EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1A. Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, J.-R. Reinhard, C. Thuillet, M. Videau.

    Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, October 2008, Submission to NIST.
  • 2A. Canteaut, M. Videau.

    Symmetric Boolean functions, in: IEEE Transactions on Information Theory, 2005, vol. 51, no 8, p. 2791–2811.
  • 3P. Charpin, G. Gong.

    Hyperbent functions, Kloosterman sums and Dickson polynomials, in: IEEE Transactions on Information Theory, September 2008, vol. 54, no 9, p. 4230-4238, Regular paper.
  • 4P. Charpin, T. Helleseth, V. Zinoviev.

    Divisibility properties of classical binary Kloosterman sums, in: Discrete Mathematics, June 2009, vol. 309, no 12, p. 3975-3984.
  • 5N. Courtois, M. Finiasz, N. Sendrier.

    How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, p. 157–174.
  • 6F. Didier, J.-P. Tillich.

    Computing the algebraic immunity efficiently, in: Fast Software Encryption - FSE 2006, LNCS, Springer, 2006, vol. 4047, p. 359-374.
  • 7J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich.

    Algebraic Cryptanalysis of McEliece Variants with Compact Keys, in: Advances in Cryptology - EUROCRYPT 2010, LNCS, Springer, 2010, no 6110, p. 279-298.

    http://dx.doi.org/10.1007/978-3-642-13190-5_14
  • 8R. Overbeck, N. Sendrier.

    Code-based cryptography, in: Post-Quantum Cryptography, Springer, 2009, p. 95-145.
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 9C. Blondeau.

    La cryptanalyse différentielle et ses généralisations, Université Pierre et Marie Curie, Paris, November 2011.
  • 10V. Herbert.

    Des Codes Correcteurs pour Sécuriser l'Information Numérique, Université Pierre et Marie Curie, Paris, December 2011.

Articles in International Peer-Reviewed Journal

  • 11C. Blondeau, A. Canteaut, P. Charpin.

    Differential Properties of xx 2 t -1 , in: IEEE Transactions on Information Theory, 2011, to appear.

    http://hal.inria.fr/hal-00610099/en
  • 12C. Blondeau, B. Gérard, J.-P. Tillich.

    Accurate estimates of the data complexity and success probability for various cryptanalyses, in: Designs Codes and Cryptography / Designs Codes and Cryptography An International Journal, 2011, vol. 59, no 1-3, p. 3-34, 36 pages.

    http://dx.doi.org/10.1007/s10623-010-9452-2
  • 13A. Canteaut, M. Naya-Plasencia.

    Parity-check relations on combination generators, in: IEEE Transactions on Information Theory, 2011, to appear.
  • 14P. Charpin, S. Sarkar.

    Polynomials with Linear Structure and Maiorana-McFarland Construction, in: IEEE Transactions on Information Theory, 2011, vol. 57, no 6, p. 3796–3804.

Invited Conferences

  • 15A. Canteaut.

    De l'espérance de vie d'un algorithme symétrique (ou l'AES dix ans après), in: Journées CRYPTIS, Limoges, France, November 2011.

    http://www.cryptis.fr/programme-25ans.html
  • 16N. Sendrier.

    A Survey of Code-based Cryptography, in: The São Paulo Advanced School of Cryptography, University of Campinas, Brazil, October 2011.
  • 17N. Sendrier.

    Decoding One Out of Many, in: Algebraic Coding Theory, CI Bernouilli, EPFL, Lausanne, September 2011.
  • 18N. Sendrier.

    The Tightness of Security Reductions in Code-based Cryptography, in: IEEE Information Theory Workshop - ITW 2011, Paraty, Brazil, October 2011, p. 415-419.
  • 19J.-P. Tillich.

    Quantum turbo codes with unbounded minimum distance and excellent error-reducing performance, in: Workshop on Quantum Information: Codes, Geometry and Random Structures, CRM, Université de Montréal, Québec, October 2011.

International Conferences with Proceedings

  • 20M. Abbara, J.-P. Tillich.

    Quantum turbo codes with unbounded minimum distance and excellent error-reducing performance, in: IEEE Information Theory Workshop - ITW 2011, Paraty, Brazil, October 2011.
  • 21M. A. Abdelraheem, C. Blondeau, M. Naya-Plasencia, M. Videau, E. Zenner.

    Cryptanalysis of ARMADILLO2, in: Advances in cryptology - ASIACRYPT 2011, Séoul, Korea, Republic Of, LNCS, Springer, 2011, vol. 7073, p. 308-326.

    http://hal.inria.fr/inria-00619236/en
  • 22P. S. Barreto, R. Lindner, R. Misoczki.

    Monoidic Codes in Cryptography, in: Post-Quantum Cryptography - PQCrypto 2011, LNCS, Springer, 2011, vol. 7071, p. 179-199.
  • 23C. Blondeau, B. Gérard.

    Multiple Differential Cryptanalysis: Theory and Practice, in: Fast Software Encryption - FSE 2011, Lyngby, Denmark, LNCS, Springer, 2011, vol. 6733, p. 35-54.

    http://hal.inria.fr/hal-00610107/en
  • 24C. Boura, A. Canteaut, C. De Cannière.

