Members
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
N. Brunie.
Contributions to computer arithmetic and applications to embedded systems, Ecole Normale Supérieure de Lyon, May 2014.
https://tel.archives-ouvertes.fr/tel-01078204
[2]
A. Langlois.
Lattice-Based Cryptography: Security Foundations and Constructions, ENS Lyon, October 2014.
https://hal.archives-ouvertes.fr/tel-01092130
[3]
C. Pernet.
High Performance and Reliable Algebraic Computing, Université Joseph Fourier, Grenoble 1, November 2014, Habilitation à diriger des recherches.
https://tel.archives-ouvertes.fr/tel-01094212
[4]
P. Théveny.
Numerical Quality and High Performance in Interval Linear Algebra on Multi-Core Processors, ENS Lyon, October 2014.
https://hal.inria.fr/tel-01107447

Articles in International Peer-Reviewed Journals

[5]
M. Bardet, J.-C. Faugère, B. Salvy.
On the complexity of the F5 Gröbner basis algorithm, in: Journal of Symbolic Computation, September 2014, pp. 1-24. [ DOI : 10.1016/j.jsc.2014.09.025 ]
https://hal.inria.fr/hal-01064519
[6]
A. Bostan, K. Raschel, B. Salvy.
Non-D-finite excursions in the quarter plane, in: Journal of Combinatorial Theory, Series A, January 2014, vol. 121, pp. 45-63. [ DOI : 10.1016/j.jcta.2013.09.005 ]
https://hal.archives-ouvertes.fr/hal-00697386
[7]
S. Graillat, V. Lefèvre, J.-M. Muller.
On the maximum relative error when computing integer powers by iterated multiplications in floating-point arithmetic, in: Numerical Algorithms, 2015, 15 p, forthcoming.
https://hal-ens-lyon.archives-ouvertes.fr/ensl-00945033
[8]
A. Langlois, D. Stehlé.
Worst-case to average-case reductions for module lattices, in: Designs, Codes and Cryptography, 2014, 35 p.
https://hal.archives-ouvertes.fr/hal-01091291
[9]
C. Ling, L. Luzzi, J.-C. Belfiore, D. Stehlé.
Semantically Secure Lattice Codes for the Gaussian Wiretap Channel, in: Information Theory, IEEE Transactions on, 2014, 18 p.
https://hal.archives-ouvertes.fr/hal-01091295
[10]
É. Martin-Dorel, G. Hanrot, M. Mayero, L. Théry.
Formally verified certificate checkers for hardest-to-round computation, in: Journal of Automated Reasoning, 2015, vol. 54, no 1, pp. 1-29. [ DOI : 10.1007/s10817-014-9312-2 ]
https://hal.inria.fr/hal-00919498
[11]
J.-M. Muller.
On the error of Computing ab + cd using Cornea, Harrison and Tang's method, in: ACM Transactions on Mathematical Software, January 2015, vol. 41, no 2, 8 p.
https://hal-ens-lyon.archives-ouvertes.fr/ensl-00862910
[12]
N. Revol, P. Théveny.
Numerical Reproducibility and Parallel Computations: Issues for Interval Algorithms, in: IEEE Transactions on Computers, 2014, vol. 63, no 8, pp. 1915-1924, forthcoming. [ DOI : 10.1109/TC.2014.2322593 ]
https://hal.inria.fr/hal-00916931
[13]
S. M. Rump, C.-P. Jeannerod.
Improved backward error bounds for LU and Cholesky factorizations, in: SIAM Journal on Matrix Analysis and Applications, 2014, vol. 35, no 2, pp. 684-698. [ DOI : 10.1137/130927231 ]
https://hal.inria.fr/hal-00841361
[14]
D. Wang, J.-M. Muller, N. Brisebarre, M. Ercegovac.
(M, p, k)-Friendly Points: A Table-based Method to Evaluate Trigonometric Function, in: IEEE Transactions on Circuits and Systems. Part II, Express Briefs, September 2014, vol. 61, no 9, pp. 711-715. [ DOI : 10.1109/TCSII.2014.2331094 ]
https://hal-ens-lyon.archives-ouvertes.fr/ensl-01001673

Articles in National Peer-Reviewed Journals

[15]
F. Jézéquel, P. Langlois, N. Revol.
First steps towards more numerical reproducibility, in: ESAIM: Proceedings, September 2014, vol. 45, pp. 229-238. [ DOI : 10.1051/proc/201445023 ]
http://hal-lirmm.ccsd.cnrs.fr/lirmm-00872562

