Personnel
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
K. Bhargavan, G. Leurent.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
https://hal.inria.fr/hal-01404208
[2]
A. Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, J.-R. Reinhard, C. Thuillet, M. Videau.
Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, October 2008, Submission to NIST.
[3]
A. Canteaut, M. Naya-Plasencia, B. Vayssière.
Sieve-in-the-Middle: Improved MITM Attacks, in: Advances in Cryptology - CRYPTO 2013, Part I, Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 222–240.
[4]
A. Canteaut, J. Roué.
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
https://hal.inria.fr/hal-01104051
[5]
K. Chakraborty, A. Chailloux, A. Leverrier.
Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
https://hal.inria.fr/hal-01237241
[6]
P. Charpin, G. M. Kyureghyan, V. Suder.
Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
https://hal.archives-ouvertes.fr/hal-01068860
[7]
N. Courtois, M. Finiasz, N. Sendrier.
How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174.
[8]
J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich.
Algebraic Cryptanalysis of McEliece Variants with Compact Keys, in: Advances in Cryptology - EUROCRYPT 2010, LNCS, Springer, 2010, no 6110, pp. 279-298.
http://dx.doi.org/10.1007/978-3-642-13190-5_14
[9]
M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
https://hal.inria.fr/hal-01404196
[10]
R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
https://hal.inria.fr/hal-00870929
Publications of the year

Doctoral Dissertations and Habilitation Theses

[11]
K. Chakraborty.
Cryptography with Spacetime Constraints, Université Pierre et Marie Curie - Paris VI, October 2017.
https://hal.inria.fr/tel-01637818
[12]
J. Chaulet.
Study of public key cryptosystems based on quasi-cyclic MDPC codes, Université Pierre et Marie Curie - Paris VI, March 2017.
https://tel.archives-ouvertes.fr/tel-01599347
[13]
A. Leverrier.
Protecting information in a quantum world: from cryptography to error correction, Université Pierre et Marie Curie - Paris VI, September 2017, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-01636624
[14]
M. Naya-Plasencia.
Symmetric Cryptography for Long-Term Security, Université Pierre et Marie Curie - Paris VI, May 2017, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-01656036

Articles in International Peer-Reviewed Journals

[15]
C. Boura, A. Canteaut, L. R. Knudsen, G. Leander.
Reflection ciphers, in: Designs, Codes and Cryptography, January 2017, vol. 82, no 1–2, pp. 3–25. [ DOI : 10.1007/s10623-015-0143-x ]
https://hal.inria.fr/hal-01237135
[16]
R. Bricout, A. Chailloux.
Recursive cheating strategies for the relativistic 𝔽Q bit commitment protocol, in: MDPI - Cryptography, August 2017, https://arxiv.org/abs/1608.03820. [ DOI : 10.3390/cryptography1020014 ]
https://hal.inria.fr/hal-01409563
[17]
A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: Journal of Cryptology, 2017, forthcoming.
https://hal.inria.fr/hal-01650012
[18]
A. Canteaut, S. Duval, L. Perrin.
A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size 24k+2, in: IEEE Transactions on Information Theory, 2017, vol. 63, no 11, pp. 7575–7591. [ DOI : 10.1109/TIT.2017.2676807 ]
https://hal.inria.fr/hal-01589131
[19]
A. Canteaut, E. Lambooij, S. Neves, S. Rasoolzadeh, Y. Sasaki, M. Stevens.
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds, in: IACR Transactions on Symmetric Cryptology, May 2017, vol. 2017, no 2, pp. 203–227. [ DOI : 10.13154/tosc.v2017.i2.203-227 ]
https://hal.inria.fr/hal-01649954
[20]
C. Carlet, P. Méaux, Y. Rotella.
Boolean functions with restricted input and their robustness; application to the FLIP cipher, in: IACR Transactions on Symmetric Cryptology, 2017, vol. 2017, no 3, pp. 192–227. [ DOI : 10.13154/tosc.v2017.i3.192-227 ]
https://hal.inria.fr/hal-01633506
[21]
N. Cepak, P. Charpin, E. Pasalic.
Permutations via linear translators, in: Finite Fields and Their Applications, 2017, vol. 45, pp. 19–42, https://arxiv.org/abs/1609.09291. [ DOI : 10.1016/j.ffa.2016.11.009 ]
https://hal.inria.fr/hal-01412487
[22]
A. Chailloux, I. Kerenidis.
Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment, in: SIAM Journal on Computing, January 2017, vol. 46, no 5, pp. 1647–1677. [ DOI : 10.1137/15M1010853 ]
https://hal.inria.fr/hal-01650970
[23]
P. Charpin, G. M. Kyureghyan.
On sets determining the differential spectrum of mappings, in: International journal of information and Coding Theory, 2017, vol. 4, no 2/3, pp. 170–184, Special issue on the honor of Gerard Cohen. [ DOI : 10.1504/IJICOT.2017.083844 ]
https://hal.inria.fr/hal-01406589
[24]
A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
https://hal.inria.fr/hal-01661935
[25]
I. Dinur, G. Leurent.
Improved Generic Attacks Against Hash-Based MACs and HAIFA, in: Algorithmica, December 2017, vol. 79, no 4, pp. 1161–1195. [ DOI : 10.1007/s00453-016-0236-6 ]
https://hal.inria.fr/hal-01407953
[26]
A. Leverrier.
Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction, in: Physical Review Letters, May 2017, vol. 118, no 20, pp. 1–24, https://arxiv.org/abs/1701.03393. [ DOI : 10.1103/PhysRevLett.118.200501 ]
https://hal.inria.fr/hal-01652082
[27]
M. Tomamichel, A. Leverrier.
A largely self-contained and complete security proof for quantum key distribution, in: Quantum, 2017, vol. 1, 14 p, https://arxiv.org/abs/1506.08458. [ DOI : 10.22331/q-2017-07-14-14 ]
https://hal.inria.fr/hal-01237240

