EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1J. Bi, Q. Cheng, M. Rojas.

    Sub-linear root detection, and new hardness results, for sparse polynomials over finite fields, in: ISSAC '13 - 38th international symposium on International symposium on symbolic and algebraic computation, Boston, United States, M. B. Monagan, G. Cooperman, M. Giesbrecht (editors), ACM, June 2013, pp. 61-68. [ DOI : 10.1145/2465506.2465514 ]

    http://hal.inria.fr/hal-00922224
  • 2J. Bi, J.-S. Coron, J.-C. Faugère, P. Q. Nguyen, G. Renault, R. Zeitoun.

    Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences, in: PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, Buenos Aires, Argentina, Springer, 2014.

    http://hal.inria.fr/hal-00926902
  • 3J. Bi, M. Liu, X. Wang.

    Cryptanalysis of a homomorphic encryption scheme from ISIT 2008, in: ISIT 2012 - IEEE International Symposium on Information Theory, Cambridge, États-Unis, IEEE, July 2012, pp. 2152 - 2156. [ DOI : 10.1109/ISIT.2012.6283832 ]

    http://hal.inria.fr/hal-00922226
  • 4Y. Chen, P. Q. Nguyen.

    Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers, in: EUROCRYPT 2012, Cambridge, Royaume-Uni, D. Pointcheval, T. Johansson (editors), Lecture Notes in Computer Science, Springer, April 2012, vol. 7237, pp. 502-519. [ DOI : 10.1007/978-3-642-29011-4_30 ]

    http://hal.inria.fr/hal-00864374
  • 5L. Ducas, P. Q. Nguyen.

    Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic, in: ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, Chine, X. Wang, K. Sako (editors), Lecture Notes in Computer Science, Springer, December 2012, vol. 7658, pp. 415-432. [ DOI : 10.1007/978-3-642-34961-4_26 ]

    http://hal.inria.fr/hal-00864360
  • 6L. Ducas, P. Q. Nguyen.

    Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures, in: ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, Chine, X. Wang, K. Sako (editors), Lecture Notes in Computer Science, Springer, December 2012, vol. 7658, pp. 433-450. [ DOI : 10.1007/978-3-642-34961-4_27 ]

    http://hal.inria.fr/hal-00864359
  • 7K. Jia, L. Li, C. Rechberger, J. Chen, X. Wang.

    Improved Cryptanalysis of the Block Cipher KASUMI, in: SAC 2012 - 19th International Conference Selected Areas in Cryptography, Windsor, Canada, L. R. Knudsen, H. Wu (editors), Lecture Notes in Computer Science, Springer, August 2012, vol. 7707, pp. 222-233. [ DOI : 10.1007/978-3-642-35999-6_15 ]

    http://hal.inria.fr/hal-00922230
  • 8T. Johansson, P. Q. Nguyen.

    Advances in Cryptology – EUROCRYPT 2013, Lecture Notes in Computer Science, Springer, May 2013, vol. 7881, 736 p. [ DOI : 10.1007/978-3-642-38348-9 ]

    http://hal.inria.fr/hal-00922221
  • 9L. Li, K. Jia, X. Wang.

    Improved Single-Key Attacks on 9-Round AES-192/256, in: FSE 2014 (21st International Workshop on Fast Software Encryption), Londres, United Kingdom, Lecture Notes in Computer Science, Springer, March 2014.

    http://hal.inria.fr/hal-00936032
  • 10Y. Liu, L. Li, D. Gu, X. Wang, Z. Liu, J. Chen, W. Li.

    New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia, in: FSE 2012 - 19th International Workshop Fast Software Encryption, Washington, États-Unis, A. Canteaut (editor), Lecture Notes in Computer Science, Springer, March 2012, vol. 7549. [ DOI : 10.1007/978-3-642-34047-5_6 ]

    http://hal.inria.fr/hal-00922229
  • 11X. Wang, K. Sako.

    Advances in Cryptology - ASIACRYPT 2012, Lecture Notes in Computer Science, Springer, December 2012, vol. 7658, 780 p. [ DOI : 10.1007/978-3-642-34961-4 ]

    http://hal.inria.fr/hal-00922232
  • 12H. Yu, J. Chen, X. Wang.

    The Boomerang Attacks on the Round-Reduced Skein-512, in: SAC 2012 - 19th International Conference Selected Areas in Cryptography, Windsor, Canada, L. R. Knudsen, H. Wu (editors), Lecture Notes in Computer Science, Springer, August 2012, vol. 7707, pp. 287-303. [ DOI : 10.1007/978-3-642-35999-6_19 ]

    http://hal.inria.fr/hal-00922231
Publications of the year

Articles in International Peer-Reviewed Journals

  • 13M. Liu, X. Wang, G. Xu, X. Zheng.

    A note on BDD problems with λ2-gap, in: Information Processing Letters, 2014, vol. 114, no 1-2, pp. 9-12. [ DOI : 10.1016/j.ipl.2013.10.004 ]

    http://hal.inria.fr/hal-00922234
  • 14A. Wang, M. Chen, Z. Wang, X. Wang.

    Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently, in: IEEE Transactions on Circuits and Systems. Part II, Express Briefs, July 2013, vol. 60-II, no 8, pp. 517-521. [ DOI : 10.1109/TCSII.2013.2268379 ]

    http://hal.inria.fr/hal-00922227
  • 15W. Wei, C. Tian, X. Wang.

