EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1C. Beierle, A. Canteaut, G. Leander, Y. Rotella.

    Proving Resistance Against Invariant Attacks: How to Choose the Round Constants, in: Crypto 2017 - Advances in Cryptology, Santa Barbara, United States, J. Katz, H. Shacham (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2017, vol. 10402, pp. 647–678. [ DOI : 10.1007/978-3-319-63715-0_22 ]

    https://hal.inria.fr/hal-01631130
  • 2K. Bhargavan, G. Leurent.

    On the Practical (In-)Security of 64-bit Block Ciphers, in: ACM CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, ACM, October 2016. [ DOI : 10.1145/2976749.2978423 ]

    https://hal.inria.fr/hal-01404208
  • 3A. Canteaut, J. Roué.

    On the behaviors of affine equivalent Sboxes regarding differential and linear attacks, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, Lecture Notes in Computer Science, Springer, April 2015.

    https://hal.inria.fr/hal-01104051
  • 4A. Chailloux, M. Naya-Plasencia, A. Schrottenloher.

    An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography, in: Asiacrypt 2017 - Advances in Cryptology, Hong Kong, China, T. Takagi, T. Peyrin (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2017, vol. 10625, pp. 211–240. [ DOI : 10.1007/978-3-319-70697-9_8 ]

    https://hal.inria.fr/hal-01651007
  • 5K. Chakraborty, A. Chailloux, A. Leverrier.

    Arbitrarily long relativistic bit commitment , in: Physical Review Letters, 2015. [ DOI : 10.1103/PhysRevLett.115.250501 ]

    https://hal.inria.fr/hal-01237241
  • 6P. Charpin, G. M. Kyureghyan, V. Suder.

    Sparse Permutations with Low Differential Uniformity, in: Finite Fields and Their Applications, March 2014, vol. 28, pp. 214-243. [ DOI : 10.1016/j.ffa.2014.02.003 ]

    https://hal.archives-ouvertes.fr/hal-01068860
  • 7N. Courtois, M. Finiasz, N. Sendrier.

    How to achieve a McEliece-based Digital Signature Scheme, in: Advances in Cryptology - Asiacrypt 2001, LNCS, Springer-Verlag, 2001, no 2248, pp. 157–174.
  • 8A. Couvreur, A. Otmani, J.-P. Tillich.

    Polynomial Time Attack on Wild McEliece Over Quadratic Extensions, in: IEEE Transactions on Information Theory, January 2017, vol. 63, no 1, pp. 404–427. [ DOI : 10.1109/TIT.2016.2574841 ]

    https://hal.inria.fr/hal-01661935
  • 9M. Kaplan, G. Leurent, A. Leverrier, M. Naya-Plasencia.

    Breaking Symmetric Cryptosystems Using Quantum Period Finding, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2016, vol. 9815, pp. 207 - 237. [ DOI : 10.1007/978-3-662-53008-5_8 ]

    https://hal.inria.fr/hal-01404196
  • 10R. Misoczki, J.-P. Tillich, N. Sendrier, P. S. L. M. Barreto.

    MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes, in: IEEE International Symposium on Information Theory - ISIT 2013, Istanbul, Turkey, July 2013, pp. 2069-2073.

    https://hal.inria.fr/hal-00870929
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 13C. Beierle, A. Canteaut, G. Leander.

    Nonlinear Approximations in Cryptanalysis Revisited, in: IACR Transactions on Symmetric Cryptology, December 2018, vol. 2018, no 4, pp. 80-101. [ DOI : 10.13154/tosc.v2018.i4.80-101 ]

    https://hal.inria.fr/hal-01944995
  • 14C. Boura, A. Canteaut.

    On the Boomerang Uniformity of Cryptographic Sboxes, in: IACR Transactions on Symmetric Cryptology, September 2018, vol. 2018, no 3, pp. 290-310. [ DOI : 10.13154/tosc.v2018.i3.290-310 ]

    https://hal.inria.fr/hal-01944598
  • 15C. Boura, A. Canteaut, J. Jean, V. Suder.

    Two Notions of Differential Equivalence on Sboxes, in: Designs, Codes and Cryptography, 2018. [ DOI : 10.1007/s10623-018-0496-z ]

    https://hal.inria.fr/hal-01944565
  • 16C. Boura, V. Lallemand, V. Suder, M. Naya-Plasencia.

    Making the Impossible Possible, in: Journal of Cryptology, January 2018, vol. 31, no 1, pp. 101-133. [ DOI : 10.1007/s00145-016-9251-7 ]

    https://hal.inria.fr/hal-01953916
  • 17A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier, R. Sirdey.

    Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, in: Journal of Cryptology, July 2018, vol. 31, no 3, pp. 885-916. [ DOI : 10.1007/s00145-017-9273-9 ]

    https://hal.inria.fr/hal-01650012
  • 18A. Canteaut, L. Perrin.

    On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 209-246. [ DOI : 10.1016/j.ffa.2018.11.008 ]

    https://hal.inria.fr/hal-01953353
  • 19P. Charpin, J. Peng.

    New links between nonlinearity and differential uniformity, in: Finite Fields and Their Applications, March 2019, vol. 56, pp. 188-208. [ DOI : 10.1016/j.ffa.2018.12.001 ]

    https://hal.inria.fr/hal-01907499
  • 20S. Duval, G. Leurent.

    MDS Matrices with Lightweight Circuits, in: IACR Transactions on Symmetric Cryptology, June 2018. [ DOI : 10.13154/tosc.v2018.i2.48-78 ]

    https://hal.inria.fr/hal-01944495
  • 21T. Fuhr, M. Naya-Plasencia, Y. Rotella.

    State-Recovery Attacks on modified Ketje Jr, in: IACR Transactions on Symmetric Cryptology, March 2018, vol. 2018, no 1, pp. 29-56. [ DOI : 10.13154/tosc.v2018.i1.29-56 ]

    https://hal.inria.fr/hal-01944785
  • 22S. Ghorai, E. Diamanti, A. Leverrier.

    Composable security of two-way continuous-variable quantum key distribution without active symmetrization, in: Physical Review A, 2019, https://arxiv.org/abs/1806.11356. [ DOI : 10.1103/PhysRevA.99.012311 ]

    https://hal.inria.fr/hal-01951932
  • 23A. Leverrier.

    SU(p,q) coherent states and a Gaussian de Finetti theorem, in: Journal of Mathematical Physics, 2018, vol. 59, 042202 p, https://arxiv.org/abs/1612.05080. [ DOI : 10.1063/1.5007334 ]

    https://hal.inria.fr/hal-01652084
  • 24A. Olivo, F. Grosshans.

    Ancilla-assisted linear optical Bell measurements and their optimality, in: Physical Review A, October 2018, vol. 98, no 4, 042323 p. [ DOI : 10.1103/PhysRevA.98.042323 ]

    https://hal.inria.fr/hal-01951361

Invited Conferences

  • 25C. Boura, A. Canteaut, J. Jean, V. Suder.

    On Sboxes sharing the same DDT, in: Dagstuhl Seminar 18021 Symmetric Cryptography, Dagstuhl, Germany, January 2018. [ DOI : 10.4230/DAGREP.8.1.1 ]

    https://hal.inria.fr/hal-01955256
  • 26A. Canteaut, C. Beierle, G. Leander.

    On nonlinear approximations and the linear hull effect, in: ASK 2018 - 8th Asian Workshop on Symmetric Key Cryptography, Kolkata, India, November 2018.

    https://hal.inria.fr/hal-01955286
  • 27A. Canteaut.

    Desperately Seeking Sboxes, in: Eurocrypt 2018, Tel Aviv, Israel, April 2018.

    https://hal.inria.fr/hal-01944401
  • 28A. Canteaut.

    L'insoutenable légèreté du chiffrement, in: Journées Scientifiques Inria 2018, Bordeaux, France, June 2018.

    https://hal.inria.fr/hal-01955337
  • 29A. Canteaut, L. Perrin.

    On CCZ-Equivalence, Extended-Affine Equivalence and Function Twisting, in: BFA 2018 - 3rd International Workshop on Boolean Functions and their Applications, Loen, Norway, June 2018.

    https://hal.inria.fr/hal-01953349
  • 30A. Chailloux.

    Relativistic commitment and zero-knowledge proofs, in: Seventeenth Bellairs Crypto-Workshop 2018, Holetown, Barbados, March 2018.

    https://hal.inria.fr/hal-01950643
  • 31G. Leurent.

    MDS Matrices with Lightweight Circuits, in: The Challenges of Lightweight Cryptanalysis, Tel Aviv, Israel, April 2018.

    https://hal.inria.fr/hal-01953383
  • 32G. Leurent.

    Security Issues with Small Block Sizes, in: Lightweight Crypto Day 2018, Tel Aviv, Israel, April 2018.

    https://hal.inria.fr/hal-01966550
  • 33A. Leverrier.

