EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1A. Canteaut, B. Chevallier-Mames, A. Gouget, P. Paillier, T. Pornin, E. Bresson, C. Clavier, T. Fuhr, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, J.-R. Reinhard, C. Thuillet, M. Videau.

    Shabal, a Submission to NIST's Cryptographic Hash Algorithm Competition, October 2008, Submission to NIST.
  • 2A. Canteaut, M. Naya-Plasencia, B. Vayssière.

    Sieve-in-the-Middle: Improved MITM Attacks, in: Advances in Cryptology - CRYPTO 2013, Part I, Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 222–240.
  • 3A. Canteaut, J. Roué.

    On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.

    https://hal.inria.fr/hal-01104051
  • 4K. Chakraborty, A. Chailloux, A. Leverrier.

    Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]

    https://hal.inria.fr/hal-01237241
  • 5P. Charpin, G. Kyureghyan, V. Suder.

    Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]

    https://hal.archives-ouvertes.fr/hal-01068860
  • 6N. Courtois, M. Finiasz, N. Sendrier.

    How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174.
  • 7I. Dinur, G. Leurent.

    Improved Generic Attacks Against Hash-based MACs and HAIFA, in: Advances in Cryptology - CRYPTO 2014, Santa Barbara, CA, United States, LNCS, Springer, August 2014, vol. 8616. [ DOI : 10.1007/978-3-662-44371-2_9 ]

    https://hal.archives-ouvertes.fr/hal-01086177
  • 8J.-C. Faugère, A. Otmani, L. Perret, J.-P. Tillich.

    Algebraic Cryptanalysis of McEliece Variants with Compact Keys, in: Advances in Cryptology - EUROCRYPT 2010, LNCS, Springer, 2010, no 6110, pp. 279-298.

    http://dx.doi.org/10.1007/978-3-642-13190-5_14
  • 9P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, E. Diamanti.

    Experimental demonstration of long-distance continuous-variable quantum key distribution, in: Nature Photonics, 2013, vol. 7, pp. 378-381. [ DOI : 10.1038/nphoton.2013.63 ]

    https://hal.archives-ouvertes.fr/hal-00798855
  • 10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. Barreto.

    MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.

    https://hal.inria.fr/hal-00870929
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 12D. Aharonov, A. Chailloux, M. Ganz, I. Kerenidis, L. Magnin.

    A simpler proof of existence of quantum weak coin flipping with arbitrarily small bias, in: SIAM Journal on Computing, May 2016, 48 p. [ DOI : 10.1137/14096387X ]

    https://hal.inria.fr/hal-01094114
  • 13C. Boura, A. Canteaut, L. R. Knudsen, G. Leander.

    Reflection ciphers, in: Designs, Codes and Cryptography, January 2016, pp. 1-23. [ DOI : 10.1007/s10623-015-0143-x ]

    https://hal.inria.fr/hal-01237135
  • 14N. Cepak, P. Charpin, E. Pasalic.

    Permutations via linear translators, in: Finite Fields and Their Applications, 2017.

    https://hal.inria.fr/hal-01412487
  • 15A. Chailloux, G. Gutoski, J. Sikora.

    Optimal bounds for quantum weak oblivious transfer, in: Chicago Journal of Theoretical Computer Science, September 2016. [ DOI : 10.4086/cjtcs.2016.013 ]

    https://hal.archives-ouvertes.fr/hal-00927537
  • 16K. Chakraborty, A. Chailloux, A. Leverrier.

    Robust Relativistic Bit Commitment, in: Physical Review A, December 2016. [ DOI : 10.1103/PhysRevA.94.062314 ]

    https://hal.inria.fr/hal-01409562
  • 17K. Chakraborty, S. Sarkar, S. Maitra, B. Mazumdar, D. Mukhopadhyay, E. Prouff.

    Redefining the transparency order, in: Designs, Codes and Cryptography, 2016. [ DOI : 10.1007/s10623-016-0250-3 ]

    https://hal.archives-ouvertes.fr/hal-01399584
  • 18P. Charpin, G. M. Kyureghyan.

    On sets determining the differential spectrum of mappings, in: International journal of information and Coding Theory, 2017, Special issue on the honor of Gerard Cohen.

    https://hal.inria.fr/hal-01406589
  • 19P. Charpin, S. Mesnager, S. Sarkar.

