Filtrer vos résultats
- 27
- 22
- 1
- 29
- 11
- 3
- 3
- 1
- 1
- 1
- 1
- 43
- 14
- 1
- 1
- 1
- 1
- 1
- 2
- 5
- 1
- 3
- 1
- 8
- 4
- 1
- 6
- 1
- 4
- 1
- 2
- 2
- 3
- 1
- 1
- 48
- 2
- 14
- 13
- 9
- 8
- 7
- 7
- 6
- 6
- 5
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 50
- 8
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
50 résultats
|
|
triés par
|
|
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005PKC 2011 - Proceedings of the 2011 International Conference on Practice and Theory in Public Key Cryptography, Mar 2011, Taormina, Italy. pp.147-155, ⟨10.1007/978-3-642-19379-8_9⟩
Communication dans un congrès
hal-01110234v1
|
||
A Variant of the F4 AlgorithmCT-RSA 2011, Feb 2011, San Francisco, United States. pp.356-375, ⟨10.1007/978-3-642-19074-2_23⟩
Communication dans un congrès
istex
hal-00665022v1
|
|||
Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Groebner bases23rd Annual International Cryptology Conference - CRYPTO 03, 2003, Santa Barbara USA, pp.44-60
Communication dans un congrès
inria-00099731v1
|
|||
Number Field Sieve for DLPEncyclopedia of Cryptography and Security, Springer, pp.867-873, 2011, ⟨10.1007/978-1-4419-5906-5_834⟩
Chapitre d'ouvrage
hal-00665015v1
|
|||
|
Reducing number field defining polynomials: an application to class group computationsAlgorithmic Number Theory Symposium XII, Aug 2016, Kaiserslautern, Germany. pp.315--331 ⟨10.1112/S1461157016000255⟩
Communication dans un congrès
hal-01362144v1
|
||
How to Securely Compute with Noisy Leakage in Quasilinear ComplexityAdvances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, Springer, pp.547-574, 2018
Chapitre d'ouvrage
hal-01960745v1
|
|||
|
Pairing the Volcano2011
Rapport
hal-00448031v2
|
||
|
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the Static Diffie-Hellman Problem on E(F q 5 )Journal of Cryptology, 2013, 26 (1), pp.119-143
Article dans une revue
hal-01981543v1
|
||
|
Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, Dec 2009, Tokyo, Japan. pp.469 - 486, ⟨10.1007/978-3-642-10366-7_28⟩
Communication dans un congrès
hal-01082340v1
|
||
Improved Generic Algorithms for Hard Knapsacks2011, pp.474
Autre publication scientifique
hal-00666059v1
|
|||
|
Discrete logarithm and Diffie-Hellman problems in identity black-box groups2019
Pré-publication, Document de travail
hal-02350271v1
|
||
|
Optimal quantum-programmable projective measurement with linear opticsPhysical Review A, 2018, ⟨10.1103/PhysRevA.98.062318⟩
Article dans une revue
hal-01931757v1
|
||
Progress in Cryptology -- AFRICACRYPT 20182018
Ouvrages
hal-02321057v1
|
|||
|
A sieve algorithm based on overlatticesLMS Journal of Computation and Mathematics, 2014, 17 (Special Issue A), pp.49-70. ⟨10.1112/S1461157014000229⟩
Article dans une revue
hal-01198935v1
|
||
|
Recovering a sum of two squares decompositionJournal of Symbolic Computation, 2014, 64, pp.16-21. ⟨10.1016/j.jsc.2013.12.003⟩
Article dans une revue
hal-01198937v1
|
||
|
Authenticated On-Line EncryptionSelected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, 2004, Ottawa, Canada. pp.145-159, ⟨10.1007/978-3-540-24654-1_11⟩
Communication dans un congrès
inria-00563967v1
|
||
|
Factoring pq² with Quadratic Forms: Nice CryptanalysesASIACRYPT'2009 - 15th Annual International Conference on the Theory and Application of Cryptology and Information Security, A, Dec 2009, Tokyo, Japan. pp.469-486, ⟨10.1007/978-3-642-10366-7⟩
Communication dans un congrès
hal-01022756v1
|
||
Pairing the volcanoMathematics of Computation, 2013, 82 (281), pp.581-603
Article dans une revue
hal-01323886v1
|
|||
|
Injective Encodings to Elliptic CurvesInformation Security and Privacy - 18th Australasian Conference, Jul 2013, Brisbane, Australia. pp.16, ⟨10.1007/978-3-642-39059-3_14⟩
Communication dans un congrès
hal-01094294v1
|
||
|
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields20th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2014, Kaoshiung, Taiwan. pp.378-397, ⟨10.1007/978-3-662-45611-8_20⟩
Communication dans un congrès
hal-01213649v1
|
||
|
Symmetrized summation polynomials: using small order torsion points to speed up elliptic curve index calculusEUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2014, Copenhagen, Denmark. pp.40-57, ⟨10.1007/978-3-642-55220-5_3⟩
Communication dans un congrès
hal-00935050v1
|
||
|
Improvements to the general number field sieve for discrete logarithms in prime fieldsMathematics of Computation, 2003, 72, pp.953-967. ⟨10.1090/S0025-5718-02-01482-5⟩
Article dans une revue
hal-01102016v1
|
||
|
A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristicAdvances in Cryptology -- EUROCRYPT 2014, May 2014, Copenhagen, Denmark. pp.1-16, ⟨10.1007/978-3-642-55220-5_1⟩
Communication dans un congrès
hal-00835446v2
|
||
|
The Function Field Sieve in the Medium Prime CaseEUROCRYPT 2006, May 2006, Saint Petersbourg, Russia. pp.254-270, ⟨10.1007/11761679_16⟩
Communication dans un congrès
hal-00456191v1
|
||
|
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE20th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2014, Kaoshiung, Taiwan. pp.420-438, ⟨10.1007/978-3-662-45611-8_22⟩
Communication dans un congrès
hal-01213662v1
|
||
|
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE (Full version * )Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.20
Communication dans un congrès
hal-01094051v1
|
||
|
Nearly Sparse Linear Algebra and application to Discrete Logarithms ComputationsContemporary Developments in Finite Fields and Applications , 2016, 978-981-4719-27-8 ⟨10.1142/9789814719261_0008⟩
Chapitre d'ouvrage
hal-01154879v2
|
||
|
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Grobner BasesCRYPTO 2003 - 23rd Annual International Cryptology Conference, Aug 2003, Santa Barbara, California, United States. pp.44-60, ⟨10.1007/978-3-540-45146-4_3⟩
Communication dans un congrès
hal-01531947v1
|
||
|
Cover and Decomposition Index Calculus on Elliptic Curves made practical2015
Pré-publication, Document de travail
hal-01121942v1
|
||
|
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithmsAdvances in Mathematics of Communications, In press, ⟨10.3934/amc.2022085⟩
Article dans une revue
hal-02173688v2
|
- 1
- 2