    Introduction to quantum computing, in: Lecture series on Quantum Engineering at University Paris-Saclay, Palaiseau, France, May 2018.

    https://hal.inria.fr/hal-01955373
  • 34M. Naya-Plasencia, T. Fuhr, Y. Rotella.

    New Results on Modified Versions of Ketje Jr, in: Dagstuhl Seminar 18021 Symmetric Cryptography, Dagstuhl, Germany, January 2018. [ DOI : 10.4230/DagRep.8.1.1 ]

    https://hal.archives-ouvertes.fr/hal-01953975
  • 35M. Naya-Plasencia.

    New Results on Quantum Symmetric Cryptanalysis, in: Journées Nationales 2018 du GDR Informatique Mathématique, Palaiseau, France, April 2018.

    https://hal.inria.fr/hal-01954618
  • 36M. Naya-Plasencia.

    New results on symmetric quantum cryptanalysis (Keynote speaker), in: QUANTALGO Quantum Algorithms and Applications, Paris, France, September 2018.

    https://hal.inria.fr/hal-01953994
  • 37M. Naya-Plasencia.

    New results on symmetric quantum cryptanalysis, in: Crossfyre 2018 - 8th international workshop on cryptography, robustness, and provably secure schemes for female young researchers, Surrey, United Kingdom, September 2018, Keynote speaker at Crossfyre 2018.

    https://hal.inria.fr/hal-01953997
  • 38M. Naya-Plasencia.

    Symmetric lightweight primitives: (Design and) Cryptanalysis, in: Lightweight Crypto Day 2018, Tel Aviv, Israel, April 2018.

    https://hal.inria.fr/hal-01953947
  • 39L. Perrin.

    Generalized Feistel Networks with Optimal Diffusion, in: Dagstuhl Seminar 18021 Symmetric Cryptography, Dagstuhl, Germany, January 2018. [ DOI : 10.4230/DAGREP.8.1.1 ]

    https://hal.inria.fr/hal-01953351
  • 40L. Perrin.

    S-Box Reverse-Engineering: Boolean Functions, American/Russian Standards, and Butterflies, in: CECC 2018 - Central European Conference on Cryptology, Smolenice, Slovakia, June 2018, pp. 1-99.

    https://hal.inria.fr/hal-01953348

International Conferences with Proceedings

  • 41N. Aragon, P. Gaborit, A. Hauteville, J.-P. Tillich.

    A New Algorithm for Solving the Rank Syndrome Decoding Problem, in: ISIT 2018 - IEEE International Symposium on Information Theory, Vail, United States, June 2018, pp. 2421-2425. [ DOI : 10.1109/ISIT.2018.8437464 ]

    https://hal.inria.fr/hal-01957179
  • 42T. Ashur, M. Eichlseder, M. M. Lauridsen, G. Leurent, B. Minaud, Y. Rotella, Y. Sasaki, B. Viguier.

    Cryptanalysis of MORUS, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11273, pp. 35-64. [ DOI : 10.1007/978-3-030-03329-3_2 ]

    https://hal.inria.fr/hal-01944776
  • 43X. Bonnetain, M. Naya-Plasencia.

    Hidden Shift Quantum Cryptanalysis and Implications, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11272, pp. 560-592. [ DOI : 10.1007/978-3-030-03326-2_19 ]

    https://hal.inria.fr/hal-01953914
  • 44G. Couteau, A. Dupin, P. Méaux, M. Rossi, Y. Rotella.

    On the Concrete Security of Goldreich’s Pseudorandom Generator, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11273, pp. 96-124. [ DOI : 10.1007/978-3-030-03329-3_4 ]

    https://hal.inria.fr/hal-01944772
  • 45T. Debris-Alazard, J.-P. Tillich.

    Two attacks on rank metric code-based schemes: RankSign and an IBE scheme, in: ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11272, pp. 62-92. [ DOI : 10.1007/978-3-030-03326-2_3 ]

    https://hal.inria.fr/hal-01957207
  • 46E. Eaton, M. Lequesne, A. Parent, N. Sendrier.

    QC-MDPC: A Timing Attack and a CCA2 KEM, in: PQCrypto 2018 - Ninth International Conference on Post-Quantum Cryptography, Fort Lauderdale, United States, LNCS - Lecture Notes in Computer Science, Springer, April 2018, vol. 10786. [ DOI : 10.1007/978-3-319-79063-3_3 ]

    https://hal.inria.fr/hal-01949590
  • 47O. Fawzi, A. Grospellier, A. Leverrier.