    Involutions over the Galois field F2n, in: IEEE Transactions on Information Theory, 2016, vol. 62, no 4. [ DOI : 10.1109/TIT.2016.2526022 ]

    https://hal.inria.fr/hal-01272943
  • 20I. Dinur, G. Leurent.

    Improved Generic Attacks Against Hash-Based MACs and HAIFA, in: Algorithmica, November 2016. [ DOI : 10.1007/s00453-016-0236-6 ]

    https://hal.inria.fr/hal-01407953
  • 21J.-C. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.-P. Tillich.

    Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups, in: IEEE Transactions on Information Theory, 2016, vol. 62, no 1, pp. 184 - 198. [ DOI : 10.1109/TIT.2015.2493539 ]

    https://hal.inria.fr/hal-01244609
  • 22J.-C. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.-P. Tillich.

    Structural Cryptanalysis of McEliece Schemes with Compact Keys, in: Designs, Codes and Cryptography, April 2016, vol. 79, no 1, pp. 87-112. [ DOI : 10.1007/s10623-015-0036-z ]

    https://hal.inria.fr/hal-00964265
  • 23M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.

    Quantum Differential and Linear Cryptanalysis, in: IACR Transactions on Symmetric Cryptology, 2016, vol. 2016, no 1.

    https://hal.inria.fr/hal-01237242
  • 24W. Mc Cutcheon, A. Pappa, B. A. Bell, A. Mcmillan, A. Chailloux, T. Lawson, M. S. Mafu, D. Markham, E. Diamanti, I. Kerenidis, J. Rarity, M. Tame.

    Experimental verification of multipartite entanglement in quantum networks, in: Nature Communications, November 2016, vol. 7, 8 p. [ DOI : 10.1038/ncomms13251 ]

    https://hal.inria.fr/hal-01409559
  • 25I. Márquez-Corbella, R. Pellikaan.

    A characterization of MDS codes that have an error correcting pair, in: Finite Fields and Their Applications, 2016, vol. 40, pp. 224 - 245. [ DOI : 10.1016/j.ffa.2016.04.004 ]

    https://hal.inria.fr/hal-01408412

Invited Conferences

  • 26C. Boura, A. Canteaut.

    Another view of the division property, in: Symmetric Cryptography (Dagstuhl Seminar 16021), Dagstuhl, Germany, January 2016.

    https://hal.inria.fr/hal-01401320
  • 27A. Canteaut.

    Algebraic Distinguishers against Symmetric Primitives, in: Paris Crypto Day, Paris, France, June 2016.

    https://hal.inria.fr/hal-01401286
  • 28A. Canteaut.

    Chiffrer mieux pour (dé)chiffrer plus, in: Conférence d’Informatique de l'ENS, Paris, France, April 2016.

    https://hal.inria.fr/hal-01401333
  • 29A. Canteaut.

    Comment concevoir un algorithme de chiffrement sûr et efficace : l'héritage de Shannon, in: Théorie de l’information : nouvelles frontières (dans le cadre du centenaire de Claude Shannon), Paris, France, IHP, October 2016.

    https://hal.inria.fr/hal-01401325
  • 30A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.

    Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: CryptoAction Symposium 2016, Budapest, Hungary, April 2016.

    https://hal.inria.fr/hal-01401328
  • 31A. Chailloux.

    Cryptographie relativiste, in: CCA 2016, Paris, France, July 2016.

    https://hal.inria.fr/hal-01409564
  • 32V. Lallemand.

    Cryptanalysis of the FLIP Family of Stream Ciphers, in: Paris Crypto Day, Paris, France, September 2016.

    https://hal.inria.fr/hal-01405423
  • 33G. Leurent.

    Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: TCCM-CACR 2016, Yinchuan, China, August 2016.

    https://hal.inria.fr/hal-01407929
  • 34G. Leurent.

    Transcript Collision Attacks, in: Symmetric Cryptography (Dagstuhl Seminar 16021), Dagstuhl, Germany, January 2016.

    https://hal.inria.fr/hal-01407921
  • 35A. Leverrier.

    Distributing Secret Keys with Quantum Continuous Variables, in: Recent Advances in Continuous-variable Quantum Information Theory, Barcelone, Spain, April 2016.

    https://hal.inria.fr/hal-01407434
  • 36A. Leverrier.

    Quantum Expander Codes, in: Beyond i.i.d. in Information Theory, Barcelone, Spain, July 2016.

    https://hal.inria.fr/hal-01407431
  • 37J.-P. Tillich.

