Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
C. Beierle, A. Canteaut, G. Leander, Y. Rotella.
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]
https://hal.inria.fr/hal-01631130
[2]
K. Bhargavan, G. Leurent.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]
https://hal.inria.fr/hal-01404208
[3]
A. Canteaut, J. Roué.
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.
https://hal.inria.fr/hal-01104051
[4]
A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]
https://hal.inria.fr/hal-01651007
[5]
K. Chakraborty, A. Chailloux, A. Leverrier.
Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]
https://hal.inria.fr/hal-01237241
[6]
P. Charpin, G. M. Kyureghyan, V. Suder.
Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]
https://hal.archives-ouvertes.fr/hal-01068860
[7]
N. Courtois, M. Finiasz, N. Sendrier.
How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174.
[8]
A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]
https://hal.inria.fr/hal-01661935
[9]
M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.
Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]
https://hal.inria.fr/hal-01404196
[10]
R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.
https://hal.inria.fr/hal-00870929
Publications of the year

Doctoral Dissertations and Habilitation Theses

[11]
X. Bonnetain.
Hidden Structures and Quantum Cryptanalysis, Sorbonne Université, November 2019.
https://tel.archives-ouvertes.fr/tel-02400328
[12]
T. Debris-Alazard.
Code-based Cryptography: New Approaches for Design and Proof ; Contribution to Cryptanalysis, Sorbonne Universites, UPMC University of Paris 6, December 2019.
https://hal.inria.fr/tel-02424234
[13]
A. Grospellier.
Constant Time Decoding of Quantum Expander Codes and Application to Fault-Tolerant Quantum Computation, Sorbonne universités, November 2019.
https://hal.inria.fr/tel-02422585
[14]
V. Londe.
Topological Quantum Error-Correcting Codes beyond dimension 2, Inria Paris ; Université de bordeaux, December 2019.
https://hal.inria.fr/tel-02429868