Invited Conferences

[28]
C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving Resistance against Invariant Attacks: Properties of the Linear Layer , in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
https://hal.inria.fr/hal-01649994
[29]
C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving resistance of a block cipher against invariant attacks, in: BFA 2017 - Boolean Functions and their Applications, Os, Norway, July 2017.
https://hal.inria.fr/hal-01649990
[30]
A. Chailloux.
A tight security reduction in the quantum random oracle model for code-based signature schemes, in: 2017 - IRIF Algocomp seminar, Paris, France, November 2017.
https://hal.inria.fr/hal-01660701
[31]
G. Leurent, K. Bhargavan.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
https://hal.inria.fr/hal-01105128
[32]
G. Leurent.
Bad Symmetric Crypto in the Real World, in: Journées Nationales 2017 Pré-GDR Sécurité Informatique, Paris, France, May 2017.
https://hal.inria.fr/hal-01652853
[33]
G. Leurent.
Breaking Symmetric Cryptosystems Using Quantum Algorithms, in: FOQUS - ​Frontiers of Quantum Safe Cryptography, Paris, France, April 2017.
https://hal.inria.fr/hal-01652852
[34]
A. Leverrier.
A Gaussian de Finetti theorem and application to truncations of random Haar matrices, in: Workshop on ”Probabilistic techniques and Quantum Information Theory”, Paris, France, October 2017, pp. 1-60.
https://hal.inria.fr/hal-01656425
[35]
A. Leverrier.
Efficient decoding of random errors for quantum expander codes, in: Conference on ”Quantum Information Theory”, Paris, France, December 2017, pp. 1-33.
https://hal.inria.fr/hal-01656427
[36]
A. Leverrier.
Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction, in: TyQi 2017 - Trustworthy Quantum Information, Paris, France, June 2017.
https://hal.inria.fr/hal-01656418
[37]
A. Leverrier.
Theoretical challenges in continuous-variable quantum cryptography, in: QCrypt 2017 - 7th International Conference on Quantum Cryptography, Cambridge, United Kingdom, September 2017, pp. 1-26.
https://hal.inria.fr/hal-01656419
[38]
M. Naya-Plasencia.
New results on symmetric quantum cryptanalysis, in: Dagstuhl Seminar 17401 - Quantum Cryptanalysis, Dagstuhl, Germany, October 2017.
https://hal.inria.fr/hal-01671913
[39]
J.-P. Tillich.
Code based cryptography and quantum attacks, in: Dagstuhl Seminar 17401 - Quantum cryptanalysis, Dagstuhl, Germany, October 2017.
https://hal.archives-ouvertes.fr/hal-01671921

