EN FR
EN FR


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 3M. Abdalla, F. Benhamouda, A. Passelègue, K. Paterson.

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, in: Journal of Cryptology, October 2018, vol. 31, no 4, pp. 917-964. [ DOI : 10.1007/s00145-017-9274-8 ]

    https://hal.inria.fr/hal-01723012
  • 4B. Allombert, N. Brisebarre, A. Lasjaunias.

    On a two-valued sequence and related continued fractions in power series fields, in: The Ramanujan Journal, 2018, vol. 45, no 3, pp. 859-871, https://arxiv.org/abs/1607.07235. [ DOI : 10.1007/s11139-017-9892-7 ]

    https://hal.archives-ouvertes.fr/hal-01348576
  • 5S. Bai, T. Lepoint, A. Roux-Langlois, A. Sakzad, D. Stehlé, R. Steinfeld.

    Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance, in: Journal of Cryptology, April 2018, vol. 31, no 2, pp. 610 - 640. [ DOI : 10.1007/s00145-017-9265-9 ]

    https://hal.archives-ouvertes.fr/hal-01934177
  • 6N. Brisebarre, S.-I. Filip, G. Hanrot.

    A Lattice Basis Reduction Approach for the Design of Finite Wordlength FIR Filters, in: IEEE Transactions on Signal Processing, 2018, vol. 66, no 10, pp. 2673-2684. [ DOI : 10.1109/TSP.2018.2812739 ]

    https://hal.inria.fr/hal-01308801
  • 7F. Bréhard, N. Brisebarre, M. Joldes.

    Validated and numerically efficient Chebyshev spectral methods for linear ordinary differential equations, in: ACM Transactions on Mathematical Software, July 2018, vol. 44, no 4, pp. 44:1-44:42. [ DOI : 10.1145/3208103 ]

    https://hal.archives-ouvertes.fr/hal-01526272
  • 8L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, D. Stehlé.

    CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme, in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018.

    https://hal.archives-ouvertes.fr/hal-01934176
  • 9G. Herold, E. Kirshanova, A. May.

    On the asymptotic complexity of solving LWE, in: Designs, Codes and Cryptography, January 2018, vol. 86, no 1, pp. 55 - 83. [ DOI : 10.1007/s10623-016-0326-0 ]

    https://hal.archives-ouvertes.fr/hal-01934181
  • 10C.-P. Jeannerod, S. M. Rump.

    On relative errors of floating-point operations: optimal bounds and applications, in: Mathematics of Computation, 2018, vol. 87, pp. 803-819. [ DOI : 10.1090/mcom/3234 ]

    https://hal.inria.fr/hal-00934443
  • 11B. Salvy.

    Linear Differential Equations as a Data-Structure, in: Foundations of Computational Mathematics, 2018, pp. 1-35, https://arxiv.org/abs/1811.08616 - Based on an invited talk at FoCM'2017.

    https://hal.inria.fr/hal-01940078
  • 12A. Volkova, M. Istoan, F. de Dinechin, T. Hilaire.

    Towards Hardware IIR Filters Computing Just Right: Direct Form I Case Study, in: IEEE Transactions on Computers, 2018. [ DOI : 10.1109/TC.2018.2879432 ]

    https://hal.sorbonne-universite.fr/hal-01561052

Invited Conferences

  • 13B. Salvy.

    Recursive Combinatorial Structures: Enumeration, Probabilistic Analysis and Random Generation, in: STACS 2018 - 35th Symposium on Theoretical Aspects of Computer Science, Caen, France, February 2018, Tutorial. [ DOI : 10.4230/LIPIcs.STACS.2018.1 ]

    https://hal.inria.fr/hal-01926094

International Conferences with Proceedings

  • 14P. R. Arantes Gilz, F. Bréhard, C. Gazzino.

    Validated Semi-Analytical Transition Matrices for Linearized Relative Spacecraft Dynamics via Chebyshev Series Approximations, in: SCITECH 2018 - AIAA Science and Technology Forum and Exposition, 28th Space Flight Mechanics Meeting, Kissimmee, United States, SCITECH 2018-AIAA Science and Technology Forum and Exposition, 28th Space Flight Mechanics Meeting, American Institute of Aeronautics and Astronautics, January 2018, pp. 1-23. [ DOI : 10.2514/6.2018-1960 ]

    https://hal.archives-ouvertes.fr/hal-01540170
  • 15S. Bai, D. Stehlé, W. Wen.

    Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ, in: ASIACRYPT, Brisbane, Australia, 2018.

    https://hal.archives-ouvertes.fr/hal-01934174
  • 16D. Boneh, Y. Ishai, A. Passelègue, A. Sahai, D. J. Wu.

    Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications, in: TCC 2018 - Theory of Cryptography Conference, Goa, India, LNCS, Springer, November 2018, vol. 11240, pp. 699-729. [ DOI : 10.1007/978-3-030-03810-6_25 ]

    https://hal.inria.fr/hal-01929288
  • 17J. W. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. Schanck, P. Schwabe, G. Seiler, D. Stehlé.

    CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM, in: EuroS&P 2018 - IEEE European Symposium on Security and Privacy, London, United Kingdom, IEEE, April 2018, pp. 353-367. [ DOI : 10.1109/EuroSP.2018.00032 ]

    https://hal.archives-ouvertes.fr/hal-01934169
  • 18A. Bostan, F. Chyzak, P. Lairez, B. Salvy.

    Generalized Hermite Reduction, Creative Telescoping and Definite Integration of D-Finite Functions, in: ISSAC 2018 - International Symposium on Symbolic and Algebraic Computation, New York, United States, July 2018, pp. 1-8. [ DOI : 10.1145/3208976.3208992 ]

    https://hal.inria.fr/hal-01788619
  • 19Z. Brakerski, A. Jain, I. Komargodski, A. Passelègue, D. Wichs.

    Non-Trivial Witness Encryption and Null-iO from Standard Assumptions, in: SCN 2018 - International Conference on Security and Cryptography for Networks, Amalfi, Italy, LNCS, Springer, September 2018, vol. 11035, pp. 425-441. [ DOI : 10.1007/978-3-319-98113-0_23 ]

    https://hal.inria.fr/hal-01929279
  • 20Z. Brakerski, E. Kirshanova, D. Stehlé, W. Wen.

    Learning with Errors and Extrapolated Dihedral Cosets, in: PKC 2018 - 21st International Conference on Practice and Theory of Public Key Cryptography, Rio de Janeiro, Brazil, March 2018.

    https://hal.archives-ouvertes.fr/hal-01934165
  • 21N. Brisebarre, G. Constantinides, M. Ercegovac, S.-I. Filip, M. Istoan, J.-M. Muller.

    A High Throughput Polynomial and Rational Function Approximations Evaluator, in: ARITH 2018 - 25th IEEE Symposium on Computer Arithmetic, Amherst, MA, United States, IEEE, June 2018, pp. 99-106. [ DOI : 10.1109/ARITH.2018.8464778 ]

    https://hal.inria.fr/hal-01774364
  • 22F. Bréhard.

    A Newton-like Validation Method for Chebyshev Approximate Solutions of Linear Ordinary Differential Systems, in: ISSAC 2018 - 43rd International Symposium on Symbolic and Algebraic Computation, New York, United States, ISSAC 2018-43rd International Symposium on Symbolic and Algebraic Computation, ACM, July 2018, pp. 103-110. [ DOI : 10.1145/3208976.3209000 ]

    https://hal.archives-ouvertes.fr/hal-01654396
  • 23G. Castagnos, F. Laguillaumie, I. Tucker.

    Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo p, in: ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, T. Peyrin, S. Galbraith (editors), Advances in Cryptology – ASIACRYPT 2018, December 2018, vol. LNCS, no 11273, pp. 733-764.

    https://hal.archives-ouvertes.fr/hal-01934296
  • 24J. Chen, J. Gong, L. Kowalczyk, H. Wee.

    Unbounded ABE via Bilinear Entropy Expansion, Revisited, in: EUROCRYPT 2018 - Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, J. B. Nielsen, V. Rijmen (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2018, vol. 10820, pp. 503-534. [ DOI : 10.1007/978-3-319-78381-9_19 ]

    https://hal.inria.fr/hal-01899901
  • 25J. Chen, J. Gong, H. Wee.

    Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 2018.

    https://hal.inria.fr/hal-01900153
  • 26J. Chen, D. Stehlé, G. Villard.

    Computing an LLL-reduced Basis of the Orthogonal Lattice, in: ISSAC 2018, 43rd International Symposium on Symbolic and Algebraic Computation (ISSAC 2018), New York, United States, July 2018, https://arxiv.org/abs/1805.03418. [ DOI : 10.1145/3208976.3209013 ]

    https://hal.archives-ouvertes.fr/hal-01921335
  • 27C. Chuengsatiansup, C. Martindale.

    Pairing-friendly twisted Hessian curves, in: Indocrypt 2018 - 19th International Conference on Cryptology, New Delhi, India, December 2018.

    https://hal.archives-ouvertes.fr/hal-01934160
  • 28L. Ducas, A. Pellet–Mary.

    On the Statistical Leak of the GGH13 Multilinear Map and some Variants, in: Asiacrypt 2018, Brisbane, Australia, December 2018, pp. 465-493.

    https://hal.archives-ouvertes.fr/hal-01895645
  • 29J. Gong, B. Libert, S. C. Ramanna.

    Compact IBBE and Fuzzy IBE from Simple Assumptions, in: SCN 2018 - 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, Security and Cryptography for Networks (SCN) 2018, September 2018, pp. 1-29.

    https://hal.inria.fr/hal-01686690
  • 30L. Grémy.