Articles in International Peer-Reviewed Journals

[15]
Z. Bao, I. Dinur, J. Guo, G. Leurent, L. Wang.
Generic Attacks on Hash Combiners, in: Journal of Cryptology, 2020, 82 p, forthcoming. [ DOI : 10.1007/s00145-019-09328-w ]
https://hal.inria.fr/hal-02424905
[16]
J.-F. Biasse, X. Bonnetain, B. Pring, A. Schrottenloher, W. Youmans.
A trade-off between classical and quantum circuit size for an attack against CSIDH, in: Journal of Mathematical Cryptology, August 2019, pp. 1-16.
https://hal.inria.fr/hal-02423394
[17]
X. Bonnetain, M. Naya-Plasencia, A. Schrottenloher.
Quantum Security Analysis of AES, in: IACR Transactions on Symmetric Cryptology, June 2019, vol. 2019, no 2, pp. 55-93. [ DOI : 10.13154/tosc.v2019.i2.55-93 ]
https://hal.inria.fr/hal-02397049
[18]
C. Boura, A. Canteaut, D. Coggia.
A General Proof Framework for Recent AES Distinguishers, in: IACR Transactions on Symmetric Cryptology, March 2019, vol. 2019, no 1, pp. 170-191. [ DOI : 10.13154/tosc.v2019.i1.170-191 ]
https://hal.inria.fr/hal-02431695
[19]
C. Boura, A. Canteaut, J. Jean, V. Suder.
Two Notions of Differential Equivalence on Sboxes, in: Designs, Codes and Cryptography, 2019, vol. 87, no 2-3, pp. 185-202, forthcoming. [ DOI : 10.1007/s10623-018-0496-z ]
https://hal.inria.fr/hal-01944565
[20]
C. Boura, E. Chavli, M. Chlouveraki, K. Karvounis.
The BMM symmetrising trace conjecture for groups G, G, G, G, G, in: Journal of Symbolic Computation, 2020, vol. 96, pp. 62-84, https://arxiv.org/abs/1802.07482. [ DOI : 10.1016/j.jsc.2019.02.012 ]
https://hal.archives-ouvertes.fr/hal-02147376
[21]
A. Canteaut, L. Perrin.
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 209-246. [ DOI : 10.1016/j.ffa.2018.11.008 ]
https://hal.inria.fr/hal-01953353
[22]
A. Canteaut, L. Perrin, S. Tian.
If a generalised butterfly is APN then it operates on 6 bits, in: Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , November 2019, vol. 11, no 6, pp. 1147-1164. [ DOI : 10.1007/s12095-019-00361-x ]
https://hal.inria.fr/hal-02420992
[23]
K. Carrier, J.-P. Tillich.
Identifying an unknown code by partial Gaussian elimination, in: Designs, Codes and Cryptography, March 2019, vol. 87, no 2-3, pp. 685-713. [ DOI : 10.1007/s10623-018-00593-7 ]
https://hal.inria.fr/hal-02424098
[24]
D. Chang, N. Datta, A. Dutta, B. Mennink, M. Nandi, S. Sanadhya, F. Sibleyras.
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE, in: IACR Transactions on Symmetric Cryptology, 2019, forthcoming.
https://hal.inria.fr/hal-02424957
[25]
P. Charpin, P. Langevin.
Obituary of Jacques Wolfmann (1932–2018), in: Designs, Codes and Cryptography, May 2019, vol. 87, no 5, pp. 955-956. [ DOI : 10.1007/s10623-019-00631-y ]
https://hal-univ-tln.archives-ouvertes.fr/hal-02168222
[26]
P. Charpin, J. Peng.
Differential uniformity and the associated codes of cryptographic functions, in: Advances in Mathematics of Communications, November 2019, vol. 13, no 4, pp. 579-600. [ DOI : 10.3934/amc.2019036 ]
https://hal.inria.fr/hal-01908336
[27]
P. Charpin, J. Peng.
New links between nonlinearity and differential uniformity, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 188-208. [ DOI : 10.1016/j.ffa.2018.12.001 ]
https://hal.inria.fr/hal-01907499
[28]
S. Ghorai, E. Diamanti, A. Leverrier.
Composable security of two-way continuous-variable quantum key distribution without active symmetrization, in: Physical Review A, January 2019, vol. 99, no 1, 11 p, https://arxiv.org/abs/1806.11356. [ DOI : 10.1103/PhysRevA.99.012311 ]
https://hal.archives-ouvertes.fr/hal-02096575
[29]
S. Ghorai, P. Grangier, E. Diamanti, A. Leverrier.
Asymptotic security of continuous-variable quantum key distribution with a discrete modulation, in: Physical Review X, June 2019, vol. 9, no 2, 11 p, https://arxiv.org/abs/1902.01317. [ DOI : 10.1103/PhysRevX.9.021059 ]
https://hal.archives-ouvertes.fr/hal-02163714
[30]
A. Krishna, J.-P. Tillich.
Towards Low Overhead Magic State Distillation, in: Physical Review Letters, August 2019, vol. 123, no 7, 4 p. [ DOI : 10.1103/PhysRevLett.123.070507 ]
https://hal.inria.fr/hal-02424053
[31]
Best Paper
L. Perrin.
Partitions in the S-Box of Streebog and Kuznyechik, in: IACR Transactions on Symmetric Cryptology, March 2019, vol. 2019, no 1, pp. 302-329. [ DOI : 10.13154/tosc.v2019.i1.302-329 ]
https://hal.inria.fr/hal-02396814

Invited Conferences

[32]
A. Canteaut.
Algebraic attacks on symmetric primitives for advanced protocols, in: Frisiacrypt 2019 - Workshop on Symmetric Cryptography, Borkum, Germany, September 2019.
https://hal.inria.fr/hal-02431723
[33]
A. Canteaut.
Cryptanalysis – a Never-Ending Story, in: Guest lecture for Honorary Doctorate, Bergen, Norway, October 2019.
https://hal.inria.fr/hal-02431731
[34]
A. Canteaut.
Searching for APN permutations with the butterfly construction, in: CANADAM 2019 - minisymposium on "Finite Fields in Discrete Mathematics", Vancouver, Canada, May 2019.
https://hal.inria.fr/hal-02431757
[35]
P. Charpin.
Crooked and weakly crooked functions, in: Fq14 - 14th international conference on Finite Fields and Applications -, Vancouver, Canada, June 2019.
https://hal.inria.fr/hal-02431744
[36]
A. Leverrier, V. Londe, G. Zémor.
Quantum local testability, in: Symmetry, Phases of Matter, and Resources in Quantum Computing, Waterloo, Canada, November 2019.
https://hal.inria.fr/hal-02432364
[37]
M. Naya-Plasencia.
Preparing Symmetric Crypto for the Quantum World, in: FSE 2019 - 26th Annual Fast Software Encryption Conference, Paris, France, March 2019.
https://hal.inria.fr/hal-02424409
[38]
M. Naya-Plasencia, A. Schrottenloher, A. Chailloux, L. Grassi.
New algorithms for quantum (symmetric) cryptanalysis, in: QuAC: Quantum Algorithms for Cryptanalysis, Darmstadt, Germany, May 2019.
https://hal.inria.fr/hal-02423376
[39]
M. Naya-Plasencia, A. Schrottenloher, A. Chailloux, L. Grassi.
Quantum Merging Algorithms, in: Dagstuhl Seminar 19421 Quantum Cryptanalysis, Dagstuhl, Germany, October 2019.
https://hal.inria.fr/hal-02423380
[40]
F. Sibleyras.
The Missing Difference Problem, and its Applications to Counter Mode Encryption, in: Invited talk at NTT Secure Platform Laboratories, Musashino, Japan, September 2019.
https://hal.inria.fr/hal-02424996
[41]
F. Sibleyras.
Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem, in: Invited talk at NTT Secure Platform Laboratories, Musashino, Japan, September 2020.
https://hal.inria.fr/hal-02425000