International Conferences with Proceedings

[40]
P. S. L. M. Barreto, S. Gueron, T. Guneysu, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich.
CAKE: Code-based Algorithm for Key Encapsulation, in: IMACC 2017 - 16th IMA International Conference on Cryptography and Coding, Oxford, United Kingdom, M. O'Neill (editor), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10655, pp. 207–226. [ DOI : 10.1007/978-3-319-71045-7_11 ]
https://hal.inria.fr/hal-01661949
[41]
C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]
https://hal.inria.fr/hal-01631130
[42]
A. Biryukov, L. Perrin.
Symmetrically and Asymmetrically Hard Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10626, pp. 417–445. [ DOI : 10.1007/978-3-319-70700-6_15 ]
https://hal.inria.fr/hal-01650044
[43]
O. Blazy, P. Gaborit, J. Schrek, N. Sendrier.
A code-based blind signature, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 2718–2722. [ DOI : 10.1109/ISIT.2017.8007023 ]
https://hal.archives-ouvertes.fr/hal-01610410
[44]
X. Bonnetain.
Quantum Key-Recovery on full AEZ, in: SAC 2017 - Selected Areas in Cryptography, Ottawa, Canada, August 2017.
https://hal.inria.fr/hal-01650026
[45]
C. Boura, A. Canteaut, J. Jean, V. Suder.
Two Notions of Differential Equivalence on Sboxes, in: WCC 2017 - Workshop on Coding and Cryptography, Saint Petersburg, Russia, September 2017.
https://hal.inria.fr/hal-01650010
[46]
A. Chailloux, A. Leverrier.
Relativistic (or 2-Prover 1-Round) Zero-Knowledge Protocol for NP Secure Against Quantum Adversaries, in: Eurocrypt 2017 - Advances in Cryptology, Paris, France, J.-S. Coron, J. B. Nielsen (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2017, vol. 10212, pp. 369–396. [ DOI : 10.1007/978-3-319-56617-7_13 ]
https://hal.inria.fr/hal-01650985
[47]
A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]
https://hal.inria.fr/hal-01651007
[48]
T. Debris-Alazard, J.-P. Tillich.
Statistical Decoding, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 1789–1802. [ DOI : 10.1109/ISIT.2017.8006839 ]
https://hal.inria.fr/hal-01661749
[49]
P. Gaborit, A. Hauteville, D. H. Phan, J.-P. Tillich.
Identity-based Encryption from Codes with Rank Metric, in: Crypto 2017 - Advances in Cryptology, Santa-Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10403, pp. 194–224. [ DOI : 10.1007/978-3-319-63697-9_7 ]
https://hal.inria.fr/hal-01589463
[50]
G. Kachigar, J.-P. Tillich.
Quantum Information Set Decoding Algorithms, in: PQCrypto 2017 - The Eighth International Conference on Post-Quantum Cryptography, Utrecht, Netherlands, T. Lange, T. Takagi (editors), LNCS - Lecture Notes in Computer Science, Springer, June 2017, vol. 10346, pp. 69-89. [ DOI : 10.1007/978-3-319-59879-6_5 ]
https://hal.inria.fr/hal-01661905
[51]
L. Khati, N. Mouha, D. Vergnaud.
Full Disk Encryption: Bridging Theory and Practice, in: CT-RSA 2017 - RSA Conference Cryptographers' Track, San Francisco, United States, H. Handschuh (editor), Lecture Notes in Computer Science, Springer, February 2017, vol. 10159, pp. 241–257. [ DOI : 10.1007/978-3-319-52153-4_14 ]
https://hal.inria.fr/hal-01403418
[52]
B. Lac, A. Canteaut, J. J. A. Fournier, R. Sirdey.
DFA on LS-Designs with a Practical Implementation on SCREAM, in: COSADE 2017 - Constructive Side-Channel Analysis and Secure Design, Paris, France, S. Guilley (editor), LNCS - Lecture Notes in Computer Science, Springer, April 2017, vol. 10348, pp. 223–247. [ DOI : 10.1007/978-3-319-64647-3_14 ]
https://hal.inria.fr/hal-01649974
[53]
I. Marquez-Corbella, J.-P. Tillich.
Attaining Capacity with iterated (U|U+V) codes based on AG codes and Koetter-Vardy soft decoding, in: ISIT 2017 - IEEE International Symposium on Information Theory, Aachen, Germany, IEEE, June 2017, pp. 6–10. [ DOI : 10.1109/ISIT.2017.8006479 ]
https://hal.inria.fr/hal-01661977