    Constant overhead quantum fault-tolerance with quantum expander codes, in: FOCS 2018 - 59th Annual IEEE Symposium on Foundations of Computer Science, Paris, France, October 2018, pp. 743-754, https://arxiv.org/abs/1808.03821. [ DOI : 10.1109/FOCS.2018.00076 ]

    https://hal.archives-ouvertes.fr/hal-01895430
  • 48O. Fawzi, A. Grospellier, A. Leverrier.

    Efficient decoding of random errors for quantum expander codes, in: STOC 2018 - 50th Annual ACM Symposium on the Theory of Computing, Los Angeles, United States, June 2018, pp. 521-534, https://arxiv.org/abs/1711.08351. [ DOI : 10.1145/3188745.3188886 ]

    https://hal.archives-ouvertes.fr/hal-01895427
  • 49L. Grassi, M. Naya-Plasencia, A. Schrottenloher.

    Quantum Algorithms for the k-xor Problem, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11272, pp. 527-559. [ DOI : 10.1007/978-3-030-03326-2_18 ]

    https://hal.inria.fr/hal-01896036
  • 50B. Lac, A. Canteaut, J. J.-A. Fournier, R. Sirdey.

    Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions, in: ISCAS 2018 - IEEE International Symposium on Circuits and Systems, Florence, Italy, May 2018, pp. 1-5. [ DOI : 10.1109/ISCAS.2018.8351693 ]

    https://hal-cea.archives-ouvertes.fr/cea-01746138
  • 51M. Lequesne, J.-P. Tillich.

    Attack on the Edon-K Key Encapsulation Mechanism, in: ISIT 2018 - IEEE International Symposium on Information Theory, Vail, United States, June 2018, pp. 981-985. [ DOI : 10.1109/ISIT.2018.8437498 ]

    https://hal.inria.fr/hal-01949569
  • 52G. Leurent, M. Nandi, F. Sibleyras.

    Generic Attacks Against Beyond-Birthday-Bound MACs, in: Crypto 2018 - 38th International Cryptology Conference, Santa Barbara, United States, LNCS - Lecture Notes in Computer Science, Springer, August 2018, vol. 10991, pp. 306-336. [ DOI : 10.1007/978-3-319-96884-1_11 ]

    https://hal.inria.fr/hal-01944318
  • 53G. Leurent, F. Sibleyras.

    The Missing Difference Problem, and Its Applications to Counter Mode Encryption, in: Eurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, LNCS - Lecture Notes in Computer Science, April 2018, vol. 10821, pp. 745-770. [ DOI : 10.1007/978-3-319-78375-8_24 ]

    https://hal.inria.fr/hal-01944288
  • 54J.-P. Tillich.

    The decoding failure probability of MDPC codes, in: ISIT 2018 - IEEE International Symposium on Information Theory, Vail, United States, June 2018, pp. 941-945. [ DOI : 10.1109/ISIT.2018.8437843 ]

    https://hal.inria.fr/hal-01957037

Conferences without Proceedings

  • 55P. Charpin, J. Peng.

    New links between nonlinearity and differential uniformity, in: Sequences and Their Applications (SETA) 2018, Hong-Kong, China, October 2018.

    https://hal.inria.fr/hal-01836184
  • 56O. Fawzi, A. Grospellier, A. Leverrier.

    Efficient decoding of random errors for quantum expander codes, in: QIP 2018 - 21th Annual Conference on Quantum Information Processing, Delft, Netherlands, QuTech, January 2018, pp. 1-31, https://arxiv.org/abs/1711.08351 - 31 pages.

    https://hal.archives-ouvertes.fr/hal-01654670
  • 57G. Leurent.

    The Missing Difference Problem: And its Applications to Counter Mode Encryption, in: Flexible Symmetric Cryptography, Leiden, Netherlands, March 2018.

    https://hal.inria.fr/hal-01953390
  • 58A. Olivo, F. Grosshans.

    Optimality of linear optical Bell measurements. How much can ancillae help?, in: GDR IQFA 9th Colloquium, Montpellier, France, November 2018.

    https://hal.inria.fr/hal-01951749
  • 59A. Olivo, F. Grosshans.

    Optimality of linear optical Bell measurements. How much can ancillae help?, in: ICIQP 2018 - International Conference on Integrated Quantum Photonics, Paris, France, October 2018.

    https://hal.inria.fr/hal-01951728
  • 60A. Olivo, F. Grosshans.

    Optimality of linear optical Bell measurements. How much can ancillae help?, in: Q-Turn: changing paradigms in quantum science, Florianopolis, Brazil, November 2018.

    https://hal.inria.fr/hal-01951753

Scientific Popularization

Other Publications