Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
-
1F. Mouhartem.
Privacy-preserving cryptography from pairings and lattices, Université de Lyon, October 2018.
https://tel.archives-ouvertes.fr/tel-01913872 -
2W. Wen.
Contributions to the hardness foundations of lattice-based cryptography, Université de Lyon, November 2018.
https://tel.archives-ouvertes.fr/tel-01949339
Articles in International Peer-Reviewed Journals
-
3M. Abdalla, F. Benhamouda, A. Passelègue, K. Paterson.
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, in: Journal of Cryptology, October 2018, vol. 31, no 4, pp. 917-964. [ DOI : 10.1007/s00145-017-9274-8 ]
https://hal.inria.fr/hal-01723012 -
4B. Allombert, N. Brisebarre, A. Lasjaunias.
On a two-valued sequence and related continued fractions in power series fields, in: The Ramanujan Journal, 2018, vol. 45, no 3, pp. 859-871, https://arxiv.org/abs/1607.07235. [ DOI : 10.1007/s11139-017-9892-7 ]
https://hal.archives-ouvertes.fr/hal-01348576 -
5S. Bai, T. Lepoint, A. Roux-Langlois, A. Sakzad, D. Stehlé, R. Steinfeld.
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance, in: Journal of Cryptology, April 2018, vol. 31, no 2, pp. 610 - 640. [ DOI : 10.1007/s00145-017-9265-9 ]
https://hal.archives-ouvertes.fr/hal-01934177 -
6N. Brisebarre, S.-I. Filip, G. Hanrot.
A Lattice Basis Reduction Approach for the Design of Finite Wordlength FIR Filters, in: IEEE Transactions on Signal Processing, 2018, vol. 66, no 10, pp. 2673-2684. [ DOI : 10.1109/TSP.2018.2812739 ]
https://hal.inria.fr/hal-01308801 -
7F. Bréhard, N. Brisebarre, M. Joldes.
Validated and numerically efficient Chebyshev spectral methods for linear ordinary differential equations, in: ACM Transactions on Mathematical Software, July 2018, vol. 44, no 4, pp. 44:1-44:42. [ DOI : 10.1145/3208103 ]
https://hal.archives-ouvertes.fr/hal-01526272 -
8L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, D. Stehlé.
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme, in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018.
https://hal.archives-ouvertes.fr/hal-01934176 -
9G. Herold, E. Kirshanova, A. May.
On the asymptotic complexity of solving LWE, in: Designs, Codes and Cryptography, January 2018, vol. 86, no 1, pp. 55 - 83. [ DOI : 10.1007/s10623-016-0326-0 ]
https://hal.archives-ouvertes.fr/hal-01934181 -
10C.-P. Jeannerod, S. M. Rump.
On relative errors of floating-point operations: optimal bounds and applications, in: Mathematics of Computation, 2018, vol. 87, pp. 803-819. [ DOI : 10.1090/mcom/3234 ]
https://hal.inria.fr/hal-00934443 -
11B. Salvy.
Linear Differential Equations as a Data-Structure, in: Foundations of Computational Mathematics, 2018, pp. 1-35, https://arxiv.org/abs/1811.08616 - Based on an invited talk at FoCM'2017.
https://hal.inria.fr/hal-01940078 -
12A. Volkova, M. Istoan, F. de Dinechin, T. Hilaire.
Towards Hardware IIR Filters Computing Just Right: Direct Form I Case Study, in: IEEE Transactions on Computers, 2018. [ DOI : 10.1109/TC.2018.2879432 ]
https://hal.sorbonne-universite.fr/hal-01561052
Invited Conferences
-
13B. Salvy.
Recursive Combinatorial Structures: Enumeration, Probabilistic Analysis and Random Generation, in: STACS 2018 - 35th Symposium on Theoretical Aspects of Computer Science, Caen, France, February 2018, Tutorial. [ DOI : 10.4230/LIPIcs.STACS.2018.1 ]
https://hal.inria.fr/hal-01926094
International Conferences with Proceedings
-
14P. R. Arantes Gilz, F. Bréhard, C. Gazzino.
