Recherche - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu

Filtrer vos résultats

41 résultats

A Three-Level Sieve Algorithm for the Shortest Vector Problem

Feng Zhang , Yanbin Pan , Gengran Hu
SAC 2013 - 20th International Conference on Selected Areas in Cryptography, Aug 2013, Burnaby, Canada
Communication dans un congrès hal-00932455v1
Image document

Solving BDD by Enumeration: An Update

Mingjie Liu , Phong Q. Nguyen
CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, Feb 2013, San Francisco, United States. pp.293-309, ⟨10.1007/978-3-642-36095-4_19⟩
Communication dans un congrès hal-00864361v1

Finding Shortest Lattice Vectors in the Presence of Gaps

Wei Wei , Mingjie Liu , Xiaoyun Wang
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.239-257, ⟨10.1007/978-3-319-16715-2_13⟩
Communication dans un congrès hal-01256083v1

New transference theorems on lattices possessing $n^ϵ-unique$ shortest vectors

Wei Wei , Chengliang Tian , Xiaoyun Wang
Discrete Mathematics, 2014, 315-316, pp.144-155. ⟨10.1016/j.disc.2013.10.020⟩
Article dans une revue hal-00922225v1
Image document

Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures

Léo Ducas , Phong Q. Nguyen
ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, IACR, Dec 2012, Beijing, China. pp.433-450, ⟨10.1007/978-3-642-34961-4_27⟩
Communication dans un congrès hal-00864359v1

Slide reduction, successive minima and several applications

Jianwei Li , Wei Wei
Bulletin of the Australian Mathematical Society, 2013, 88 (3), pp.17. ⟨10.1017/S0004972713000257⟩
Article dans une revue hal-01104164v1

Improved Single-Key Attacks on 9-Round AES-192/256

Leibo Li , Keting Jia , Xiaoyun Wang
FSE 2014 (21st International Workshop on Fast Software Encryption), IACR, Mar 2014, Londres, United Kingdom
Communication dans un congrès hal-00936032v1

Cryptanalysis of GOST R hash function

Zongyue Wang , Hongbo Yu , Xiaoyun Wang
Information Processing Letters, 2014, 114 (2), pp.8. ⟨10.1016/j.ipl.2014.07.007⟩
Article dans une revue hal-01110356v1

A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge

Dan Ding , Guizhen Zhu , Xiaoyun Wang
GECCO 2015, ACM, Jul 2015, Madrid, Spain. ⟨10.1145/2739480.2754639⟩
Communication dans un congrès hal-01256186v1

Improved Cryptanalysis of the Block Cipher KASUMI

Keting Jia , Leibo Li , Christian Rechberger , Jiazhe Chen , Xiaoyun Wang
SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.222-233, ⟨10.1007/978-3-642-35999-6_15⟩
Communication dans un congrès hal-00922230v1

Abstracting Lattice-based Cryptography

Phong Q. Nguyen
Workshop on Algebraic Aspects of Cryptography, Aug 2013, Fukuoka, Japan
Communication dans un congrès hal-00932567v1

Lower bounds of shortest vector lengths in random NTRU lattices

Jingguo Bi , Qi Cheng
Theoretical Computer Science, 2014, 560 (2), pp.121-130. ⟨10.1016/j.tcs.2014.10.011⟩
Article dans une revue hal-01110352v1

Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently

An Wang , Man Chen , Zongyue Wang , Xiaoyun Wang
IEEE Transactions on Circuits and Systems Part 2 Analog and Digital Signal Processing, 2013, 60 (8), pp.517-521. ⟨10.1109/TCSII.2013.2268379⟩
Article dans une revue hal-00922227v1

Counting Co-Cyclic Lattices

Phong Q. Nguyen , Igor E. Shparlinski
2015
Pré-publication, Document de travail hal-01256022v1

Advances in Cryptology -- EUROCRYPT 2013

Thomas Johansson , Phong Q. Nguyen
Thomas Johansson and Phong Q. Nguyen. Springer, 7881, pp.736, 2013, Lecture Notes in Computer Science, 978-3-642-38347-2. ⟨10.1007/978-3-642-38348-9⟩
Ouvrages hal-00922221v1