International Conferences with Proceedings

[42]
S. Apers.
Quantum Walk Sampling by Growing Seed Sets, in: ESA 2019 - 27th Annual European Symposium on Algorithms, Munich/Garching, Germany, September 2019, https://arxiv.org/abs/1904.11446. [ DOI : 10.4230/LIPIcs.ESA.2019.9 ]
https://hal.inria.fr/hal-02436629
[43]
X. Bonnetain, A. Hosoyamada, M. Naya-Plasencia, Y. Sasaki, A. Schrottenloher.
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm, in: ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, LNCS, Springer, December 2019, vol. 11921, pp. 552-583. [ DOI : 10.1007/978-3-030-34578-5_20 ]
https://hal.inria.fr/hal-02397056
[44]
X. Bonnetain, L. Perrin, S. Tian.
Anomalies and Vector Space Search: Tools for S-Box Analysis, in: ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, LNCS, Springer, November 2019, vol. 11921, pp. 196-223. [ DOI : 10.1007/978-3-030-34578-5_8 ]
https://hal.inria.fr/hal-02396738
[45]
R. Bricout, A. Chailloux, T. Debris-Alazard, M. Lequesne.
Ternary Syndrome Decoding with Large Weight, in: SAC 2019 - 26th International Conference Selected Areas in Cryptography, Waterloo, Canada, August 2019.
https://hal.inria.fr/hal-02420997
[46]
A. Canteaut, V. Lallemand, G. Leander, P. Neumann, F. Wiemer.
Bison: Instantiating the Whitened Swap-Or-Not Construction, in: Eurocrypt 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, LNCS, Springer, May 2019, vol. 11478. [ DOI : 10.1007/978-3-030-17659-4_20 ]
https://hal.inria.fr/hal-02431714
[47]
R. Canto-Torres, J.-P. Tillich.
Speeding up decoding a code with a non-trivial automorphism group up to an exponential factor, in: ISIT 2019 - IEEE International Symposium on Information Theory, Paris, France, IEEE, July 2019, pp. 1927-1931. [ DOI : 10.1109/ISIT.2019.8849628 ]
https://hal.inria.fr/hal-02424101
[48]
A. Couvreur, M. Lequesne, J.-P. Tillich.
Recovering short secret keys of RLCE encryption scheme in polynomial time, in: PQCrypto 2019 - International Conference on Post-Quantum Cryptography, Chongqing, China, May 2019, https://arxiv.org/abs/1805.11489. [ DOI : 10.1007/978-3-030-25510-7_8 ]
https://hal.inria.fr/hal-01959617
[49]
Best Paper
T. Debris-Alazard, N. Sendrier, J.-P. Tillich.
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes, in: ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, LNCS, Springer, November 2019, vol. 11921, pp. 21-51. [ DOI : 10.1007/978-3-030-34578-5_2 ]
https://hal.inria.fr/hal-02424057
[50]
O. Dunkelman, L. Perrin.
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs, in: SSR 2019 - Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, Royaume-Uni, ACM Press, November 2019, pp. 69-80. [ DOI : 10.1145/3338500.3360335 ]
https://hal.inria.fr/hal-02396695
[51]
S. Duval, G. Leurent.
Lightweight MACs from Universal Hash Functions, in: CARDIS 2019 - 18th Smart Card Research and Advanced Application Conference, Prague, Czech Republic, November 2019.
https://hal.inria.fr/hal-02424904
[52]
G. Leurent, T. Peyrin.
From Collisions to Chosen-Prefix Collisions : Application to Full SHA-1, in: Eurocrypt 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, LNCS, Springer, April 2019, vol. 11478, pp. 527-555. [ DOI : 10.1007/978-3-030-17659-4_18 ]
https://hal.inria.fr/hal-02424900
[53]
G. Leurent, F. Sibleyras.
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem, in: CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, United States, A. Boldyreva, D. Micciancio (editors), LNCS, Springer, August 2019, vol. 11693, pp. 210-235. [ DOI : 10.1007/978-3-030-26951-7_8 ]
https://hal.inria.fr/hal-02424902
[54]
Y. Li, G. Leurent, M. Wang, W. Wang, G. Zhang, Y. Liu.
Universal Forgery Attack against GCM-RUP, in: CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, United States, February 2020.
https://hal.inria.fr/hal-02424899
[55]
F. Sibleyras.
Generic Attack on Iterated Tweakable FX Constructions, in: CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, United States, February 2020.
https://hal.inria.fr/hal-02424953

