2009 |
47 | EE | Antoine Joux:
Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
Springer 2009 |
2008 |
46 | EE | Pascal Delaunay,
Antoine Joux:
Yet Another Attack on Vest.
AFRICACRYPT 2008: 221-235 |
45 | EE | Sorina Ionica,
Antoine Joux:
Another Approach to Pairing Computation in Edwards Coordinates.
INDOCRYPT 2008: 400-413 |
2007 |
44 | EE | Antoine Joux,
David Naccache,
Emmanuel Thomé:
When e-th Roots Become Easier Than Factoring.
ASIACRYPT 2007: 13-28 |
43 | EE | Antoine Joux,
Thomas Peyrin:
Hash Functions and the (Amplified) Boomerang Attack.
CRYPTO 2007: 244-263 |
42 | EE | Aurélie Bauer,
Antoine Joux:
Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables.
EUROCRYPT 2007: 361-378 |
41 | EE | Antoine Joux,
Jean-René Reinhard:
Overtaking VEST.
FSE 2007: 58-72 |
2006 |
40 | EE | Antoine Joux,
Reynald Lercier,
Nigel P. Smart,
Frederik Vercauteren:
The Number Field Sieve in the Medium Prime Case.
CRYPTO 2006: 326-344 |
39 | EE | Louis Granboulan,
Antoine Joux,
Jacques Stern:
Inverting HFE Is Quasipolynomial.
CRYPTO 2006: 345-356 |
38 | EE | Antoine Joux,
Reynald Lercier:
The Function Field Sieve in the Medium Prime Case.
EUROCRYPT 2006: 254-270 |
37 | EE | Antoine Joux,
Frédéric Muller:
Chosen-Ciphertext Attacks Against MOSQUITO.
FSE 2006: 390-404 |
36 | EE | Antoine Joux,
Pascal Delaunay:
Galois LFSR, Embedded Devices and Side Channel Weaknesses.
INDOCRYPT 2006: 436-451 |
2005 |
35 | EE | Eli Biham,
Rafi Chen,
Antoine Joux,
Patrick Carribault,
Christophe Lemuet,
William Jalby:
Collisions of SHA-0 and Reduced SHA-1.
EUROCRYPT 2005: 36-57 |
34 | EE | Antoine Joux,
Frédéric Muller:
Two Attacks Against the HBB Stream Cipher.
FSE 2005: 330-341 |
33 | EE | Antoine Joux,
Sébastien Kunz-Jacques,
Frédéric Muller,
Pierre-Michel Ricordel:
Cryptanalysis of the Tractable Rational Map Cryptosystem.
Public Key Cryptography 2005: 258-274 |
2004 |
32 | EE | Antoine Joux:
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
CRYPTO 2004: 306-316 |
31 | EE | Pierre-Alain Fouque,
Antoine Joux,
Guillaume Poupard:
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Selected Areas in Cryptography 2004: 212-226 |
30 | EE | Antoine Joux:
A One Round Protocol for Tripartite Diffie-Hellman.
J. Cryptology 17(4): 263-276 (2004) |
2003 |
29 | EE | Jean-Charles Faugère,
Antoine Joux:
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.
CRYPTO 2003: 44-60 |
28 | EE | Antoine Joux:
Cryptanalysis of the EMD Mode of Operation.
EUROCRYPT 2003: 1-16 |
27 | EE | Antoine Joux,
Guillaume Poupard,
Jacques Stern:
New Attacks against Standardized MACs.
FSE 2003: 170-181 |
26 | EE | Antoine Joux,
Frédéric Muller:
Loosening the KNOT.
FSE 2003: 87-99 |
25 | EE | Pierre-Alain Fouque,
Antoine Joux,
Gwenaëlle Martinet,
Frédéric Valette:
Authenticated On-Line Encryption.
Selected Areas in Cryptography 2003: 145-159 |
24 | EE | Antoine Joux,
Frédéric Muller:
A Chosen IV Attack Against Turing.
