dblp.uni-trier.dewww.uni-trier.de

Pierre-Alain Fouque

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
34EECéline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer: Optimal Randomness Extraction from a Diffie-Hellman Element. EUROCRYPT 2009: 572-589
2008
33EEPierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer: On the Security of the CCM Encryption Mode and of a Slight Variant. ACNS 2008: 411-428
32EEPierre-Alain Fouque, David Pointcheval, Sébastien Zimmer: HMAC is a randomness extractor and applications to TLS. ASIACCS 2008: 21-32
31EEPierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi: The Carry Leakage on the Randomized Exponent Countermeasure. CHES 2008: 198-213
30EEPierre-Alain Fouque, Gaëtan Leurent: Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. CT-RSA 2008: 19-35
29EEPierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern: Key Recovery on Hidden Monomial Multivariate Schemes. EUROCRYPT 2008: 19-30
28EEElena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer: Second Preimage Attacks on Dithered Hash Functions. EUROCRYPT 2008: 270-288
27EEPierre-Alain Fouque, Reynald Lercier, Denis Réal, Frédéric Valette: Fault Attack onElliptic Curve Montgomery Ladder Implementation. FDTC 2008: 92-98
26EEPierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern: Total Break of the l-IC Signature Scheme. Public Key Cryptography 2008: 1-17
2007
25EEVivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern: Practical Cryptanalysis of SFLASH. CRYPTO 2007: 1-12
24EEPierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen: Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. CRYPTO 2007: 13-30
23EEVivien Dubois, Pierre-Alain Fouque, Jacques Stern: Cryptanalysis of SFLASH with Slightly Modified Parameters. EUROCRYPT 2007: 264-275
22EEVivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern: Cryptanalysis of the SFLASH Signature Scheme. Inscrypt 2007: 1-4
2006
21EEPierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette: Power Attack on Small RSA Public Exponent. CHES 2006: 339-353
20EEPierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer: Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. ICALP (2) 2006: 240-251
19EEOlivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval: The Twist-AUgmented Technique for Key Exchange. Public Key Cryptography 2006: 410-426
18EEÉric Levieil, Pierre-Alain Fouque: An Improved LPN Algorithm. SCN 2006: 348-359
2005
17EEMichel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval: A Simple Threshold Authenticated Key Exchange from Short Secrets. ASIACRYPT 2005: 566-584
16EEPierre-Alain Fouque, Louis Granboulan, Jacques Stern: Differential Cryptanalysis for Multivariate Schemes. EUROCRYPT 2005: 341-353
15EEMichel Abdalla, Pierre-Alain Fouque, David Pointcheval: Password-Based Authenticated Key Exchange in the Three-Party Setting. Public Key Cryptography 2005: 65-84
2004
14EEPierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette: Defeating Countermeasures Based on Randomized BSD Representations. CHES 2004: 312-327
13EEPierre-Alain Fouque, Antoine Joux, Guillaume Poupard: Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Selected Areas in Cryptography 2004: 212-226
2003
12EEPierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard: The Insecurity of Esign in Practical Implementations. ASIACRYPT 2003: 492-506
11EEPierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard: Attacking Unbalanced RSA-CRT Using SPA. CHES 2003: 254-268
10EEPierre-Alain Fouque, Frédéric Valette: The Doubling Attack - Why Upwards Is Better than Downwards. CHES 2003: 269-280
9EEPierre-Alain Fouque, Guillaume Poupard: On the Security of RDSA. EUROCRYPT 2003: 462-476
8EEPierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard: Practical Symmetric On-Line Encryption. FSE 2003: 362-375
7EEPierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette: Authenticated On-Line Encryption. Selected Areas in Cryptography 2003: 145-159
2002
6EEPierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers: CryptoComputing with Rationals. Financial Cryptography 2002: 136-146
2001
5EEPierre-Alain Fouque, Jacques Stern: Fully Distributed Threshold RSA under Standard Assumptions. ASIACRYPT 2001: 310-330
4EEPierre-Alain Fouque, David Pointcheval: Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. ASIACRYPT 2001: 351-368
3EEOlivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Guillaume Poupard: Practical multi-candidate election system. PODC 2001: 274-283
2EEPierre-Alain Fouque, Jacques Stern: One Round Threshold Discrete-Log Key Generation without Private Channels. Public Key Cryptography 2001: 300-316
2000
1EEPierre-Alain Fouque, Guillaume Poupard, Jacques Stern: Sharing Decryption in the Context of Voting or Lotteries. Financial Cryptography 2000: 90-104

Coauthor Index

1Michel Abdalla [15] [17]
2Elena Andreeva [28]
3Olivier Baudron [3]
4Charles Bouillaguet [28]
5Céline Chevalier [34]
6Olivier Chevassut [17] [19]
7M'hamed Drissi [31]
8Vivien Dubois [22] [23] [25]
9Pierrick Gaudry [19]
10Louis Granboulan [16]
11Jonathan J. Hoch [28]
12Nick Howgrave-Graham [12]
13Antoine Joux [7] [13]
14John Kelsey [28]
15Sébastien Kunz-Jacques [21]
16Reynald Lercier [27]
17Gaëtan Leurent [24] [30]
18Éric Levieil [18]
19Gilles Macario-Rat [26] [29]
20Gwenaëlle Martinet [7] [8] [11] [12] [21] [33]
21Frédéric Muller [14] [21]
22Phong Q. Nguyen [24]
23Ludovic Perret [26]
24David Pointcheval [3] [4] [15] [17] [19] [20] [32] [34]
25Guillaume Poupard [1] [3] [8] [9] [11] [12] [13] [14]
26Denis Réal [27] [31]
27Adi Shamir [22] [25] [28]
28Jacques Stern [1] [2] [3] [5] [6] [16] [20] [22] [23] [25] [26] [29]
29Frédéric Valette [7] [10] [14] [21] [27] [31] [33]
30Jan-Geert Wackers [6]
31Sébastien Zimmer [20] [28] [32] [33] [34]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)