    Attaining the capacity with Reed-Solomon codes through the (U|U+V)construction and Koetter-Vardy soft decoding, in: Journée Claude Shannon, Paris, France, François Baccelli, Marc Lelarge, July 2016.

    https://hal.inria.fr/hal-01413503

International Conferences with Proceedings

  • 38M. Bardet, J. Chaulet, V. Dragoi, A. Otmani, J.-P. Tillich.

    Cryptanalysis of the McEliece Public Key Cryptosystem based on Polar Codes, in: Post-Quantum Cryptography - PQCrypto 2016, Fukuoka, Japan, T. Takagi (editor), LNCS - Lecture Notes in Computer Science, Springer, February 2016, vol. 9606. [ DOI : 10.1007/978-3-319-29360-8_9 ]

    https://hal.inria.fr/hal-01240856
  • 39M. Bardet, V. Dragoi, A. Otmani, J.-P. Tillich.

    Algebraic properties of polar codes from a new polynomial formalism, in: International Symposium on Information Theory ISIT 2016, Barcelona, Spain, July 2016, pp. 230 - 234. [ DOI : 10.1109/ISIT.2016.7541295 ]

    https://hal.inria.fr/hal-01410210
  • 40K. Bhargavan, G. Leurent.

    On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]

    https://hal.inria.fr/hal-01404208
  • 42C. Boura, A. Canteaut.

    Another View of the Division Property, in: Crypto 2016 (part I) - 36th Annual International Cryptology Conference, Santa Barbara, United States, Lecture Notes in Computer Science, Springer, August 2016, vol. 9814, pp. 654 - 682. [ DOI : 10.1007/978-3-662-53018-4_24 ]

    https://hal.inria.fr/hal-01401016
  • 43C. Boura, A. Chakraborti, G. Leurent, G. Paul, D. Saha, H. Soleimany, V. Suder.

    Key Recovery Attack Against 2.5-Round Pi-Cipher, in: FSE 2016 - 23rd International Conference Fast Software Encryption, Bochum, Germany, T. Peyrin (editor), LNCS - Lecture Notes in Computer Science, Springer, March 2016, vol. 9783, pp. 535 - 553. [ DOI : 10.1007/978-3-662-52993-5_27 ]

    https://hal.inria.fr/hal-01404164
  • 44A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.

    Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: FSE 2016 : 23rd International Conference on Fast Software Encryption, Bochum, Germany, Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016,, Springer, March 2016, vol. 9783 - LNCS (Lecture Notes in Computer Science), pp. 313-333. [ DOI : 10.1007/978-3-662-52993-5_16 ]

    https://hal.archives-ouvertes.fr/hal-01280479
  • 45A. Canteaut, Y. Rotella.

    Attacks Against Filter Generators Exploiting Monomial Mappings, in: Fast Software Encrytion - FSE 2016, Bochum, Germany, Lecture Notes in Computer Science, Springer, March 2016, vol. 9783, pp. 78 - 98. [ DOI : 10.1007/978-3-662-52993-5_5 ]

    https://hal.inria.fr/hal-01401009
  • 46R. Canto Torres, N. Sendrier.

    Analysis of Information Set Decoding for a Sub-linear Error Weight, in: Post-Quantum Cryptography - PQCrypto 2016, Fukuoka, Japan, February 2016.

    https://hal.inria.fr/hal-01244886
  • 47J. Chaulet, N. Sendrier.

    Worst case QC-MDPC decoder for McEliece cryptosystem, in: IEEE International Symposium on Information Theory, ISIT 2016, Barcelone, Spain, ISIT 2016, proceedings, July 2016, 5 p. [ DOI : 10.1109/ISIT.2016.7541522 ]

    https://hal.inria.fr/hal-01408633
  • 48S. Duval, V. Lallemand, Y. Rotella.

    Cryptanalysis of the FLIP Family of Stream Ciphers, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9814, pp. 457 - 475. [ DOI : 10.1007/978-3-662-53018-4_17 ]

    https://hal.inria.fr/hal-01404145
  • 49P. Gaborit, A. Hauteville, J.-P. Tillich.

    RankSynd a PRNG Based on Rank Metric, in: Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, T. Takagi (editor), Lecture Notes in Computer Science, Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Springer, February 2016, vol. 9606, pp. 18-28. [ DOI : 10.1007/978-3-319-29360-8_2 ]

    https://hal.inria.fr/hal-01289338
  • 50S. Gueron, N. Mouha.