Selected Areas in Cryptography 2003: 194-207 |
23 | EE | Antoine Joux,
Kim Nguyen:
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups.
J. Cryptology 16(4): 239-247 (2003) |
22 | | Antoine Joux,
Reynald Lercier:
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method.
Math. Comput. 72(242): 953-967 (2003) |
2002 |
21 | EE | Antoine Joux:
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems.
ANTS 2002: 20-32 |
20 | EE | Antoine Joux,
Reynald Lercier:
The Function Field Sieve Is Quite Special.
ANTS 2002: 431-445 |
19 | EE | Antoine Joux,
Gwenaëlle Martinet,
Frédéric Valette:
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC.
CRYPTO 2002: 17-30 |
18 | EE | Philippe Chose,
Antoine Joux,
Michel Mitton:
Fast Correlation Attacks: An Algorithmic Point of View.
EUROCRYPT 2002: 209-221 |
17 | EE | Éliane Jaulmes,
Antoine Joux,
Frédéric Valette:
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction.
FSE 2002: 237-251 |
2001 |
16 | EE | Éliane Jaulmes,
Antoine Joux:
Cryptanalysis of PKP: A New Approach.
Public Key Cryptography 2001: 165-172 |
15 | | Antoine Joux,
Reynald Lercier:
"Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm.
Math. Comput. 70(234): 827-836 (2001) |
2000 |
14 | | Antoine Joux:
A One Round Protocol for Tripartite Diffie-Hellman.
ANTS 2000: 385-394 |
13 | EE | Dan Boneh,
Antoine Joux,
Phong Q. Nguyen:
Why Textbook ElGamal and RSA Encryption Are Insecure.
ASIACRYPT 2000: 30-43 |
12 | EE | Éliane Jaulmes,
Antoine Joux:
A Chosen-Ciphertext Attack against NTRU.
CRYPTO 2000: 20-35 |
11 | EE | Éliane Jaulmes,
Antoine Joux:
A NICE Cryptanalysis.
EUROCRYPT 2000: 382-391 |
10 | EE | Henri Gilbert,
Helena Handschuh,
Antoine Joux,
Serge Vaudenay:
A Statistical Attack on RC6.
FSE 2000: 64-74 |
1998 |
9 | EE | Florent Chabaud,
Antoine Joux:
Differential Collisions in SHA-0.
CRYPTO 1998: 56-71 |
8 | EE | Antoine Joux,
Jacques Stern:
Lattice Reduction: A Toolbox for the Cryptanalyst.
J. Cryptology 11(3): 161-185 (1998) |
7 | | Joel Friedman,
Antoine Joux,
Yuval Roichman,
Jacques Stern,
Jean-Pierre Tillich:
The action of a few permutations on r-tuples is quickly transitive.
Random Struct. Algorithms 12(4): 335-350 (1998) |
1996 |
6 | | Joel Friedman,
Antoine Joux,
Yuval Roichman,
Jacques Stern,
Jean-Pierre Tillich:
The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography.
STACS 1996: 375-386 |
1994 |
5 | EE | Antoine Joux,
Louis Granboulan:
A Practical Attack against Knapsack based Hash Functions (Extended Abstract).
EUROCRYPT 1994: 58-66 |
1992 |
4 | | Matthijs J. Coster,
Antoine Joux,
Brian A. LaMacchia,
Andrew M. Odlyzko,
Claus-Peter Schnorr,
Jacques Stern:
Improved Low-Density Subset Sum Algorithms.
Computational Complexity 2: 111-128 (1992) |
1991 |
3 | | Antoine Joux,
Jacques Stern:
Cryptanalysis of Another Knapsack Cryptosystem.
ASIACRYPT 1991: 470-476 |
2 | EE | Yeow Meng Chee,
Antoine Joux,
Jacques Stern:
The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
CRYPTO 1991: 204-212 |
1 | | Antoine Joux,
Jacques Stern:
Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems.
FCT 1991: 258-264 |