Conferences without Proceedings

[54]
C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Attaques par invariant : comment s'en protéger?, in: Journées codage et cryptographie 2017, La Bresse, France, April 2017, 1 p.
https://hal.inria.fr/hal-01633519
[55]
A. Canteaut, S. Duval, L. Perrin.
On a generalisation of Dillon’s APN permutation, in: Fq13 - Finite Fields and Applications, Gaeta, Italy, June 2017.
https://hal.inria.fr/hal-01650001
[56]
A. Chailloux.
A tight security reduction in the quantum random oracle model for code-based signature schemes, in: Code based crypto seminar, Paris, France, October 2017, pp. 1-22.
https://hal.inria.fr/hal-01660693
[57]
O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, in: QIP 2018 - 21th Annual Conference on Quantum Information Processing, Delft, Netherlands, QuTech, January 2018, pp. 1-31, https://arxiv.org/abs/1711.08351 - 31 pages.
https://hal.archives-ouvertes.fr/hal-01654670
[58]
A. Grospellier, A. Leverrier, O. Fawzi.
Efficient decoding of random errors for quantum expander codes, in: Journées Informatique Quantique 2017, Bordeaux, France, November 2017.
https://hal.archives-ouvertes.fr/hal-01671491
[59]
A. Grospellier, A. Leverrier, O. Fawzi.
Quantum expander codes, in: Journées codage et cryptographie 2017, La Bresse, France, April 2017.
https://hal.archives-ouvertes.fr/hal-01671485
[60]
G. Leurent, M. Kaplan, A. Leverrier, M. Naya-Plasencia.
Quantum differential and linear cryptanalysis, in: FSE 2017 - Fast Software Encryption, Tokyo, Japan, March 2017.
https://hal.inria.fr/hal-01652807
[61]
A. Leverrier.
SU(p,q) coherent states and Gaussian de Finetti theorems, in: QIP 2017 - 20th Annual Conference on Quantum Information Processing, Seattle, United States, January 2017, pp. 1-24.
https://hal.inria.fr/hal-01656414
[62]
V. Londe.
Golden codes: 4D hyperbolic regular quantum codes, in: 8th colloquium of the GDR IQFA - Ingénierie Quantique, des Aspects Fondamentaux aux Applications, Nice, France, November 2017.
https://hal.inria.fr/hal-01671528
[63]
V. Londe.
Homological quantum error correcting codes and real projective space, in: Journées Codage et Cryptographie 2017, La Bresse, France, April 2017.
https://hal.inria.fr/hal-01671444
[64]
V. Londe.
4D hyperbolic regular quantum codes, in: Journées Informatique Quantique 2017, Bordeaux, France, November 2017.
https://hal.inria.fr/hal-01671456
[65]
N. Sendrier.
Quantum Safe Cryptography from Codes: Present and Future, in: 16th IMA International Conference on Cryptography and Coding, Oxford, United Kingdom, December 2017.
https://hal.archives-ouvertes.fr/hal-01671452

Scientific Popularization

[66]
A. Chailloux.
Cryptographie Quantique en théorie, in: 2017 - 9ème Journée Mathématiques en Mouvement sur l'ordinateur quantique, Paris, France, FSMP, May 2017.
https://hal.inria.fr/hal-01660726

Other Publications

[67]
N. Aragon, P. S. L. M. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C. Aguilar Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich, G. Zémor.
BIKE: Bit Flipping Key Encapsulation, December 2017, Submission to the NIST post quantum standardization process.
https://hal.archives-ouvertes.fr/hal-01671903
[68]
N. Aragon, P. Gaborit, A. Hauteville, J.-P. Tillich.
Improvement of Generic Attacks on the Rank Syndrome Decoding Problem, October 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01618464
[69]
M. Bardet, E. Barelli, O. Blazy, R. Canto Torres, A. Couvreur, P. Gaborit, A. Otmani, N. Sendrier, J.-P. Tillich.
BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation, December 2017, submission to the NIST post quantum cryptography standardization process.
https://hal.archives-ouvertes.fr/hal-01671866
[70]
A. Chailloux, T. Debris-Alazard.
A tight security reduction in the quantum random oracle model for code-based signature schemes , December 2017, working paper or preprint.
https://hal.inria.fr/hal-01671870
[71]
T. Debris-Alazard, J.-P. Tillich.
Statistical Decoding, December 2017, working paper or preprint.
https://hal.inria.fr/hal-01661745
[72]
O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, December 2017, working paper or preprint.
https://hal.inria.fr/hal-01671348
[73]
O. Fawzi, A. Grospellier, A. Leverrier.
Efficient decoding of random errors for quantum expander codes, November 2017, 8th colloquium of the GDR IQFA - Ingénierie Quantique, des Aspects Fondamentaux aux Applications, Poster.
https://hal.archives-ouvertes.fr/hal-01671496
[74]
M. Lequesne.
Side Channel Key Recovery Attacks on QC-MDPC Codes, MPRI, September 2017, pp. 1-22.
https://hal.inria.fr/hal-01658381
[75]
A. Leverrier.
SU(p,q) coherent states and a Gaussian de Finetti theorem, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01652084
[76]
A. Schrottenloher.
Collision search and quantum symmetric cryptanalysis, Université Paris-Saclay, September 2017, pp. 1-25.
https://hal.inria.fr/hal-01654190
[77]
F. Sibleyras.
Cryptanalysis of the Counter mode of operation, Paris 7, September 2017.
https://hal.inria.fr/hal-01662040
[78]
V. Vasseur.
Cryptographie post-quantique : étude du décodage des codes QC-MDPC, Université Grenoble-Alpes, September 2017.
https://hal.inria.fr/hal-01664082
[79]
M. de la Morinerie.
Implémentation à seuil de boîtes S, Ecole Polytechnique, July 2017.
https://hal.inria.fr/hal-01672270