Validated Semi-Analytical Transition Matrices for Linearized Relative Spacecraft Dynamics via Chebyshev Series Approximations, in: SCITECH 2018 - AIAA Science and Technology Forum and Exposition, 28th Space Flight Mechanics Meeting, Kissimmee, United States, SCITECH 2018-AIAA Science and Technology Forum and Exposition, 28th Space Flight Mechanics Meeting, American Institute of Aeronautics and Astronautics, January 2018, pp. 1-23. [ DOI : 10.2514/6.2018-1960 ]
https://hal.archives-ouvertes.fr/hal-01540170 -
15S. Bai, D. Stehlé, W. Wen.
Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ, in: ASIACRYPT, Brisbane, Australia, 2018.
https://hal.archives-ouvertes.fr/hal-01934174 -
16D. Boneh, Y. Ishai, A. Passelègue, A. Sahai, D. J. Wu.
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications, in: TCC 2018 - Theory of Cryptography Conference, Goa, India, LNCS, Springer, November 2018, vol. 11240, pp. 699-729. [ DOI : 10.1007/978-3-030-03810-6_25 ]
https://hal.inria.fr/hal-01929288 -
17J. W. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. Schanck, P. Schwabe, G. Seiler, D. Stehlé.
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM, in: EuroS&P 2018 - IEEE European Symposium on Security and Privacy, London, United Kingdom, IEEE, April 2018, pp. 353-367. [ DOI : 10.1109/EuroSP.2018.00032 ]
https://hal.archives-ouvertes.fr/hal-01934169 -
18A. Bostan, F. Chyzak, P. Lairez, B. Salvy.
Generalized Hermite Reduction, Creative Telescoping and Definite Integration of D-Finite Functions, in: ISSAC 2018 - International Symposium on Symbolic and Algebraic Computation, New York, United States, July 2018, pp. 1-8. [ DOI : 10.1145/3208976.3208992 ]
https://hal.inria.fr/hal-01788619 -
19Z. Brakerski, A. Jain, I. Komargodski, A. Passelègue, D. Wichs.
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions, in: SCN 2018 - International Conference on Security and Cryptography for Networks, Amalfi, Italy, LNCS, Springer, September 2018, vol. 11035, pp. 425-441. [ DOI : 10.1007/978-3-319-98113-0_23 ]
https://hal.inria.fr/hal-01929279 -
20Z. Brakerski, E. Kirshanova, D. Stehlé, W. Wen.
Learning with Errors and Extrapolated Dihedral Cosets, in: PKC 2018 - 21st International Conference on Practice and Theory of Public Key Cryptography, Rio de Janeiro, Brazil, March 2018.
https://hal.archives-ouvertes.fr/hal-01934165 -
21N. Brisebarre, G. Constantinides, M. Ercegovac, S.-I. Filip, M. Istoan, J.-M. Muller.
A High Throughput Polynomial and Rational Function Approximations Evaluator, in: ARITH 2018 - 25th IEEE Symposium on Computer Arithmetic, Amherst, MA, United States, IEEE, June 2018, pp. 99-106. [ DOI : 10.1109/ARITH.2018.8464778 ]
https://hal.inria.fr/hal-01774364 -
22F. Bréhard.
A Newton-like Validation Method for Chebyshev Approximate Solutions of Linear Ordinary Differential Systems, in: ISSAC 2018 - 43rd International Symposium on Symbolic and Algebraic Computation, New York, United States, ISSAC 2018-43rd International Symposium on Symbolic and Algebraic Computation, ACM, July 2018, pp. 103-110. [ DOI : 10.1145/3208976.3209000 ]
https://hal.archives-ouvertes.fr/hal-01654396 -
23G. Castagnos, F. Laguillaumie, I. Tucker.