Advances in Cryptology - ASIACRYPT 2012

Xiaoyun Wang , Kazue Sako
Xiaoyun Wang and Kazue Sako. ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2012, Beijing, China. 7658, Springer, pp.1-780, 2012, Lecture Notes in Computer Science, 978-3-642-34960-7. ⟨10.1007/978-3-642-34961-4⟩
Proceedings/Recueil des communications hal-00922232v1

The Boomerang Attacks on the Round-Reduced Skein-512

Hongbo Yu , Jiazhe Chen , Xiaoyun Wang
SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.287-303, ⟨10.1007/978-3-642-35999-6_19⟩
Communication dans un congrès hal-00922231v1

Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle

Gengran Hu , Yanbin Pan , Feng Zhang
PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (2014), IACR, Mar 2014, Buenos Aires, Argentina
Communication dans un congrès hal-00936030v1
Image document

Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers

Yuanmi Chen , Phong Q. Nguyen
EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩
Communication dans un congrès hal-00864374v1

Sub-linear root detection, and new hardness results, for sparse polynomials over finite fields

Jingguo Bi , Qi Cheng , Maurice Rojas
ISSAC '13 - 38th international symposium on International symposium on symbolic and algebraic computation, ACM, Jun 2013, Boston, United States. pp.61-68, ⟨10.1145/2465506.2465514⟩
Communication dans un congrès hal-00922224v1

The Algorithmic Revolution in Geometry of Numbers

Phong Q. Nguyen
The First NTU-VIASM Workshop on Discrete Mathematics, VIASM, Dec 2014, Hanoi, Vietnam
Communication dans un congrès hal-01110363v1

The Hardness of Lattice Problems: Worst-case to Average-case Reductions and Security Estimates

Phong Q. Nguyen
Mathematics of Lattices and Cybersecurity, Apr 2015, Providence, United States
Communication dans un congrès hal-01256259v1

Improvements on Reductions among DIfferent Variants SVP and CVP

Gengran Hu , Yanbin Pan
WISA 2013 - 14th International Workshop on Information Security Applications, Aug 2013, Jeju Island, South Korea
Communication dans un congrès hal-00932449v1
Image document

Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences

Jingguo Bi , Jean-Sébastien Coron , Jean-Charles Faugère , Phong Q. Nguyen , Guénaël Renault , et al.
PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, Mar 2014, Buenos Aires, Argentina. pp.185-202, ⟨10.1007/978-3-642-54631-0_11⟩
Communication dans un congrès hal-00926902v1

An Algebraic Broadcast Attack against NTRU

Jintai Ding , Yanbin Pan , Yingpu Deng
ACISP 2012 - 7th Australasian Conference on Information Security and Privacy, Jul 2012, Wollongong, Australia. pp.124-137, ⟨10.1007/978-3-642-31448-3_10⟩
Communication dans un congrès hal-00932438v1

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia

Ya Liu , Leibo Li , Dawu Gu , Xiaoyun Wang , Zhiqiang Liu , et al.
FSE 2012 - 19th International Workshop Fast Software Encryption, IACR, Mar 2012, Washington, United States. pp.90-109, ⟨10.1007/978-3-642-34047-5_6⟩
Communication dans un congrès hal-00922229v1

Lattice-Based Fault Attacks on Signatures

Phong Q. Nguyen , Mehdi Tibouchi
Marc Joye and Michael Tunstall. Fault Analysis in Cryptography, Springer, pp.201-220, 2012, Information Security and Cryptography, ⟨10.1007/978-3-642-29656-7_12⟩
Chapitre d'ouvrage hal-00922233v1

Simpler Efficient Group Signatures from Lattices

Phong Q. Nguyen , Jiang Zhang , Zhenfeng Zhang
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, IACR, Mar 2015, Gaithersburg, United States. ⟨10.1007/978-3-662-46447-2_18⟩
Communication dans un congrès hal-01256013v1

A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012

Yanbin Pan , Yingpu Deng
ACISP 2014-19th Australasian Conference on Information Security and Privacy, Jul 2014, Wollongong, Australia. ⟨10.1007/978-3-319-08344-5_10⟩
Communication dans un congrès hal-01104173v1

Improved Boomerang Attacks on SM3

Dongxia Bai , Hongbo Yu , Gaoli Wang , Xiaoyun Wang
ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. pp.251-266, ⟨10.1007/978-3-642-39059-3_17⟩
Communication dans un congrès istex hal-00922228v1