2009 | ||
---|---|---|
47 | EE | Antoine Joux: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings Springer 2009 |
2008 | ||
46 | EE | Pascal Delaunay, Antoine Joux: Yet Another Attack on Vest. AFRICACRYPT 2008: 221-235 |
45 | EE | Sorina Ionica, Antoine Joux: Another Approach to Pairing Computation in Edwards Coordinates. INDOCRYPT 2008: 400-413 |
2007 | ||
44 | EE | Antoine Joux, David Naccache, Emmanuel Thomé: When e-th Roots Become Easier Than Factoring. ASIACRYPT 2007: 13-28 |
43 | EE | Antoine Joux, Thomas Peyrin: Hash Functions and the (Amplified) Boomerang Attack. CRYPTO 2007: 244-263 |
42 | EE | Aurélie Bauer, Antoine Joux: Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. EUROCRYPT 2007: 361-378 |
41 | EE | Antoine Joux, Jean-René Reinhard: Overtaking VEST. FSE 2007: 58-72 |
2006 | ||
40 | EE | Antoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren: The Number Field Sieve in the Medium Prime Case. CRYPTO 2006: 326-344 |
39 | EE | Louis Granboulan, Antoine Joux, Jacques Stern: Inverting HFE Is Quasipolynomial. CRYPTO 2006: 345-356 |
38 | EE | Antoine Joux, Reynald Lercier: The Function Field Sieve in the Medium Prime Case. EUROCRYPT 2006: 254-270 |
37 | EE | Antoine Joux, Frédéric Muller: Chosen-Ciphertext Attacks Against MOSQUITO. FSE 2006: 390-404 |
36 | EE | Antoine Joux, Pascal Delaunay: Galois LFSR, Embedded Devices and Side Channel Weaknesses. INDOCRYPT 2006: 436-451 |
2005 | ||
35 | EE | Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby: Collisions of SHA-0 and Reduced SHA-1. EUROCRYPT 2005: 36-57 |
34 | EE | Antoine Joux, Frédéric Muller: Two Attacks Against the HBB Stream Cipher. FSE 2005: 330-341 |
33 | EE | Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel: Cryptanalysis of the Tractable Rational Map Cryptosystem. Public Key Cryptography 2005: 258-274 |
2004 | ||
32 | EE | Antoine Joux: Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. CRYPTO 2004: 306-316 |
31 | EE | Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard: Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Selected Areas in Cryptography 2004: 212-226 |
30 | EE | Antoine Joux: A One Round Protocol for Tripartite Diffie-Hellman. J. Cryptology 17(4): 263-276 (2004) |
2003 | ||
29 | EE | Jean-Charles Faugère, Antoine Joux: Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. CRYPTO 2003: 44-60 |
28 | EE | Antoine Joux: Cryptanalysis of the EMD Mode of Operation. EUROCRYPT 2003: 1-16 |
27 | EE | Antoine Joux, Guillaume Poupard, Jacques Stern: New Attacks against Standardized MACs. FSE 2003: 170-181 |
26 | EE | Antoine Joux, Frédéric Muller: Loosening the KNOT. FSE 2003: 87-99 |
25 | EE | Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette: Authenticated On-Line Encryption. Selected Areas in Cryptography 2003: 145-159 |
24 | EE | Antoine Joux, Frédéric Muller: A Chosen IV Attack Against Turing. Selected Areas in Cryptography 2003: 194-207 |
23 | EE | Antoine Joux, Kim Nguyen: Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. J. Cryptology 16(4): 239-247 (2003) |
22 | Antoine Joux, Reynald Lercier: Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method. Math. Comput. 72(242): 953-967 (2003) | |
2002 | ||
21 | EE | Antoine Joux: The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems. ANTS 2002: 20-32 |
20 | EE | Antoine Joux, Reynald Lercier: The Function Field Sieve Is Quite Special. ANTS 2002: 431-445 |
19 | EE | Antoine Joux, Gwenaëlle Martinet, Frédéric Valette: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. CRYPTO 2002: 17-30 |
18 | EE | Philippe Chose, Antoine Joux, Michel Mitton: Fast Correlation Attacks: An Algorithmic Point of View. EUROCRYPT 2002: 209-221 |
17 | EE | Éliane Jaulmes, Antoine Joux, Frédéric Valette: On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. FSE 2002: 237-251 |
2001 | ||
16 | EE | Éliane Jaulmes, Antoine Joux: Cryptanalysis of PKP: A New Approach. Public Key Cryptography 2001: 165-172 |
15 | Antoine Joux, Reynald Lercier: "Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm. Math. Comput. 70(234): 827-836 (2001) | |
2000 | ||
14 | Antoine Joux: A One Round Protocol for Tripartite Diffie-Hellman. ANTS 2000: 385-394 | |
13 | EE | Dan Boneh, Antoine Joux, Phong Q. Nguyen: Why Textbook ElGamal and RSA Encryption Are Insecure. ASIACRYPT 2000: 30-43 |
12 | EE | Éliane Jaulmes, Antoine Joux: A Chosen-Ciphertext Attack against NTRU. CRYPTO 2000: 20-35 |
11 | EE | Éliane Jaulmes, Antoine Joux: A NICE Cryptanalysis. EUROCRYPT 2000: 382-391 |
10 | EE | Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay: A Statistical Attack on RC6. FSE 2000: 64-74 |
1998 | ||
9 | EE | Florent Chabaud, Antoine Joux: Differential Collisions in SHA-0. CRYPTO 1998: 56-71 |
8 | EE | Antoine Joux, Jacques Stern: Lattice Reduction: A Toolbox for the Cryptanalyst. J. Cryptology 11(3): 161-185 (1998) |
7 | Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich: The action of a few permutations on r-tuples is quickly transitive. Random Struct. Algorithms 12(4): 335-350 (1998) | |
1996 | ||
6 | Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich: The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography. STACS 1996: 375-386 | |
1994 | ||
5 | EE | Antoine Joux, Louis Granboulan: A Practical Attack against Knapsack based Hash Functions (Extended Abstract). EUROCRYPT 1994: 58-66 |
1992 | ||
4 | Matthijs J. Coster, Antoine Joux, Brian A. LaMacchia, Andrew M. Odlyzko, Claus-Peter Schnorr, Jacques Stern: Improved Low-Density Subset Sum Algorithms. Computational Complexity 2: 111-128 (1992) | |
1991 | ||
3 | Antoine Joux, Jacques Stern: Cryptanalysis of Another Knapsack Cryptosystem. ASIACRYPT 1991: 470-476 | |
2 | EE | Yeow Meng Chee, Antoine Joux, Jacques Stern: The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. CRYPTO 1991: 204-212 |
1 | Antoine Joux, Jacques Stern: Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems. FCT 1991: 258-264 |