Members
Overall Objectives
Research Program
Application Domains
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
C. Boura, A. Canteaut, C. De Cannière.
Higher-Order Differential Properties of Keccak and Luffa, in: Fast Software Encryption - FSE 2011, LNCS, Springer, 2011, vol. 6733, pp. 252-269.
[2]
A. Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, J.-R. Reinhard, C. Thuillet, M. Videau.
Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, October 2008, Submission to NIST.
[3]
P. Charpin, G. Gong.
Hyperbent functions, Kloosterman sums and Dickson polynomials, in: IEEE Transactions on Information Theory, September 2008, vol. 54, no 9, pp. 4230-4238, Regular paper.
[4]
P. Charpin, T. Helleseth, V. Zinoviev.
Divisibility properties of classical binary Kloosterman sums, in: Discrete Mathematics, June 2009, vol. 309, no 12, pp. 3975-3984.
[5]
N. Courtois, M. Finiasz, N. Sendrier.
How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174.
[6]
F. Didier, J.-P. Tillich.
Computing the algebraic immunity efficiently, in: Fast Software Encryption - FSE 2006, LNCS, Springer, 2006, vol. 4047, pp. 359-374.
[7]
J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich.
Algebraic Cryptanalysis of McEliece Variants with Compact Keys, in: Advances in Cryptology - EUROCRYPT 2010, LNCS, Springer, 2010, no 6110, pp. 279-298.
http://dx.doi.org/10.1007/978-3-642-13190-5_14
[8]
R. Overbeck, N. Sendrier.
Code-based cryptography, in: Post-Quantum Cryptography, Springer, 2009, pp. 95-145.
Publications of the year

Doctoral Dissertations and Habilitation Theses

[9]
M. Abbara.
Turbo-codes quantiques, Ecole Polytechnique X, April 2013.
http://hal.inria.fr/pastel-00842327
[10]
R. Misoczki.
Two Approaches for Achieving Efficient Code-Based Cryptosystems, Université Pierre et Marie Curie - Paris VI, November 2013.
http://hal.inria.fr/tel-00931811

Articles in International Peer-Reviewed Journals

[11]
C. Boura, A. Canteaut.
On the Influence of the Algebraic Degree of F-1 on the Algebraic Degree of G F, in: IEEE Transactions on Information Theory, January 2013, vol. 59, no 1, pp. 691-702. [ DOI : 10.1109/TIT.2012.2214203 ]
http://hal.inria.fr/hal-00738398
[12]
J.-C. Faugère, V. Gauthier-Umana, A. Otmani, L. Perret, J.-P. Tillich.
A Distinguisher for High Rate McEliece Cryptosystems, in: IEEE Transactions on Information Theory, June 2013, vol. 59, no 10, pp. 6830-6844. [ DOI : 10.1109/TIT.2013.2272036 ]
http://hal.inria.fr/hal-00776068
[13]
T. Fritz, A. B. Sainz, R. Augusiak, J. B. Brask, R. Chaves, A. Leverrier, A. Acín.
Local orthogonality as a multipartite principle for quantum correlations, in: Nature Communications, August 2013, vol. 4. [ DOI : 10.1038/NCOMMS3263 ]
http://hal.inria.fr/hal-00917114
[14]
J. Jean, M. Naya-Plasencia, T. Peyrin.
Improved Cryptanalysis of AES-like Permutations, in: Journal of Cryptology, July 2013.
http://hal.inria.fr/hal-00907706
[15]
P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, E. Diamanti.
Experimental demonstration of long-distance continuous-variable quantum key distribution, in: Nature Photonics, 2013, vol. 7, pp. 378-381. [ DOI : 10.1038/nphoton.2013.63 ]
http://hal.inria.fr/hal-00798855
[16]
G. Kyureghyan, V. Suder.
On inversion in Z_2⌃n-1, in: Finite Fields and Their Applications, January 2014, vol. 25, pp. 234-254.
http://hal.inria.fr/hal-00879490
[17]
A. Leverrier, R. García-Patrón, R. Renner, N. J. Cerf.
Security of Continuous-Variable Quantum Key Distribution Against General Attacks, in: Physical Review Letters, January 2013, vol. 110, no 3. [ DOI : 10.1103/PHYSREVLETT.110.030502 ]
http://hal.inria.fr/hal-00917115
[18]
S. Pironio, L. Masanes, A. Leverrier, A. Acín.
Security of Device-Independent Quantum Key Distribution in the Bounded-Quantum-Storage Model, in: Physical Review X, July 2013, vol. 3, no 3. [ DOI : 10.1103/PHYSREVX.3.031007 ]
http://hal.inria.fr/hal-00917113
[19]
J.-P. Tillich, G. Zémor.
Quantum LDPC codes with positive rate and minimum distance proportional to the square root of the blocklength, in: IEEE Transactions on Information Theory, 2014, à paraître.
http://hal.inria.fr/hal-00931764

