| 2009 |
| 47 | EE | Antoine Joux:
Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
Springer 2009 |
| 2008 |
| 46 | EE | Pascal Delaunay,
Antoine Joux:
Yet Another Attack on Vest.
AFRICACRYPT 2008: 221-235 |
| 45 | EE | Sorina Ionica,
Antoine Joux:
Another Approach to Pairing Computation in Edwards Coordinates.
INDOCRYPT 2008: 400-413 |
| 2007 |
| 44 | EE | Antoine Joux,
David Naccache,
Emmanuel Thomé:
When e-th Roots Become Easier Than Factoring.
ASIACRYPT 2007: 13-28 |
| 43 | EE | Antoine Joux,
Thomas Peyrin:
Hash Functions and the (Amplified) Boomerang Attack.
CRYPTO 2007: 244-263 |
| 42 | EE | Aurélie Bauer,
Antoine Joux:
Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables.
EUROCRYPT 2007: 361-378 |
| 41 | EE | Antoine Joux,
Jean-René Reinhard:
Overtaking VEST.
FSE 2007: 58-72 |
| 2006 |
| 40 | EE | Antoine Joux,
Reynald Lercier,
Nigel P. Smart,
Frederik Vercauteren:
The Number Field Sieve in the Medium Prime Case.
CRYPTO 2006: 326-344 |
| 39 | EE | Louis Granboulan,
Antoine Joux,
Jacques Stern:
Inverting HFE Is Quasipolynomial.
CRYPTO 2006: 345-356 |
| 38 | EE | Antoine Joux,
Reynald Lercier:
The Function Field Sieve in the Medium Prime Case.
EUROCRYPT 2006: 254-270 |
| 37 | EE | Antoine Joux,
Frédéric Muller:
Chosen-Ciphertext Attacks Against MOSQUITO.
FSE 2006: 390-404 |
| 36 | EE | Antoine Joux,
Pascal Delaunay:
Galois LFSR, Embedded Devices and Side Channel Weaknesses.
INDOCRYPT 2006: 436-451 |
| 2005 |
| 35 | EE | Eli Biham,
Rafi Chen,
Antoine Joux,
Patrick Carribault,
Christophe Lemuet,
William Jalby:
Collisions of SHA-0 and Reduced SHA-1.
EUROCRYPT 2005: 36-57 |
| 34 | EE | Antoine Joux,
Frédéric Muller:
Two Attacks Against the HBB Stream Cipher.
FSE 2005: 330-341 |
| 33 | EE | Antoine Joux,
Sébastien Kunz-Jacques,
Frédéric Muller,
Pierre-Michel Ricordel:
Cryptanalysis of the Tractable Rational Map Cryptosystem.
Public Key Cryptography 2005: 258-274 |
| 2004 |
| 32 | EE | Antoine Joux:
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
CRYPTO 2004: 306-316 |
| 31 | EE | Pierre-Alain Fouque,
Antoine Joux,
Guillaume Poupard:
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Selected Areas in Cryptography 2004: 212-226 |
| 30 | EE | Antoine Joux:
A One Round Protocol for Tripartite Diffie-Hellman.
J. Cryptology 17(4): 263-276 (2004) |
| 2003 |
| 29 | EE | Jean-Charles Faugère,
Antoine Joux:
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.
CRYPTO 2003: 44-60 |
| 28 | EE | Antoine Joux:
Cryptanalysis of the EMD Mode of Operation.
EUROCRYPT 2003: 1-16 |
| 27 | EE | Antoine Joux,
Guillaume Poupard,
Jacques Stern:
New Attacks against Standardized MACs.
FSE 2003: 170-181 |
| 26 | EE | Antoine Joux,
Frédéric Muller:
Loosening the KNOT.
FSE 2003: 87-99 |
| 25 | EE | Pierre-Alain Fouque,
Antoine Joux,
Gwenaëlle Martinet,
Frédéric Valette:
Authenticated On-Line Encryption.
Selected Areas in Cryptography 2003: 145-159 |
| 24 | EE | Antoine Joux,
Frédéric Muller:
A Chosen IV Attack Against Turing.