National Conferences with Proceedings

[56]
L. Perrin, X. Bonnetain.
Russian Style (Lack of) Randomness, in: Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2019.
https://hal.inria.fr/hal-02396792

Conferences without Proceedings

[57]
C. Boura, L. Perrin, S. Tian.
Boomerang Uniformity of Popular S-box Constructions, in: WCC 2019 - The Eleventh International Workshop on Coding and Cryptography, Saint-Jacut-de-la-Mer, France, March 2019.
https://hal.inria.fr/hal-02420970
[58]
A. Canteaut, L. Perrin.
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Fq14 - 14th international conference on Finite Fields and Applications, Vancouver, Canada, June 2019.
https://hal.inria.fr/hal-02431739
[59]
A. Chailloux.
A note on the Quantum Query Complexity of Permutation Symmetric Functions, in: QIP 2019 - 22nd Annual Conference on Quantum Information Processing, Boulder, United States, January 2019.
https://hal.inria.fr/hal-02427235
[60]
A. Chailloux.
A note on the quantum query complexity of permutation symmetric functions, in: ITCS 2019 - 10th Annual Innovations in Theoretical Computer Science, San Diego, United States, 2019, https://arxiv.org/abs/1810.01790. [ DOI : 10.4230/LIPIcs.ITCS.2019.19 ]
https://hal.inria.fr/hal-01950650
[61]
D. Coggia, A. Couvreur.
On the security of a Loidreau's rank metric code based encryption scheme, in: WCC 2019 - The Eleventh International Workshop on Coding and Cryptography, Saint Jacut de la mer, France, March 2019.
https://hal.archives-ouvertes.fr/hal-02064465
[62]
A. Grospellier, L. Grouès, A. Krishna, A. Leverrier.
Combining Hard and Soft Decoders for Hypergraph Product Codes, in: QEC19 - 5th International Conference on Quantum Error Correction, London, United Kingdom, July 2019.
https://hal.inria.fr/hal-02429542

Scientific Popularization

[63]
G. Leurent, M. Naya-Plasencia.
La fragilité inattendue du chiffrement symétrique dans le monde post-quantique, in: Interstices, December 2019.
https://hal.inria.fr/hal-02425716