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo p, in: ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, T. Peyrin, S. Galbraith (editors), Advances in Cryptology – ASIACRYPT 2018, December 2018, vol. LNCS, no 11273, pp. 733-764.
https://hal.archives-ouvertes.fr/hal-01934296 -
24J. Chen, J. Gong, L. Kowalczyk, H. Wee.
Unbounded ABE via Bilinear Entropy Expansion, Revisited, in: EUROCRYPT 2018 - Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, J. B. Nielsen, V. Rijmen (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2018, vol. 10820, pp. 503-534. [ DOI : 10.1007/978-3-319-78381-9_19 ]
https://hal.inria.fr/hal-01899901 -
25J. Chen, J. Gong, H. Wee.
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 2018.
https://hal.inria.fr/hal-01900153 -
26J. Chen, D. Stehlé, G. Villard.
Computing an LLL-reduced Basis of the Orthogonal Lattice, in: ISSAC 2018, 43rd International Symposium on Symbolic and Algebraic Computation (ISSAC 2018), New York, United States, July 2018, https://arxiv.org/abs/1805.03418. [ DOI : 10.1145/3208976.3209013 ]
https://hal.archives-ouvertes.fr/hal-01921335 -
27C. Chuengsatiansup, C. Martindale.
Pairing-friendly twisted Hessian curves, in: Indocrypt 2018 - 19th International Conference on Cryptology, New Delhi, India, December 2018.
https://hal.archives-ouvertes.fr/hal-01934160 -
28L. Ducas, A. Pellet–Mary.
On the Statistical Leak of the GGH13 Multilinear Map and some Variants, in: Asiacrypt 2018, Brisbane, Australia, December 2018, pp. 465-493.
https://hal.archives-ouvertes.fr/hal-01895645 -
29J. Gong, B. Libert, S. C. Ramanna.
Compact IBBE and Fuzzy IBE from Simple Assumptions, in: SCN 2018 - 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, Security and Cryptography for Networks (SCN) 2018, September 2018, pp. 1-29.
https://hal.inria.fr/hal-01686690 -
30L. Grémy.
Higher dimensional sieving for the number field sieve algorithms, in: ANTS 2018 - Thirteenth Algorithmic Number Theory Symposium, Madison, United States, University of Wisconsin, July 2018, pp. 1-16.
https://hal.inria.fr/hal-01890731 -
31G. Herold, E. Kirshanova, T. Laarhoven.
Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving, in: PKC 2018 - 21st International Conference on Practice and Theory of Public Key Cryptography, Rio de Janeiro, Brazil, March 2018.
https://hal.archives-ouvertes.fr/hal-01934183 -
32C.-P. Jeannerod, J.-M. Muller, P. Zimmermann.
On various ways to split a floating-point number, in: ARITH 2018 - 25th IEEE Symposium on Computer Arithmetic, Amherst (MA), United States, IEEE, June 2018, pp. 53-60. [ DOI : 10.1109/ARITH.2018.8464793 ]
https://hal.inria.fr/hal-01774587 -
33M. Joye, A. Passelègue.
Function-Revealing Encryption: Definitions and Constructions, in: SCN 2018 - International Conference on Security and Cryptography for Networks, Amalfi, Italy, LNCS, Springer, September 2018, vol. 11035, pp. 527-543. [ DOI : 10.1007/978-3-319-98113-0_28 ]
https://hal.inria.fr/hal-01929272 -
34E. Kirshanova.
Improved Quantum Information Set Decoding, in: PQCrypto 2018 - The Ninth International Conference on Post-Quantum Cryptography, Fort Lauderdale, United States, April 2018.
https://hal.archives-ouvertes.fr/hal-01934186 -
35J. Li, J. Gong.
Improved Anonymous Broadcast Encryptions: Tight Security and Shorter Ciphertext, in: ACNS 2018 - 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, Springer, July 2018, pp. 497-515. [ DOI : 10.1007/978-3-319-93387-0_26 ]
https://hal.archives-ouvertes.fr/hal-01829132 -
36B. Libert, S. Ling, K. Nguyen, H. Wang.