Selected Areas in Cryptography 2003: 194-207 |
| 23 | EE | Antoine Joux,
Kim Nguyen:
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups.
J. Cryptology 16(4): 239-247 (2003) |
| 22 | | Antoine Joux,
Reynald Lercier:
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method.
Math. Comput. 72(242): 953-967 (2003) |
| 2002 |
| 21 | EE | Antoine Joux:
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems.
ANTS 2002: 20-32 |
| 20 | EE | Antoine Joux,
Reynald Lercier:
The Function Field Sieve Is Quite Special.
ANTS 2002: 431-445 |
| 19 | EE | Antoine Joux,
Gwenaëlle Martinet,
Frédéric Valette:
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC.
CRYPTO 2002: 17-30 |
| 18 | EE | Philippe Chose,
Antoine Joux,
Michel Mitton:
Fast Correlation Attacks: An Algorithmic Point of View.
EUROCRYPT 2002: 209-221 |
| 17 | EE | Éliane Jaulmes,
Antoine Joux,
Frédéric Valette:
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction.
FSE 2002: 237-251 |
| 2001 |
| 16 | EE | Éliane Jaulmes,
Antoine Joux:
Cryptanalysis of PKP: A New Approach.
Public Key Cryptography 2001: 165-172 |
| 15 | | Antoine Joux,
Reynald Lercier:
"Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm.
Math. Comput. 70(234): 827-836 (2001) |
| 2000 |
| 14 | | Antoine Joux:
A One Round Protocol for Tripartite Diffie-Hellman.
ANTS 2000: 385-394 |
| 13 | EE | Dan Boneh,
Antoine Joux,
Phong Q. Nguyen:
Why Textbook ElGamal and RSA Encryption Are Insecure.
ASIACRYPT 2000: 30-43 |
| 12 | EE | Éliane Jaulmes,
Antoine Joux:
A Chosen-Ciphertext Attack against NTRU.
CRYPTO 2000: 20-35 |
| 11 | EE | Éliane Jaulmes,
Antoine Joux:
A NICE Cryptanalysis.
EUROCRYPT 2000: 382-391 |
| 10 | EE | Henri Gilbert,
Helena Handschuh,
Antoine Joux,
Serge Vaudenay:
A Statistical Attack on RC6.
FSE 2000: 64-74 |
| 1998 |
| 9 | EE | Florent Chabaud,
Antoine Joux:
Differential Collisions in SHA-0.
CRYPTO 1998: 56-71 |
| 8 | EE | Antoine Joux,
Jacques Stern:
Lattice Reduction: A Toolbox for the Cryptanalyst.
J. Cryptology 11(3): 161-185 (1998) |
| 7 | | Joel Friedman,
Antoine Joux,
Yuval Roichman,
Jacques Stern,
Jean-Pierre Tillich:
The action of a few permutations on r-tuples is quickly transitive.
Random Struct. Algorithms 12(4): 335-350 (1998) |
| 1996 |
| 6 | | Joel Friedman,
Antoine Joux,
Yuval Roichman,
Jacques Stern,
Jean-Pierre Tillich:
The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography.
STACS 1996: 375-386 |
| 1994 |
| 5 | EE | Antoine Joux,
Louis Granboulan:
A Practical Attack against Knapsack based Hash Functions (Extended Abstract).
EUROCRYPT 1994: 58-66 |
| 1992 |
| 4 | | Matthijs J. Coster,
Antoine Joux,
Brian A. LaMacchia,
Andrew M. Odlyzko,
Claus-Peter Schnorr,
Jacques Stern:
Improved Low-Density Subset Sum Algorithms.
Computational Complexity 2: 111-128 (1992) |
| 1991 |
| 3 | | Antoine Joux,
Jacques Stern:
Cryptanalysis of Another Knapsack Cryptosystem.
ASIACRYPT 1991: 470-476 |
| 2 | EE | Yeow Meng Chee,
Antoine Joux,
Jacques Stern:
The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
CRYPTO 1991: 204-212 |
| 1 | | Antoine Joux,
Jacques Stern:
Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems.
FCT 1991: 258-264 |