Other Publications

[64]
S. Apers.
Expansion Testing using Quantum Fast-Forwarding and Seed Sets, January 2020, https://arxiv.org/abs/1907.02369 - 17 pages, 2 figures; v2: fixed error in Lemma 3, with corresponding modifications.
https://hal.inria.fr/hal-02436647
[65]
S. Apers, R. De Wolf.
Quantum Speedup for Graph Sparsification, Cut Approximation and Laplacian Solving, January 2020, https://arxiv.org/abs/1911.07306 - working paper or preprint.
https://hal.inria.fr/hal-02436651
[66]
S. Apers, A. Gilyén, S. Jeffery.
A Unified Framework of Quantum Walk Search, January 2020, https://arxiv.org/abs/1912.04233 - working paper or preprint.
https://hal.inria.fr/hal-02436653
[67]
M. Bardet, P. Briaud, M. Bros, P. Gaborit, V. Neiger, O. Ruatta, J.-P. Tillich.
An Algebraic Attack on Rank Metric Code-Based Cryptosystems, October 2019, working paper or preprint.
https://hal-unilim.archives-ouvertes.fr/hal-02303015
[68]
I. Bardet, A. Capel, A. Lucia, D. Pérez-García, C. Rouzé.
On the modified logarithmic Sobolev inequality for the heat-bath dynamics for 1D systems, January 2020, https://arxiv.org/abs/1908.09004 - 26 pages, 4 figures.
https://hal.archives-ouvertes.fr/hal-02436766
[69]
I. Bardet, M. Junge, N. LaRacuente, C. Rouzé, D. S. França.
Group transference techniques for the estimation of the decoherence times and capacities of quantum Markov semigroups, January 2020, https://arxiv.org/abs/1904.11043 - 39 pages, 2 figures.
https://hal.archives-ouvertes.fr/hal-02436767
[70]
A. Bariant.
Cryptanalysis of Tweakable Block Ciphers and Forkciphers, École Polytechnique, July 2019, INTERNSHIP REPORT.
https://hal.inria.fr/hal-02426441
[71]
X. Bonnetain.
Collisions on Feistel-MiMC and univariate GMiMC, December 2019, working paper or preprint.
https://hal.inria.fr/hal-02400343
[72]
X. Bonnetain.
Improved Low-qubit Hidden Shift Algorithms, December 2019, https://arxiv.org/abs/1901.11428 - working paper or preprint.
https://hal.inria.fr/hal-02400414
[73]
R. Bricout, A. Chailloux, T. Debris-Alazard, M. Lequesne.
Ternary Syndrome Decoding with Large Weight, July 2019, Munich Workshop on Coding and Cryptography (MWCC), Poster.
https://hal.inria.fr/hal-02421017
[74]
A. Canteaut, S. Duval, G. Leurent, M. Naya-Plasencia, L. Perrin, T. Pornin, A. Schrottenloher.
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security, March 2019, Soumission à la compétition "Lightweight Cryptography" du NIST.
https://hal.inria.fr/hal-02436763
[75]
A. Chailloux.
DEREC - Développement de la cryptographie relativiste, October 2019, WISG 2019 - 13ème Workshop Interdisciplinaire sur la Sécurité Globale, Poster.
https://hal.inria.fr/hal-02427236
[76]
A. Chailloux.
Quantum security of the Fiat-Shamir transform of commit and open protocols, 2019, https://arxiv.org/abs/1906.05415 - working paper or preprint.
https://hal.inria.fr/hal-02427223
[77]
P. Charpin.
Crooked functions, October 2019, working paper or preprint.
https://hal.inria.fr/hal-02337711
[78]
N. David.
Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY, MPRI, September 2019.
https://hal.inria.fr/hal-02424410
[79]
T. Debris-Alazard, N. Sendrier, J.-P. Tillich.
About Wave Implementation and its Leakage Immunity, December 2019, working paper or preprint.
https://hal.inria.fr/hal-02424231
[80]
A. Florez Gutierrez.
Improving the key recovery in Linear Cryptanalysis: An application to PRESENT, UVSQ, September 2019.
https://hal.inria.fr/hal-02424413
[81]
A. Krishna, J.-P. Tillich.
Magic state distillation with punctured polar codes, May 2019, https://arxiv.org/abs/1811.03112 - working paper or preprint.
https://hal.inria.fr/hal-02120563
[82]
A. Krishna, J.-P. Tillich.
Towards low overhead magic state distillation, May 2019, https://arxiv.org/abs/1811.08461 - working paper or preprint.
https://hal.inria.fr/hal-02120564
[83]
A. Leverrier, V. Londe, G. Zémor.
Towards local testability for quantum coding, January 2020, https://arxiv.org/abs/1911.03069 - 38 pages.
https://hal.inria.fr/hal-02432360
[84]
S. Ouzineb.
Towards the Reverse-Engineering of the CaveTable, Télécom ParisTech, August 2019.
https://hal.inria.fr/hal-02275389
[85]
L. Perrin.
Russian Style (Lack of ) Randomness, December 2019, working paper or preprint.
https://hal.inria.fr/hal-02396756
[86]
L. Perrin.
Streebog and Kuznyechik: Inconsistencies in the Claims of their Designers, July 2019, IETF 105.
https://hal.inria.fr/hal-02396671