Invited Conferences

[20]
A. Canteaut.
Comment concevoir un algorithme de chiffrement sûr et efficace, in: Forum des jeunes mathématicien-ne-s 2013, Lyon, France, November 2013.
http://hal.inria.fr/hal-00931566
[21]
A. Canteaut.
Extended differential properties of cryptographic functions, in: The 11th International Conference on Finite Fields and their Applications - Fq11, Magdeburg, Germany, July 2013.
http://hal.inria.fr/hal-00859027
[22]
A. Canteaut.
Foundations of cryptanalysis: On Boolean functions, in: Icebreak 2013, Reykjavik, Ireland, June 2013.
http://hal.inria.fr/hal-00931689
[23]
A. Canteaut.
On some algebraic properties of Keccak, in: Keccak & SHA-3 Day, Bruxelles, Belgium, March 2013.
http://hal.inria.fr/hal-00807475
[24]
A. Canteaut.
Similarities between Encryption and Decryption: How far can we go?, in: Selected Areas in Cryptography - SAC 2013, Vancouver, Canada, LNCS, Springer, August 2013.
http://hal.inria.fr/hal-00858933
[25]
A. Canteaut.
Stream cipher cryptanalysis, in: Icebreak 2013, Reykjavik, Iceland, June 2013.
http://hal.inria.fr/hal-00931697
[26]
A. Chailloux, S. Giannicola.
Parallel Repetition of Entangled Games with Exponential Decay via the Superposed Information Cost, in: QIP 2014 - Quantum Information Processing, Barcelona, Spain, February 2014.
http://hal.inria.fr/hal-00927544
[27]
A. Leverrier.
A Combinatorial Approach to Nonlocality and Contextuality, in: Quo Vadis, Quantum Physics?, Natal, Brazil, 2013.
http://hal.inria.fr/hal-00931941
[28]
A. Leverrier.
Does Boson Sampling need Fault-Tolerance?, in: Journées Informatique Quantique 2013, Nancy, France, October 2013.
http://hal.inria.fr/hal-00932345
[29]
A. Leverrier.
Security of continuous-variable quantum key distribution against general attacks, in: APS March Meeting 2013, Baltimore, United States, March 2013.
http://hal.inria.fr/hal-00926300
[30]
M. Naya-Plasencia.
"Meet-in-the-middle" through an Sbox, in: ESC 2013 - Early Symmetric Crypto seminar, Luxembourg, January 2013.
http://hal.inria.fr/hal-00907735
[31]
M. Naya-Plasencia.
Cryptanalysis of lightweight block ciphers, in: Summer school on Design and Security of Cryptographic Functions, Algorithms and Devices, Albena, Bulgaria, July 2013.
http://hal.inria.fr/hal-00933553
[32]
M. Naya-Plasencia.
First practical results on reduced-round Keccak and Unaligned rebound attack, in: Keccak & SHA-3 Day, Bruxelles, Belgium, March 2013.
http://hal.inria.fr/hal-00907715
[33]
N. Sendrier.
An Introduction to Code Based Cryptography, in: 2013 Indian National Workshop on Cryptology, Delhi, India, October 2013.
http://hal.inria.fr/hal-00932120
[34]
N. Sendrier.
Classical algorithm techniques for decoding generic linear codes, in: Dagstuhl Seminar 13371, Quantum Cryptanalysis, Dagstuhl, Germany, September 2013.
http://hal.inria.fr/hal-00864837
[35]
N. Sendrier.
The Construction of Code-Based Cryptosystems, in: Fourteenth IMA International Conference on Cryptography and Coding, Oxford, United Kingdom, December 2013.
http://hal.inria.fr/hal-00932115