Lattice-Based Zero-Knowledge Arguments for Integer Relations, in: CRYPTO 2018 - Annual International Cryptology Conference, Santa Barbara, United States, Springer, August 2018, vol. LNCS, no 10992, pp. 700-732. [ DOI : 10.1007/978-3-319-96881-0_24 ]
https://hal.inria.fr/hal-01911886 -
37B. Libert, T. Peters, C. Qian.
Logarithmic-Size Ring Signatures With Tight Security from the DDH Assumption, in: ESORICS 2018 - 23rd European Symposium on Research in Computer Security, Barcelone, Spain, LNCS, Springer, September 2018, vol. 11099, pp. 288-308. [ DOI : 10.1007/978-3-319-98989-1_15 ]
https://hal.inria.fr/hal-01848134 -
38B. Libert, D. Stehlé, R. Titiu.
Adaptively Secure Distributed PRFs from LWE, in: TCC 2018 - 16th International Conference on Theory of Cryptography, Panaji, India, LNCS, Springer, November 2018, vol. 11240, pp. 391-421. [ DOI : 10.1007/978-3-030-03810-6_15 ]
https://hal.inria.fr/hal-01911887 -
39A. Pellet–Mary.
Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model, in: Crypto 2018 - 38th International Cryptology Conference, Santa-Barbara, United States, Springer, August 2018, pp. 153-183. [ DOI : 10.1007/978-3-319-96878-0_6 ]
https://hal.archives-ouvertes.fr/hal-01895639 -
40M. Roșca, D. Stehlé, A. Wallet.
On the Ring-LWE and Polynomial-LWE Problems, in: EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications, Tel Aviv, Israel, April 2018.
https://hal.archives-ouvertes.fr/hal-01934170 -
41R. Serra, D. Arzelier, F. Bréhard, M. Joldes.
Fuel-optimal impulsive fixed-time trajectories in the linearized circular restricted 3-body-problem, in: IAC 2018 - 69th International Astronautical Congress; IAF Astrodynamics Symposium, Bremen, Germany, CSA/IAF Special issue IAF Astrodynamics Symposium (69TH international astronautical congress), International Astronautical Federation, October 2018, pp. 1-9.
https://hal.archives-ouvertes.fr/hal-01830253
Scientific Books (or Scientific Book chapters)
-
43J.-M. Muller, N. Brunie, F. de Dinechin, C.-P. Jeannerod, M. Joldes, V. Lefèvre, G. Melquiond, N. Revol, S. Torres.
Handbook of Floating-point Arithmetic (2nd edition), Birkhäuser Basel, July 2018, pp. 1-627. [ DOI : 10.1007/978-3-319-76526-6 ]
https://hal.inria.fr/hal-01766584
Other Publications
-
44N. Brisebarre, M. Joldes, J.-M. Muller, A.-M. Naneş, J. Picot.
Error analysis of some operations involved in the Fast Fourier Transform, December 2018, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01949458 -
45N. Fabiano, J.-M. Muller.
Algorithms for triple-word arithmetic, September 2018, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01869009 -
46C.-P. Jeannerod, V. Neiger, G. Villard.
Fast computation of approximant bases in canonical form, January 2018, working paper or preprint.
https://hal-unilim.archives-ouvertes.fr/hal-01683632 -
47F. Qureshi, A. Volkova, T. Hilaire, J. Takala.
Multiplierless Processing Element for Non-Power-of-Two FFTs, January 2018, working paper or preprint.
https://hal.inria.fr/hal-01690832 -
48A. Volkova, T. Hilaire, C. Lauter.
Arithmetic approaches for rigorous design of reliable Fixed-Point LTI filters, November 2018, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01918650 -
49F. de Dinechin, L. Forget, J.-M. Muller, Y. Uguen.
Posits: the good, the bad and the ugly, December 2018, working paper or preprint.
https://hal.inria.fr/hal-01959581