International Conferences with Proceedings

[16]
B. Boyer, J.-G. Dumas, P. Giorgi, C. Pernet, B. D. Saunders.
Elements of Design for Containers and Solutions in the LinBox Library, in: 4th International Congress on Mathematical Software, Seoul, South Korea, Springer, August 2014, vol. 8592, 8 pages.
https://hal.archives-ouvertes.fr/hal-01015138
[17]
J. Devigne, E. Guerrini, F. Laguillaumie.
Proxy Re-Encryption Scheme Supporting a Selection of Delegatees, in: 7th International Conference on Cryptology AFRICACRYPT 2014, Marrakech, Morocco, LNCS, Springer, May 2014.
https://hal.inria.fr/hal-00982549
[18]
J.-G. Dumas, T. Gautier, C. Pernet, Z. Sultan.
Parallel computation of echelon forms, in: EuroPar-2014, Porto, Portugal, August 2014, 12 p.
https://hal.archives-ouvertes.fr/hal-00947013
[19]
M. Joldes, J.-M. Muller, V. Popescu.
On the computation of the reciprocal of floating point expansions using an adapted Newton-Raphson iteration, in: 25th IEEE International Conference on Application-specific Systems, Architectures and Processors, ASAP, Zurich, Switzerland, June 2014, 8 p, forthcoming.
https://hal.archives-ouvertes.fr/hal-00957379
[20]
E. L. Kaltofen, C. Pernet.
Sparse Polynomial Interpolation Codes and their decoding beyond half the minimal distance, in: ISSAC - 39th International Symposium on Symbolic and Algebraic Computation, Kobe, Japan, July 2014, In Proceedings of the International Symposium on Symbolic and Algebraic Computation 2014 (ISSAC'14). [ DOI : 10.1145/2608628.2608660 ]
https://hal.inria.fr/hal-01068308
[21]
A. Langlois, S. Ling, K. Nguyen, H. Wang.
Lattice-based Group Signature Scheme with Verifier-local Revocation, in: Public-Key Cryptography - PKC2014, Buenos Aires, Argentina, H. Krawczyk (editor), Lecture Notes in Computer Science, Springer, March 2014, vol. 8383, pp. 345-361. [ DOI : 10.1007/978-3-642-54631-0 ]
https://hal.archives-ouvertes.fr/hal-00983084
[22]
A. Langlois, D. Stehlé, R. Steinfeld.
GGHLite: More Efficient Multilinear Maps from Ideal Lattices, in: EUROCRYPT 2014, Copenhague, Denmark, May 2014.
https://hal.archives-ouvertes.fr/hal-00983179
[23]
R. Lashermes, M. Paindavoine, N. El Mrabet, J. Fournier, L. Goubin.
Practical validation of several fault attacks against the Miller algorithm, in: FDTC - Workshop on Fault Diagnosis and Tolerance in Cryptography, Busan, South Korea, September 2014. [ DOI : 10.1109/FDTC.2014.21 ]
https://hal.archives-ouvertes.fr/hal-01100813
[24]
B. Libert, M. Joye, M. Yung.
Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold Signatures with Short Shares, in: ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, S. Dolev (editor), ACM, July 2014.
https://hal.inria.fr/hal-00983149
[25]
B. Libert, M. Joye, M. Yung, T. Peters.
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security, in: Asiacrypt 2014, Kaohsiung, Taiwan, Advances in Cryptology - Lecture Notes in Computer Science, Springer, December 2014, vol. 2, no 8874, pp. 1 - 21. [ DOI : 10.1007/978-3-662-45608-8_1 ]
https://hal.inria.fr/hal-01088108
[26]
B. Libert, T. Peters, M. Joye, M. Yung.
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures, in: Eurocrypt 2014, Copenhagen, Denmark, P. Nguyen, E. Oswald (editors), May 2014.
https://hal.inria.fr/hal-00983147
[27]
S. Ling, D. H. Phan, D. Stehlé, R. Steinfeld.
Hardness of k-LWE and Applications in Traitor Tracing, in: CRYPTO, Santa Barbara, CA, United States, 2014.
https://hal.archives-ouvertes.fr/hal-01091300
[28]
N. Revol.
Latest Developments on the IEEE 1788 Effort for the Standardization of Interval Arithmetic, in: ICVRAM & ISUMA - Second International Conference on Vulnerability and Risk Analysis and Management & Sixth International Symposium on Uncertainty Modelling and Analysis, Liverpool, United Kingdom, ASCE: American Society of Civil Engineers, July 2014, pp. 1-10, (Standardization effort supported by the Inria D2T.).
https://hal.inria.fr/hal-00920662
[29]
R. Serra, D. Arzelier, M. Joldes, J.-B. Lasserre, A. Rondepierre, B. Salvy.
A New Method to Compute the Probability of Collision for Short-term Space Encounters, in: AIAA/AAS Astrodynamics Specialist Conference, San Diego, United States, August 2014. [ DOI : 10.2514/6.2014-4366 ]
https://hal.inria.fr/hal-01092420
[30]
D. Stehlé, G. Villard, I. Morel, G. Sarushi.
LLL reducing with the most significant bits, in: ISSAC'14 - International symposium on Symbolic and algebraic computation, Kobe, Japan, ACM proceedings, July 2014. [ DOI : 10.1145/2608628.2608645 ]
https://hal-ens-lyon.archives-ouvertes.fr/ensl-00993445