    Higher-order differential properties of Keccak and Luffa, in: Fast Software Encryption - FSE 2011, Lyngby, Denmark, LNCS, Springer, 2011, vol. 6733, p. 252–269.
  • 25J.-C. Faugère, V. Gauthier-Umana, A. Otmani, L. Perret, J.-P. Tillich.

    A Distinguisher for High Rate McEliece Cryptosystems, in: IEEE Information Theory Workshop - ITW 2011, Paraty, Brazil, October 2011.
  • 26V. Herbert, S. Sarkar.

    On the Triple-Error-Correcting Cyclic Codes with Zero Set {1,2 i +1,2 j +1}, in: Cryptography and Coding - IMACC 2011, Oxford, UK, LNCS, Springer, 2011, vol. 7089, p. 79-96.

    http://dx.doi.org/10.1007/978-3-642-25516-8_6
  • 27A. Otmani, J.-P. Tillich.

    An Efficient Attack on All Concrete KKS Proposals, in: Post-Quantum Cryptography - PQCrypto 2011, LNCS, Springer, 2011, vol. 7071, p. 98-116.
  • 28N. Sendrier.

    Decoding One out of Many, in: Post-Quantum Cryptography - PQCrypto 2011, LNCS, Springer, 2011, vol. 7071, p. 51-67.

Conferences without Proceedings

  • 29M. Abbara, J.-P. Tillich.

    Quantum serial turbo-like codes with minimum distance growing polynomially in the code length, in: 14th Workshop on Quantum Information Processing (QIP 2011), The Capella, Santosa Singapore, January 2011, Poster.
  • 30C. Blondeau, A. Canteaut, P. Charpin.

    Differential properties of xx 2 t -1 , in: Finite Fields and Applications - Fq10, Gent, Belgium, July 2011.
  • 31C. Boura, A. Canteaut.

    On the algebraic degree of iterated permutations, in: Finite Fields and Applications - Fq10, Gent, Belgium, July 2011.

Scientific Books (or Scientific Book chapters)

  • 32A. Canteaut.

    Articles: A5/1, Berlekamp-Massey algorithm, Combination generator, Correlation attack, Fast correlation attack, Filter generator, Inversion attack, Linear complexity, Linear consistency attack, Linear cryptanalysis for stream ciphers, Linear feedback shift register, Linear syndrome attack, Minimal polynomial, Running-key, Stream cipher, in: Encyclopedia of cryptography and security - 2nd edition, H. van Tilborg, S. Jajodia (editors), Springer, 2011.

    http://dx.doi.org/10.1007/978-1-4419-5906-5
  • 33P. Charpin.

    Articles: Cyclic codes, Reed-Muller codes, in: Encyclopedia of cryptography and security - 2nd edition, H. van Tilborg, S. Jajodia (editors), Springer, 2011.

    http://dx.doi.org/10.1007/978-1-4419-5906-5
  • 34M. Finiasz, N. Sendrier.

    Article: Digital Signature Scheme Based on McEliece, in: Encyclopedia of Cryptography and Security – Second Edition, H. van Tilborg, S. Jajodia (editors), Springer, 2011.

    http://dx.doi.org/10.1007/978-1-4419-5906-5
  • 35P. Gaborit, N. Sendrier.

    Article: Code-based Signature Schemes, in: Encyclopedia of Cryptography and Security – Second Edition, H. van Tilborg, S. Jajodia (editors), Springer, 2011.

    http://dx.doi.org/10.1007/978-1-4419-5906-5
  • 36B. Gérard, J.-P. Tillich.

    Using Tools from Error Correcting Theory in Linear Cryptanalysis, in: Advanced Linear Cryptanalysis of Block and Stream Ciphers, P. Junod, A. Canteaut (editors), Cryptology and Information Security Series, IOS Press, October 2011, vol. 7, p. 87-114.

    http://dx.doi.org/10.1007/978-1-4419-5906-5
  • 37N. Sendrier.

    Articles: Code-based Cryptography; McEliece Public Key Cryptosystem; Niederreiter Encryption Scheme, in: Encyclopedia of cryptography and security - 2nd edition, H. van Tilborg, S. Jajodia (editors), Springer, 2011.

    http://dx.doi.org/10.1007/978-1-4419-5906-5

Books or Proceedings Editing

  • 38D. Augot, A. Canteaut (editors)

    Workshop on Coding and Cryptography - WCC 2011, INRIA, 2011, Proceedings of WCC 2011, April 11-15, Paris.
  • 39P. Charpin, A. Kholosha, E. Rosnes, M. G. Parker (editors)

    Special issue in Coding and Cryptography, Designs, Codes and Cryptography, Springer-Verlag, 2011, vol. 59 (1–3).

    http://www.springerlink.com/content/0925-1022/59/1-3/
  • 40P. Junod, A. Canteaut (editors)

    Advanced Linear Cryptanalysis of Block and Stream Ciphers, Cryptology and Information Security Series, IOS Press, October 2011, vol. 7.

Internal Reports

Other Publications

  • 46C. Pennarum.

    Fonctions booléennes et applications en cryptographie: un tour de piste, Université de Bordeaux, June 2011, Direction: Pascale Charpin.
  • 47V. Suder.

    Les permutations et leurs inverses en cryptographie symétrique, Université de Limoges, September 2011, 37 pages. Direction: Pascale Charpin.