    Simpira v2: A Family of Efficient Permutations Using the AES Round Function, in: Advances in Cryptology - ASIACRYPT 2016, Hanoi, Vietnam, Lecture Notes in Computer Science, December 2016, vol. 10031, pp. 95-125. [ DOI : 10.1007/978-3-662-53887-6_4 ]

    https://hal.inria.fr/hal-01403414
  • 51M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.

    Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]

    https://hal.inria.fr/hal-01404196
  • 52L. Khati, N. Mouha, D. Vergnaud.

    Full Disk Encryption: Bridging Theory and Practice, in: CT-RSA 2017 - RSA Conference Cryptographers' Track, San Francisco, United States, Lecture Notes in Computer Science, February 2017, 16 p.

    https://hal.inria.fr/hal-01403418
  • 53B. Lac, M. Beunardeau, A. Canteaut, J. J. A. Fournier, R. Sirdey.

    A First DFA on PRIDE: from Theory to Practice, in: International Conference on Risks and Security of Internet and Systems - CRISIS 2016, Roscoff, France, Lecture Notes in Computer Science, September 2016.

    https://hal.inria.fr/hal-01401271
  • 54G. Leurent.

    Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning, in: EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic, Vienna, Austria, M. Fischlin, J.-S. Coron (editors), Springer, May 2016, pp. 344 - 371. [ DOI : 10.1007/978-3-662-49890-3_14 ]

    https://hal.inria.fr/hal-01404221
  • 55I. Márquez-Corbella, E. Martínez-Moro.

    Betti Numbers and Generalized Hamming Weights, in: 22nd Conference on Applications of Computer Algebra (ACA 2016), Kassel, Germany, August 2016.

    https://hal.inria.fr/hal-01409298
  • 56I. Márquez-Corbella, R. Pellikaan.

    Is it hard to retrieve an error-correcting pair?, in: 22nd Conference on Applications of Computer Algebra (ACA 2016), Kassel, Germany, August 2016.

    https://hal.inria.fr/hal-01409299
  • 57I. Márquez-Corbella, J.-P. Tillich.

    Using Reed-Solomon codes in the (U | U + V ) construction and an application to cryptography, in: International Symposium on Information Theory, Barcelona, Spain, July 2016.

    https://hal.inria.fr/hal-01410201

Conferences without Proceedings

  • 59A. Leverrier, J.-P. Tillich, G. Zémor.

    Quantum Expander Codes, in: 19th International Conference on Quantum Information Processing, Banff, Canada, January 2016.

    https://hal.inria.fr/hal-01244685
  • 60J.-P. Tillich.

    Attaining the capacity with Reed-Solomon codes through the (U|U+V)construction and Koetter-Vardy soft decoding, in: CohenFest 2016, Paris, France, July 2016.

    https://hal.inria.fr/hal-01413506

Scientific Books (or Scientific Book chapters)

  • 61P. Charpin, S. Mesnager, S. Sarkar.

    Dickson Polynomials that are Involutions, in: Contemporary Developments in Finite Fields and Their Applications, A. Canteaut, G. Effinger, S. Huczynska, D. Panario, L. Storme (editors), World Scientific Press, 2016, pp. 22-45. [ DOI : 10.1142/9789814719261_0003 ]

    https://hal.inria.fr/hal-01237332

Books or Proceedings Editing

  • 62A. Canteaut, G. Effinger, S. Huczynska, D. Panario, L. Storme (editors)

    Contemporary Developments in Finite Fields and Applications , World Scientific, August 2016, 362 p. [ DOI : 10.1142/9762 ]

    https://hal.inria.fr/hal-01401266
  • 63P. Charpin, T. Johansson, G. M. Kyureghyan, N. Sendrier, J.-P. Tillich (editors)

    Special issue on coding and cryptography, Design, Codes and Cryptography - Special issue on coding and cryptography, Springer, 2016. [ DOI : 10.1007/s10623-016-0307-3 ]

    https://hal.archives-ouvertes.fr/hal-01406954

Internal Reports

  • 64A. Canteaut, S. Duval, L. Perrin.

    A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 24k+2, IACR Cryptology ePrint Archive, September 2016, no 2016/887, 29 p.

    https://hal.inria.fr/hal-01401245

Scientific Popularization

Other Publications