    Higher dimensional sieving for the number field sieve algorithms, in: ANTS 2018 - Thirteenth Algorithmic Number Theory Symposium, Madison, United States, University of Wisconsin, July 2018, pp. 1-16.

    https://hal.inria.fr/hal-01890731
  • 31G. Herold, E. Kirshanova, T. Laarhoven.

    Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving, in: PKC 2018 - 21st International Conference on Practice and Theory of Public Key Cryptography, Rio de Janeiro, Brazil, March 2018.

    https://hal.archives-ouvertes.fr/hal-01934183
  • 32C.-P. Jeannerod, J.-M. Muller, P. Zimmermann.

    On various ways to split a floating-point number, in: ARITH 2018 - 25th IEEE Symposium on Computer Arithmetic, Amherst (MA), United States, IEEE, June 2018, pp. 53-60. [ DOI : 10.1109/ARITH.2018.8464793 ]

    https://hal.inria.fr/hal-01774587
  • 33M. Joye, A. Passelègue.

    Function-Revealing Encryption: Definitions and Constructions, in: SCN 2018 - International Conference on Security and Cryptography for Networks, Amalfi, Italy, LNCS, Springer, September 2018, vol. 11035, pp. 527-543. [ DOI : 10.1007/978-3-319-98113-0_28 ]

    https://hal.inria.fr/hal-01929272
  • 34E. Kirshanova.

    Improved Quantum Information Set Decoding, in: PQCrypto 2018 - The Ninth International Conference on Post-Quantum Cryptography, Fort Lauderdale, United States, April 2018.

    https://hal.archives-ouvertes.fr/hal-01934186
  • 35J. Li, J. Gong.

    Improved Anonymous Broadcast Encryptions: Tight Security and Shorter Ciphertext, in: ACNS 2018 - 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, Springer, July 2018, pp. 497-515. [ DOI : 10.1007/978-3-319-93387-0_26 ]

    https://hal.archives-ouvertes.fr/hal-01829132
  • 36B. Libert, S. Ling, K. Nguyen, H. Wang.

    Lattice-Based Zero-Knowledge Arguments for Integer Relations, in: CRYPTO 2018 - Annual International Cryptology Conference, Santa Barbara, United States, Springer, August 2018, vol. LNCS, no 10992, pp. 700-732. [ DOI : 10.1007/978-3-319-96881-0_24 ]

    https://hal.inria.fr/hal-01911886
  • 37B. Libert, T. Peters, C. Qian.

    Logarithmic-Size Ring Signatures With Tight Security from the DDH Assumption, in: ESORICS 2018 - 23rd European Symposium on Research in Computer Security, Barcelone, Spain, LNCS, Springer, September 2018, vol. 11099, pp. 288-308. [ DOI : 10.1007/978-3-319-98989-1_15 ]

    https://hal.inria.fr/hal-01848134
  • 38B. Libert, D. Stehlé, R. Titiu.

    Adaptively Secure Distributed PRFs from LWE, in: TCC 2018 - 16th International Conference on Theory of Cryptography, Panaji, India, LNCS, Springer, November 2018, vol. 11240, pp. 391-421. [ DOI : 10.1007/978-3-030-03810-6_15 ]

    https://hal.inria.fr/hal-01911887
  • 39A. Pellet–Mary.

    Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model, in: Crypto 2018 - 38th International Cryptology Conference, Santa-Barbara, United States, Springer, August 2018, pp. 153-183. [ DOI : 10.1007/978-3-319-96878-0_6 ]

    https://hal.archives-ouvertes.fr/hal-01895639
  • 40M. Roșca, D. Stehlé, A. Wallet.

    On the Ring-LWE and Polynomial-LWE Problems, in: EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications, Tel Aviv, Israel, April 2018.

    https://hal.archives-ouvertes.fr/hal-01934170
  • 41R. Serra, D. Arzelier, F. Bréhard, M. Joldes.

    Fuel-optimal impulsive fixed-time trajectories in the linearized circular restricted 3-body-problem, in: IAC 2018 - 69th International Astronautical Congress; IAF Astrodynamics Symposium, Bremen, Germany, CSA/IAF Special issue IAF Astrodynamics Symposium (69TH international astronautical congress), International Astronautical Federation, October 2018, pp. 1-9.

    https://hal.archives-ouvertes.fr/hal-01830253

Scientific Books (or Scientific Book chapters)

  • 43J.-M. Muller, N. Brunie, F. de Dinechin, C.-P. Jeannerod, M. Joldes, V. Lefèvre, G. Melquiond, N. Revol, S. Torres.

    Handbook of Floating-point Arithmetic (2nd edition), Birkhäuser Basel, July 2018, pp. 1-627. [ DOI : 10.1007/978-3-319-76526-6 ]

    https://hal.inria.fr/hal-01766584

Other Publications