Scientific Books (or Scientific Book chapters)

[31]
F. De Dinechin, J.-M. Muller.
Evaluating Elementary Functions, in: Princeton Companion to Applied Mathematics, N. Higham (editor), Princeton University Press, 2014, 2 p.
https://hal.inria.fr/ensl-00989001
[32]
A. Gil, J.-M. Muller, J. Segura.
Edition d'un numéro spécial "Numerical Software: Design, Analysis and Verification", Elsevier, September 2014, vol. 90 part A, 1 p.
https://hal-ens-lyon.archives-ouvertes.fr/ensl-01070771
[33]
F. Laguillaumie, A. Langlois, D. Stehlé.
Chiffrement avancé à partir du problème Learning With Errors, in: Informatique Mathématique : une photographie en 2014, S. Peyronnet (editor), Presses universitaires de Perpignan, March 2014.
https://hal.inria.fr/hal-00984055

Internal Reports

[34]
C.-P. Jeannerod, S. M. Rump.
On relative errors of floating-point operations: optimal bounds and applications, January 2014, 15 p.
https://hal.inria.fr/hal-00934443
[35]
M. Joldes, O. Marty, J.-M. Muller, V. Popescu.
Arithmetic algorithms for extended precision using floating-point expansions, LIP - ENS Lyon ; LAAS-CNRS ; ENS Cachan, January 2015, Rapport LAAS n° 15016.
https://hal.archives-ouvertes.fr/hal-01111551

Scientific Popularization

[36]
J.-M. Muller, S. Boldo.
Des ordinateurs capables de calculer plus juste, in: La Recherche, October 2014, pp. 46-53.
https://hal-ens-lyon.archives-ouvertes.fr/ensl-01069744

Other Publications

[37]
N. Brisebarre, C. Lauter, M. Mezzarobba, J.-M. Muller.
Comparison between binary and decimal floating-point numbers, July 2014.
https://hal.archives-ouvertes.fr/hal-01021928
[38]
M. F. I. Chowdhury, C.-P. Jeannerod, V. Neiger, E. Schost, G. Villard.
Faster Algorithms for Multivariate Interpolation with Multiplicities and Simultaneous Polynomial Approximations, February 2014.
https://hal.inria.fr/hal-00941435
[39]
J.-G. Dumas, T. Gautier, C. Pernet, J.-L. Roch, Z. Sultan.
Recursion based parallelization of exact dense linear algebra routines for Gaussian elimination, November 2014.
https://hal.archives-ouvertes.fr/hal-01084238
[40]
J.-G. Dumas, C. Pernet, Z. Sultan.
Computing the Rank Profile Matrix *, January 2015.
https://hal.archives-ouvertes.fr/hal-01107722
[41]
C.-P. Jeannerod.
A rounding error analysis of the Cornea-Harrison-Tang method in radix β, July 2014, Preprint submitted on April 5, 2014 and revised on July 15, 2014.
https://hal.inria.fr/hal-01050021
[42]
C.-P. Jeannerod, P. Kornerup, N. Louvet, J.-M. Muller.
Error bounds on complex floating-point multiplication with an FMA, July 2014.
https://hal.inria.fr/hal-00867040