Filtrer vos résultats
- 22
- 14
- 23
- 5
- 4
- 1
- 1
- 1
- 1
- 1
- 35
- 5
- 2
- 2
- 2
- 3
- 4
- 4
- 4
- 4
- 3
- 4
- 1
- 1
- 2
- 36
- 26
- 16
- 15
- 12
- 6
- 6
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 36
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
36 résultats
|
|
triés par
|
|
Quantum Lattice Enumeration and Tweaking Discrete PruningAsiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia
Communication dans un congrès
hal-01870620v1
|
||
|
Learning a Zonotope and More: Cryptanalysis of NTRUSign CountermeasuresASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, IACR, Dec 2012, Beijing, China. pp.433-450, ⟨10.1007/978-3-642-34961-4_27⟩
Communication dans un congrès
hal-00864359v1
|
||
|
Random Sampling Revisited: Lattice Enumeration with Discrete PruningEUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2017, Paris, France. pp.65 - 102
Communication dans un congrès
hal-01502051v1
|
||
|
Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, Dec 2009, Tokyo, Japan. pp.469 - 486, ⟨10.1007/978-3-642-10366-7_28⟩
Communication dans un congrès
hal-01082340v1
|
||
Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings2017
Ouvrages
hal-01730633v1
|
|||
|
Solving BDD by Enumeration: An UpdateCT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, Feb 2013, San Francisco, United States. pp.293-309, ⟨10.1007/978-3-642-36095-4_19⟩
Communication dans un congrès
hal-00864361v1
|
||
Modulus Fault Attacks against RSA-CRT SignaturesJournal of Cryptographic Engineering, 2011, 1 (3), pp.245-253
Article dans une revue
hal-01110038v1
|
|||
|
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩
Communication dans un congrès
inria-00556690v1
|
||
An LLL Algorithm with Quadratic ComplexitySIAM Journal on Computing, 2009, pp.874-903
Article dans une revue
hal-00550981v1
|
|||
|
Factoring pq² with Quadratic Forms: Nice CryptanalysesASIACRYPT'2009 - 15th Annual International Conference on the Theory and Application of Cryptology and Information Security, A, Dec 2009, Tokyo, Japan. pp.469-486, ⟨10.1007/978-3-642-10366-7⟩
Communication dans un congrès
hal-01022756v1
|
||
Abstracting Lattice-based CryptographyWorkshop on Algebraic Aspects of Cryptography, Aug 2013, Fukuoka, Japan
Communication dans un congrès
hal-00932567v1
|
|||
|
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part II - EUROCRYPT 2016, IACR, May 2016, Vienna, Austria. pp.528-558, ⟨10.1007/978-3-662-49896-5_19⟩
Communication dans un congrès
hal-01382384v1
|
||
|
Lattice Reduction Algorithms: Theory and PracticeEUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2011, Talinn, Estonia. pp.2-6, ⟨10.1007/978-3-642-20465-4_2⟩
Communication dans un congrès
hal-01109971v1
|
||
|
The LLL Algorithm: Survey and ApplicationsSpringer, 2010, Information Security and Cryptography, 978-3-642-02294-4. ⟨10.1007/978-3-642-02295-1⟩
Ouvrages
hal-01141414v1
|
||
|
Approximating the densest sublattice from Rankin's inequalityLMS Journal of Computation and Mathematics, 2014, Special Issue A (Algorithmic Number Theory Symposium XI), 7 (A), pp.92-111. ⟨10.1112/S1461157014000333⟩
Article dans une revue
hal-01057710v1
|
||
Low-Dimensional Lattice Reduction Revisited (Extended Abstract)6th International Symposium on Algorithmic Number Theory - ANTS VI, 2004, Burligton, United States. pp.338--357
Communication dans un congrès
inria-00100176v1
|
|||
|
Modulus Fault Attacks against RSA-CRT SignaturesCHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. pp.192-206, ⟨10.1007/978-3-642-23951-9_13⟩
Communication dans un congrès
hal-01109981v1
|
||
|
Faster Gaussian Lattice Sampling Using Lazy Floating-Point ArithmeticASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, IACR, Dec 2012, Beijing, China. pp.415-432, ⟨10.1007/978-3-642-34961-4_26⟩
Communication dans un congrès
hal-00864360v1
|
||
Lattices and Finite Groups: Mathematics, Complexity and CryptographyWorkshop on Number Theory, Geometry and Cryptography, Jul 2013, Warwick, United Kingdom
Communication dans un congrès
hal-00932569v1
|
|||
Advances in Cryptology - EUROCRYPT 2014EUROCRYPT 2014, May 2014, Copenhague, Denmark. 8441, Springer, 2014, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-55220-5⟩
Proceedings/Recueil des communications
hal-01104168v1
|
|||
|
BKZ 2.0: Better Lattice Security EstimatesASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2011, Seoul, South Korea. pp.1-20, ⟨10.1007/978-3-642-25385-0_1⟩
Communication dans un congrès
hal-01109961v1
|
||
|
Lower Bounds on Lattice Enumeration with Extreme PruningCRYPTO 2018, 38th Annual International Cryptology Conference, IACR, Aug 2018, Santa-Barbara, United States. ⟨10.1007/978-3-319-96881-0_21⟩
Communication dans un congrès
hal-01845023v1
|
||
|
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the IntegersEUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩
Communication dans un congrès
hal-00864374v1
|
||
|
Counting Co-Cyclic Lattices2015
Pré-publication, Document de travail
hal-01256022v1
|
||
Advances in Cryptology -- EUROCRYPT 2013Thomas Johansson and Phong Q. Nguyen. Springer, 7881, pp.736, 2013, Lecture Notes in Computer Science, 978-3-642-38347-2. ⟨10.1007/978-3-642-38348-9⟩
Ouvrages
hal-00922221v1
|
|||
Floating-point LLL Revisited24th Annual Eurocrypt Conference - Eurocrypt 2005, 2005, Aarhus/Danemark
Communication dans un congrès
inria-00000377v1
|
|||
|
Lattice Enumeration Using Extreme PruningProceedings of the 29th International Conference on Cryptology - EUROCRYPT 2010, May 2010, Nice, France. pp.257 - 278, ⟨10.1007/978-3-642-13190-5_13⟩
Communication dans un congrès
hal-01083526v1
|
||
|
Simpler Efficient Group Signatures from LatticesPublic-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, IACR, Mar 2015, Gaithersburg, United States. ⟨10.1007/978-3-662-46447-2_18⟩
Communication dans un congrès
hal-01256013v1
|
||
Lattice-Based Fault Attacks on SignaturesMarc Joye and Michael Tunstall. Fault Analysis in Cryptography, Springer, pp.201-220, 2012, Information Security and Cryptography, ⟨10.1007/978-3-642-29656-7_12⟩
Chapitre d'ouvrage
hal-00922233v1
|
|||
|
Counting Co-Cyclic LatticesSIAM Journal on Discrete Mathematics, 2016, 30 (3), pp.1358-1370. ⟨10.1137/15M103950X⟩
Article dans une revue
hal-01382385v1
|
- 1
- 2