Antoine Joux' Bibliography
Home
Students
Publications
Funding
CV
2018
A New Public-Key Cryptosystem via Mersenne Numbers
with
Divesh Aggarwal, Anupam Prakash and Miklos Santha.
CRYPTO
Progress in Cryptology - AFRICACRYPT 2018, Marrakech, Morocco.
(Volume Editor)
2017
Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances (Invited Talk).
STACS
A Crossbred Algorithm for Solving Boolean Polynomial Systems
with
Vanessa Vitse.
NutMiC
2016
Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations.
with
Cécile Pierrot.
Contemporary Developments in Finite Fields and Applications
Technical history of discrete logarithms in small characteristic finite fields.
with
Cécile Pierrot.
Designs, Codes and Cryptography
Reducing number field defining polynomials: An application to class group computations.
with
Alexandre Gélin
.
LMS Journal of Computation and Mathematics
2015
Collisions of SHA-0 and Reduced SHA-1
with
Eli Biham
and
Rafi Chen
.
J. Cryptology
2014
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields.
with
Cécile Pierrot.
ASIACRYPT
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
with
Jean-Charles Faugère, Louise Huot, Guénaël Renault
and
Vanessa Vitse.
EUROCRYPT
Recovering a sum of two squares decomposition.
with
Jaime Gutierrez
and
Álvar Ibeas.
Journal of Symbolic Computation
A sieve algorithm based on overlattices.
with
Anja Becker
and
Nicolas Gama.
LMS Journal of Computation and Mathematics
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
with
Pierre-Alain Fouque
and
Chrysanthi Mavromati.
ASIACRYPT
2013
The Special Number Field Sieve in GF(p
n
), Application to Pairing-Friendly Constructions
with
Cécile Pierrot
.
Pairing
A new index calculus algorithm with complexity L(1/4+o(1)) in very small characteristic.
SAC
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields.
EUROCRYPT
Injective Encodings to Elliptic Curves
with
Pierre-Alain Fouque
and
Mehdi Tibouchi
.
ACISP
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on E(GF(q
5
))
with
Vanessa Vitse
.
J. Cryptology
Pairing the volcano
with
Sorina Ionica
.
Math. Comput.
On Diffie-Hellman like Security Assumptions
with
Antoine Rojat
.
ISC
2012
Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over GF(p
6
)
with
Vanessa Vitse
.
EUROCRYPT
A family of weak keys in HFE and the corresponding practical key-recovery
with
Charles Bouillaguet
,
Pierre-Alain Fouque
and
Joana Treger
.
J. Mathematical Cryptology
Decoding Random Binary Linear Codes in 2
n/20
: How 1 + 1 = 0 Improves Information Set Decoding
with
Anja Becker
,
Alexander May
and
Alexander Meurer
.
EUROCRYPT
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
with
Marcel Medwed
and
François-Xavier Standaert
.
CHES
A Tutorial on High Performance Computing Applied to Cryptanalysis.
EUROCRYPT
(Invited Talk)
2011
A Variant of the F4 Algorithm
with
Vanessa Vitse
.
CT-RSA
Improved Generic Algorithms for Hard Knapsacks
with
Anja Becker
and
Jean-Sébastien Coron
.
EUROCRYPT
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
with
Jean-Sébastien Coron
,
Avradip Mandal
,
David Naccache
and
Mehdi Tibouchi
.
PKC
Fast Software Encryption, Lyngby, Denmark.
(Volume Editor)
2010
Pairing the volcano
with
Sorina Ionica
.
ANTS
Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree
with
Sorina Ionica
.
Pairing
On the security of blockwise secure modes of operation beyond the birthday bound.
IEEE TIT
New Generic Algorithms for Hard Knapsacks
with
Nick Howgrave-Graham
.
EUROCRYPT
Cryptanalysis of the Hidden Matrix Cryptosystem
with
Jean-Charles Faugère
,
Ludovic Perret
and
Joana Treger
.
LATINCRYPT
2009
Oracle-Assisted Static Diffie-Hellman Is Easier than Discrete Logarithms
with
Reynald Lercier
,
David Naccache
and
Emmanuel Thomé
.
IMA Int. Conf.
Fault Attacks on RSA Signatures with Partially Unknown Messages
with
Jean-Sébastien Coron
,
Ilya Kizhvatov
,
David Naccache
and
Pascal Paillier
.
CHES
Improved Generic Algorithms for 3-Collisions
with
Stefan Lucks
.
ASIACRYPT
Factoring pq
2
with Quadratic Forms: Nice Cryptanalyses
with
Guilhem Castagnos
,
Fabien Laguillaumie
and
Phong Q. Nguyen
.
ASIACRYPT
Algorithmic Cryptanalysis.
Chapman & Hall/CRC Cryptography and Network Security Series
Advances in Cryptology - EUROCRYPT 2009, Cologne, Germany.
(Volume Editor)
2008
Introduction chapter of
Identity-Based Cryptography
edited by
Marc Joye
and
Gregory Neven
.
IOS Press, Cryptology and Information Security Series
Another Approach to Pairing Computation in Edwards Coordinates
with
Sorina Ionica
.
INDOCRYPT
Yet Another Attack on Vest
with
Pascal Delaunay
.