    New transference theorems on lattices possessing n⌃ϵ-unique shortest vectors, in: Discrete Mathematics, February 2014, vol. 315-316, pp. 144-155. [ DOI : 10.1016/j.disc.2013.10.020 ]

    http://hal.inria.fr/hal-00922225

Invited Conferences

  • 16P. Q. Nguyen.

    Abstracting Lattice-based Cryptography, in: Workshop on Algebraic Aspects of Cryptography, Fukuoka, Japan, August 2013.

    http://hal.inria.fr/hal-00932567
  • 17P. Q. Nguyen.

    Lattices and Finite Groups: Mathematics, Complexity and Cryptography, in: Workshop on Number Theory, Geometry and Cryptography, Warwick, United Kingdom, July 2013.

    http://hal.inria.fr/hal-00932569

International Conferences with Proceedings

  • 18D. Bai, H. Yu, G. Wang, X. Wang.

    Improved Boomerang Attacks on SM3, in: ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Brisbane, Australia, C. Boyd, L. Simpson (editors), Lecture Notes in Computer Science, Springer, July 2013, vol. 7959, pp. 251-266. [ DOI : 10.1007/978-3-642-39059-3_17 ]

    http://hal.inria.fr/hal-00922228
  • 20J. Bi, J.-S. Coron, J.-C. Faugère, P. Q. Nguyen, G. Renault, R. Zeitoun.

    Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences, in: PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, Buenos Aires, Argentina, Springer, 2014.

    http://hal.inria.fr/hal-00926902
  • 21G. Hu, Y. Pan.

    Improvements on Reductions among DIfferent Variants SVP and CVP, in: WISA 2013 - 14th International Workshop on Information Security Applications, Jeju Island, Korea, Republic Of, Y. Kim, H. Lee, A. Perrig (editors), Lecture Notes in Computer Science, Springer, August 2013.

    http://hal.inria.fr/hal-00932449
  • 22G. Hu, Y. Pan, F. Zhang.

    Solving Random Subset Sum Problem by l_p-norm SVP Oracle, in: PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (2014), Buenos Aires, Argentina, Springer, March 2014.

    http://hal.inria.fr/hal-00936030
  • 23L. Li, K. Jia, X. Wang.

    Improved Single-Key Attacks on 9-Round AES-192/256, in: FSE 2014 (21st International Workshop on Fast Software Encryption), Londres, United Kingdom, Lecture Notes in Computer Science, Springer, March 2014.

    http://hal.inria.fr/hal-00936032
  • 24M. Liu, P. Q. Nguyen.

    Solving BDD by Enumeration: An Update, in: CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco, United States, E. Dawson (editor), Lecture Notes in Computer Science, Springer, February 2013, vol. 7779, pp. 293-309. [ DOI : 10.1007/978-3-642-36095-4_19 ]

    http://hal.inria.fr/hal-00864361
  • 25F. Zhang, Y. Pan, G. Hu.

    A Three-Level Sieve Algorithm for the Shortest Vector Problem, in: SAC 2013 - 20th International Conference on Selected Areas in Cryptography, Burnaby, Canada, T. Lange, K. Lauter, P. Lisonek (editors), Springer, August 2013, vol. Lecture Notes in Computer Science.

    http://hal.inria.fr/hal-00932455

Books or Proceedings Editing

  • 26T. Johansson, P. Q. Nguyen (editors)

    Advances in Cryptology – EUROCRYPT 2013, Lecture Notes in Computer Science, Springer, May 2013, vol. 7881, 736 p. [ DOI : 10.1007/978-3-642-38348-9 ]

    http://hal.inria.fr/hal-00922221
References in notes
  • 27A. Biryukov, D. Khovratovich.

    Related-Key Cryptanalysis of the Full AES-192 and AES-256, in: Proc. ASIACRYPT '09, Lecture Notes in Computer Science, Springer, 2009, vol. 5912, pp. 1-18.
  • 28A. Biryukov, D. Khovratovich, I. Nikolic.

    Distinguisher and Related-Key Attack on the Full AES-256, in: Proc. CRYPTO '09, Lecture Notes in Computer Science, Springer, 2009, vol. 5677, pp. 231-249.
  • 29Y. Chen, P. Q. Nguyen.

    BKZ 2.0: Better Lattice Security Estimates, in: Advances in Cryptology - Proc. ASIACRYPT '11, Lecture Notes in Computer Science, Springer, 2011.
  • 30N. Gama, P. Q. Nguyen, O. Regev.

    Lattice Enumeration Using Extreme Pruning, in: Advances in Cryptology - Proc. EUROCRYPT '10, Lecture Notes in Computer Science, Springer, 2010, vol. 6110, pp. 257-278.
  • 31S. Garg, C. Gentry, S. Halevi.

    Candidate Multilinear Maps from Ideal Lattices, in: Advances in Cryptology - Proc. EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic, Lecture Notes in Computer Science, Springer, 2013, vol. 7881, pp. 1-17.
  • 32S. Garg, C. Gentry, S. Halevi, M. Raykova, A. Sahai, B. Waters.

    Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits, in: 54th Annual IEEE Symposium on Foundations of Computer Science, Proc. FOCS 2013, 26-29 October, 2013, Berkeley, CA, USA, IEEE Computer Society, 2013, pp. 40-49.
  • 33C. Gentry.

    Fully homomorphic encryption using ideal lattices, in: Proc. STOC '09, ACM, 2009, pp. 169-178.
  • 34P. Sepehrdad, S. Vaudenay, M. Vuagnoux.

    Statistical Attack on RC4 - Distinguishing WPA, in: Proc. EUROCRYPT '11, Lecture Notes in Computer Science, Springer, 2011, vol. 6632, pp. 343-363.