CCS2018back to text
- 42 inproceedingsShorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices.CCS2021back to text
- 43 inproceedingsPost-Quantum zk-SNARK for Arithmetic Circuits using QAPs.AsiaJCIS2020back to text
- 44 articleOn Lattices, Learning with Errors, Random Linear Codes, and Cryptography.J. ACM2009back to textback to text
- 45 miscPrivate Re-Randomization for Module LWE and Applications to Quasi-Optimal ZK-SNARKs.Available at https://eprint.iacr.org/2022/16902022back to text