AFRICACRYPT
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers
with
Côme Berbain
and
Henri Gilbert
.
SAC
2007
When e-th Roots Become Easier than Factoring
with
David Naccache
and
Emmanuel Thomé
.
ASIACRYPT
Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables
with
Aurélie Bauer
.
EUROCRYPT
Hash Functions and the (Amplified) Boomerang Attack
with
Thomas Peyrin
.
CRYPTO
Overtaking VEST
with
Jean-René Reinhard
.
FSE
2006
The Number Field Sieve in the Medium Prime Case
with
Reynald Lercier
,
Nigel P. Smart
and
Frederik Vercauteren
.
CRYPTO
The Function Field Sieve in the Medium Prime Case
with
Reynald Lercier
.
EUROCRYPT
Inverting HFE Is Quasipolynomial
with
Louis Granboulan
and
Jacques Stern
.
CRYPTO
Chosen-Ciphertext Attacks Against MOSQUITO
with
Frédéric Muller
.
FSE
Galois LFSR, Embedded Devices and Side Channel Weaknesses
with
Pascal Delaunay
.
INDOCRYPT
2005
Collisions of SHA-0 and Reduced SHA-1
with
Eli Biham
,
Rafi Chen
,
Patrick Carribault
,
Christophe Lemuet
and
William Jalby
.
EUROCRYPT
Two Attacks Against the HBB Stream Cipher
with
Frédéric Muller
.
FSE
Cryptanalysis of the Tractable Rational Map Cryptosystem
with
Sébastien Kunz-Jacques
,
Frédéric Muller
and
Pierre-Michel Ricordel
.
PKC
2004
A One Round Protocol for Tripartite Diffie-Hellman.
J. Cryptology
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
CRYPTO
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
with
Pierre-Alain Fouque
and
Guillaume Poupard
.
SAC
2003
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the Gaussian integer method
with
Reynald Lercier
.
Math. Comput.
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups
with
Kim Nguyen
.
J. Cryptology
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
with
Jean-Charles Faugère
.
CRYPTO
Cryptanalysis of the EMD Mode of Operation.
EUROCRYPT
Loosening the KNOT
with
Frédéric Muller
.
FSE
New Attacks against Standardized MACs
with
Guillaume Poupard
and
Jacques Stern
.
FSE
A Chosen IV Attack Against Turing
with
Frédéric Muller
.
SAC
Authenticated On-Line Encryption
with
Pierre-Alain Fouque
,
Gwenaëlle Martinet
and
Frédéric Valette
.
SAC
2002
The Function Field Sieve Is Quite Special
with
Reynald Lercier
.
ANTS
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems.
ANTS
(Invited Talk)
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC
with
Gwenaëlle Martinet
and
Frédéric Valette
.
CRYPTO
Fast Correlation Attacks: An Algorithmic Point of View
with
Philippe Chose
and
Michel Mitton
.
EUROCRYPT
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction
with
Éliane Jaulmes
and
Frédéric Valette
.
FSE
2001
"Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm
with
Reynald Lercier
.
Math. Comput.
Cryptanalysis of PKP: A New Approach
with
Éliane Jaulmes
.
PKC
2000
A One Round Protocol for Tripartite Diffie-Hellman.
ANTS
Why Textbook ElGamal and RSA Encryption Are Insecure
with
Dan Boneh
and
Phong Q. Nguyen
.
ASIACRYPT
A Chosen-Ciphertext Attack against NTRU
with
Éliane Jaulmes
.
CRYPTO
A NICE Cryptanalysis
with
Éliane Jaulmes
.
EUROCRYPT
A Statistical Attack on RC6
with
Henri Gilbert
,
Helena Handschuh
and
Serge Vaudenay
.
FSE
1998
Lattice Reduction: A Toolbox for the Cryptanalyst
with
Jacques Stern
.
J. Cryptology
Differential Collisions in SHA-0
with
Florent Chabaud
.
CRYPTO
The action of a few permutations on r-tuples is quickly transitive
with
Joel Friedman
,
Yuval Roichman
,
Jacques Stern
and
Jean-Pierre Tillich
.
Random Struct. Algorithms
1996
The action of a few permutations on r-tuples is quickly transitive
with
Joel Friedman
,
Yuval Roichman
,
Jacques Stern
and
Jean-Pierre Tillich
.
STACS
1995
Sur les sommes de caractères liées aux courbes elliptiques à multiplication complexe
with
François Morain
.
J. Number Theory
1994
A Practical Attack against Knapsack based Hash Functions
with
Louis Granboulan
.
EUROCRYPT
1993
A fast parallel lattice reduction algorithm.
Second Gauss Symposium
1992
Improved Low-Density Subset Sum Algorithms
with
Matthijs J. Coster
,
Brian A. LaMacchia
,
Andrew M. Odlyzko
,
Claus-Peter Schnorr
and
Jacques Stern
.
Computational Complexity
1991
Cryptanalysis of Another Knapsack Cryptosystem
with
Jacques Stern
.
ASIACRYPT
The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks
with
Yeow Meng Chee
and
Jacques Stern
.
CRYPTO
DBLP
Google Scholar