International Conferences with Proceedings

[36]
C. Boura, A. Canteaut.
A new criterion for avoiding the propagation of linear relations through an Sbox, in: FSE 2013 - Fast Software Encryption, Singapour, Singapore, Lecture Notes in Computer Science, Springer, January 2014.
http://hal.inria.fr/hal-00931535
[37]
A. Canteaut, M. Naya-Plasencia, B. Vayssière.
Sieve-in-the-Middle: Improved MITM Attacks, in: CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, United States, R. Canetti, J. A. Garay (editors), Lecture Notes in Computer Science, Springer, June 2013, vol. 8042, pp. 222-240. [ DOI : 10.1007/978-3-642-40041-4_13 ]
http://hal.inria.fr/hal-00857358
[38]
A. Couvreur, P. Gaborit, V. Gautier, A. Otmani, J.-P. Tillich.
Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes, in: WCC 2013 - International Workshop on Coding and Cryptography, Bergen, Norway, Selmer Center at the University of Bergen, Norway and Inria, Rocquencourt, France, 2013, pp. 181-193.
http://hal.inria.fr/hal-00830594
[39]
A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: EUROCRYPT 2014, Copenhagen, Denmark, 2014, à paraître.
http://hal.inria.fr/hal-00931774
[40]
L. Gaspar, G. Leurent, F.-X. Standaert.
Hardware Implementation and Side-Channel Analysis of Lapin, in: CT-RSA 2014, San Francisco, United States, J. Benaloh (editor), February 2014.
http://hal.inria.fr/hal-00934054
[41]
B. Gérard, V. Grosso, M. Naya-Plasencia, F.-X. Standaert.
Block Ciphers that are Easier to Mask: How Far Can we Go?, in: CHES 2013, Santa Barbara, United States, Springer, 2013, vol. 8086, pp. 383-399.
http://hal.inria.fr/hal-00907727
[42]
J. Jean, M. Naya-Plasencia, T. Peyrin.
Multiple Limited-Birthday Distinguishers and Applications, in: Selected Areas in Cryptography - SAC 2013, Vancouver, Canada, August 2013, To appear.
http://hal.inria.fr/hal-00870452
[43]
G. Landais, J.-P. Tillich.
An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes, in: PQCrypto 2013, Limoges, France, P. Gaborit (editor), LNCS 7932, Springer, 2013, pp. 102-117. [ DOI : 10.1007/978-3-642-38616-9_7 ]
http://hal.inria.fr/hal-00880654
[44]
D. Maurice, J.-P. Tillich, I. Andriyanova.
A family of quantum codes with performances close to the hashing bound under iterative decoding, in: ISIT 2013 - IEEE International Symposium on Information Theory, Turkey, IEEE, July 2013, pp. 907-914.
http://hal.inria.fr/hal-00862460
[45]
R. Misoczki, J.-P. Tillich, P. S. L. M. Barreto, N. Sendrier.
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: ISIT 2013 - IEEE International Symposium on Information Theory, Istanbul, Turkey, July 2013.
http://hal.inria.fr/hal-00870929
[46]
N. Sendrier, D. E. Simos.
How easy is code equivalence over Fq?, in: WCC 2013 - International Workshop on Coding and Cryptography, Bergen, Norway, April 2013.
http://hal.inria.fr/hal-00790861
[47]
N. Sendrier, D. E. Simos.
The Hardness of Code Equivalence over mathbfF_q and its Application to Code-based Cryptography, in: PQCrypto 2013, Limoges, France, P. Gaborit (editor), LNCS, Springer, June 2013, vol. 7932, pp. 203-216. [ DOI : 10.1007/978-3-642-38616-9 ]
http://hal.inria.fr/hal-00863598

Conferences without Proceedings

[48]
A. Canteaut, J. Roué.
Amélioration des critères de résistance aux attaques différentielles, in: Forum des jeunes mathématicien-ne-s 2013, Lyon, France, November 2013.
http://hal.inria.fr/hal-00931561
[49]
V. Lallemand.
Cryptanalysis of KLEIN, in: Icebreak 2013, Reykjavik, Iceland, June 2013.
http://hal.inria.fr/hal-00931699
[50]
G. Landais.
Information Set Decoding Implementation, in: Fourth Code-based Cryptography Workshop 2013, Rocquencourt, France, June 2013.
http://hal.inria.fr/hal-00931673
[51]
V. Suder, G. Kyureghyan.
On Inversion in Z_2⌃n-1, in: The 11th International Conference on Finite Fields and their Applications, Magdeburg, Germany, July 2013.
http://hal.inria.fr/hal-00931646
[52]
J.-P. Tillich.
Survey on attacks against structured alternant codes (part 1), in: CBC 2013 - Fourth Code-based Cryptography Workshop, Rocquencourt, France, June 2013.
http://hal.inria.fr/hal-00931777
[53]
J.-P. Tillich.
Survey on attacks against structured alternant codes (part 2), in: CBC 2013 - Fourth Code-based Cryptography Workshop, Rocquencourt, France, June 2013.
http://hal.inria.fr/hal-00931779

