Filtrer vos résultats
- 36
- 5
- 27
- 8
- 2
- 2
- 1
- 1
- 41
- 1
- 8
- 11
- 10
- 11
- 1
- 41
- 41
- 41
- 35
- 6
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 16
- 16
- 6
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
41 résultats
|
|
triés par
|
A Three-Level Sieve Algorithm for the Shortest Vector ProblemSAC 2013 - 20th International Conference on Selected Areas in Cryptography, Aug 2013, Burnaby, Canada
Communication dans un congrès
hal-00932455v1
|
|||
|
Solving BDD by Enumeration: An UpdateCT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, Feb 2013, San Francisco, United States. pp.293-309, ⟨10.1007/978-3-642-36095-4_19⟩
Communication dans un congrès
hal-00864361v1
|
||
Finding Shortest Lattice Vectors in the Presence of GapsTopics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.239-257, ⟨10.1007/978-3-319-16715-2_13⟩
Communication dans un congrès
hal-01256083v1
|
|||
|
New transference theorems on lattices possessing $n^ϵ-unique$ shortest vectorsDiscrete Mathematics, 2014, 315-316, pp.144-155. ⟨10.1016/j.disc.2013.10.020⟩
Article dans une revue
hal-00922225v1
|
||
|
Learning a Zonotope and More: Cryptanalysis of NTRUSign CountermeasuresASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, IACR, Dec 2012, Beijing, China. pp.433-450, ⟨10.1007/978-3-642-34961-4_27⟩
Communication dans un congrès
hal-00864359v1
|
||
|
Slide reduction, successive minima and several applicationsBulletin of the Australian Mathematical Society, 2013, 88 (3), pp.17. ⟨10.1017/S0004972713000257⟩
Article dans une revue
hal-01104164v1
|
||
Improved Single-Key Attacks on 9-Round AES-192/256FSE 2014 (21st International Workshop on Fast Software Encryption), IACR, Mar 2014, Londres, United Kingdom
Communication dans un congrès
hal-00936032v1
|
|||
Cryptanalysis of GOST R hash functionInformation Processing Letters, 2014, 114 (2), pp.8. ⟨10.1016/j.ipl.2014.07.007⟩
Article dans une revue
hal-01110356v1
|
|||
|
A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP ChallengeGECCO 2015, ACM, Jul 2015, Madrid, Spain. ⟨10.1145/2739480.2754639⟩
Communication dans un congrès
hal-01256186v1
|
||
|
Improved Cryptanalysis of the Block Cipher KASUMISAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.222-233, ⟨10.1007/978-3-642-35999-6_15⟩
Communication dans un congrès
hal-00922230v1
|
||
Abstracting Lattice-based CryptographyWorkshop on Algebraic Aspects of Cryptography, Aug 2013, Fukuoka, Japan
Communication dans un congrès
hal-00932567v1
|
|||
|
Lower bounds of shortest vector lengths in random NTRU latticesTheoretical Computer Science, 2014, 560 (2), pp.121-130. ⟨10.1016/j.tcs.2014.10.011⟩
Article dans une revue
hal-01110352v1
|
||
Fault Rate Analysis: Breaking Masked AES Hardware Implementations EfficientlyIEEE Transactions on Circuits and Systems Part 2 Analog and Digital Signal Processing, 2013, 60 (8), pp.517-521. ⟨10.1109/TCSII.2013.2268379⟩
Article dans une revue
hal-00922227v1
|
|||
|
Counting Co-Cyclic Lattices2015
Pré-publication, Document de travail
hal-01256022v1
|
||
Advances in Cryptology -- EUROCRYPT 2013Thomas Johansson and Phong Q. Nguyen. Springer, 7881, pp.736, 2013, Lecture Notes in Computer Science, 978-3-642-38347-2. ⟨10.1007/978-3-642-38348-9⟩
Ouvrages
hal-00922221v1
|
|||
|
Advances in Cryptology - ASIACRYPT 2012Xiaoyun Wang and Kazue Sako. ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2012, Beijing, China. 7658, Springer, pp.1-780, 2012, Lecture Notes in Computer Science, 978-3-642-34960-7. ⟨10.1007/978-3-642-34961-4⟩
Proceedings/Recueil des communications
hal-00922232v1
|
||
|
The Boomerang Attacks on the Round-Reduced Skein-512SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.287-303, ⟨10.1007/978-3-642-35999-6_19⟩
Communication dans un congrès
hal-00922231v1
|
||
Solving Random Subset Sum Problem by $l_{p}$-norm SVP OraclePKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (2014), IACR, Mar 2014, Buenos Aires, Argentina
Communication dans un congrès
hal-00936030v1
|
|||
|
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the IntegersEUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩
Communication dans un congrès
hal-00864374v1
|
||
|
Sub-linear root detection, and new hardness results, for sparse polynomials over finite fieldsISSAC '13 - 38th international symposium on International symposium on symbolic and algebraic computation, ACM, Jun 2013, Boston, United States. pp.61-68, ⟨10.1145/2465506.2465514⟩
Communication dans un congrès
hal-00922224v1
|
||
The Algorithmic Revolution in Geometry of NumbersThe First NTU-VIASM Workshop on Discrete Mathematics, VIASM, Dec 2014, Hanoi, Vietnam
Communication dans un congrès
hal-01110363v1
|
|||
The Hardness of Lattice Problems: Worst-case to Average-case Reductions and Security EstimatesMathematics of Lattices and Cybersecurity, Apr 2015, Providence, United States
Communication dans un congrès
hal-01256259v1
|
|||
Improvements on Reductions among DIfferent Variants SVP and CVPWISA 2013 - 14th International Workshop on Information Security Applications, Aug 2013, Jeju Island, South Korea
Communication dans un congrès
hal-00932449v1
|
|||
|
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial CongruencesPKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, Mar 2014, Buenos Aires, Argentina. pp.185-202, ⟨10.1007/978-3-642-54631-0_11⟩
Communication dans un congrès
hal-00926902v1
|
||
An Algebraic Broadcast Attack against NTRUACISP 2012 - 7th Australasian Conference on Information Security and Privacy, Jul 2012, Wollongong, Australia. pp.124-137, ⟨10.1007/978-3-642-31448-3_10⟩
Communication dans un congrès
hal-00932438v1
|
|||
|
New Observations on Impossible Differential Cryptanalysis of Reduced-Round CamelliaFSE 2012 - 19th International Workshop Fast Software Encryption, IACR, Mar 2012, Washington, United States. pp.90-109, ⟨10.1007/978-3-642-34047-5_6⟩
Communication dans un congrès
hal-00922229v1
|
||
Lattice-Based Fault Attacks on SignaturesMarc Joye and Michael Tunstall. Fault Analysis in Cryptography, Springer, pp.201-220, 2012, Information Security and Cryptography, ⟨10.1007/978-3-642-29656-7_12⟩
Chapitre d'ouvrage
hal-00922233v1
|
|||
|
Simpler Efficient Group Signatures from LatticesPublic-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, IACR, Mar 2015, Gaithersburg, United States. ⟨10.1007/978-3-662-46447-2_18⟩
Communication dans un congrès
hal-01256013v1
|
||
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012ACISP 2014-19th Australasian Conference on Information Security and Privacy, Jul 2014, Wollongong, Australia. ⟨10.1007/978-3-319-08344-5_10⟩
Communication dans un congrès
hal-01104173v1
|
|||
Improved Boomerang Attacks on SM3ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. pp.251-266, ⟨10.1007/978-3-642-39059-3_17⟩
Communication dans un congrès
istex
hal-00922228v1
|
- 1
- 2