Scientific Books (or Scientific Book chapters)

[54]
P. Charpin.
PN and APN functions, in: Handbook of Finite Fields, G. Mullen, D. Panario (editors), Discrete Mathematics and Its Applications, Chapman and Hall/CRC Press, June 2013.
http://hal.inria.fr/hal-00932157
[55]
G. Kyureghyan.
Special mappings of finite fields, in: Finite Fields and Their Applications. Character Sums and Polynomials, P. Charpin, A. Pott, A. Winterhof (editors), Radon Series on Computational and applied mathematics, De Gruyter, May 2013, vol. 11, pp. 117-144.
http://hal.inria.fr/hal-00931607

Books or Proceedings Editing

[56]
D. Augot, A. Canteaut, G. Kyureghyan, F. Solov'Eva, Ø. Ytrehus (editors)
Designs, Codes and Cryptography (Special Issue in Coding and Cryptography), Springer, January 2013, vol. 66, 399 p.
http://hal.inria.fr/hal-00931522
[57]
P. Charpin, A. Pott, A. Winterhof (editors)
Finite Fields and Their Applications - Character Sums and Polynomials, Radon Series on Computational and applied mathematics, De Gruyter, May 2013, vol. 11, 274 p.
http://hal.inria.fr/hal-00931614

Other Publications

[58]
C. Boura, A. Canteaut.
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version), April 2013, IACR Cryptology ePrint Archive 2013/211.
http://hal.inria.fr/hal-00859030
[59]
A. Canteaut, M. Naya-Plasencia, B. Vayssière.
Sieve-in-the-Middle: Improved MITM Attacks (Full Version), May 2013, IACR Cryptology ePrint Archive 2013/324.
http://hal.inria.fr/hal-00857369
[60]
A. Chailloux, S. Giannicola.
Parallel Repetition of entangled games on the uniform distribution, in: Journées d'Informatique Quantique, Nancy, France, October 2013, Journées d'Informatique Quantique, Présentation.
http://hal.inria.fr/hal-00934611
[61]
A. Chailloux, G. Gutoski, J. Sikora.
Optimal bounds for quantum weak oblivious transfer, 2013, arXiv:1310.3262 [quant-ph].
http://hal.inria.fr/hal-00927537
[62]
P. Charpin, G. Kyureghyan.
A note on verifying the APN property, August 2013, IACR Cryptology ePrint Archive 2013/475.
http://hal.inria.fr/hal-00932161
[63]
A. Couvreur, A. Otmani, J.-P. Tillich.
New Identities Relating Wild Goppa Codes, 2013.
http://hal.inria.fr/hal-00880994
[64]
N. Delfosse, J.-P. Tillich.
A decoding algorithm for CSS codes using the X/Z correlations, 2014.
http://hal.inria.fr/hal-00937128
[65]
T. Fritz, A. Leverrier, A. B. Sainz.
Probabilistic models on contextuality scenarios, 2013, To be published in the proceedings of Quantum Physics and Logic (QPL, 2013). Overview and discussion of the results in arXiv:1212.4084.
http://hal.inria.fr/hal-00931584
[66]
V. Lallemand.
Amélioration des attaques différentielles sur KLEIN, Université de Limoges, September 2013.
http://hal.inria.fr/hal-00931253
[67]
A. Leverrier, R. García-Patrón.
Does Boson Sampling need Fault-Tolerance?, 2013.
http://hal.inria.fr/hal-00931587
[68]
A. B. Sainz, T. Fritz, R. Augusiak, J. B. Brask, R. Chaves, A. Leverrier, A. Acín.
Exploring the Local Orthogonality Principle, 2013.
http://hal.inria.fr/hal-00931591