Pierre-Alain Fouque
Orcid: 0000-0003-4997-2276Affiliations:
- Rennes University, France
According to our database1,
Pierre-Alain Fouque
authored at least 192 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cryptol., March, 2024
IACR Trans. Symmetric Cryptol., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
"These results must be false": A usability evaluation of constant-time analysis tools.
Proceedings of the 33rd USENIX Security Symposium, 2024
They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024
Proceedings of the Symposium on Algorithm Engineering and Experiments, 2024
2023
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME.
Proc. Priv. Enhancing Technol., October, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
âTheyâre not that hard to mitigateâ: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
J. Cryptogr. Eng., 2020
IACR Cryptol. ePrint Arch., 2020
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)).
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IEEE Trans. Inf. Theory, 2019
Proc. Priv. Enhancing Technol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Security-Efficiency Tradeoffs in Searchable Encryption - Lower Bounds and Optimal Constructions.
IACR Cryptol. ePrint Arch., 2019
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
IACR Cryptol. ePrint Arch., 2019
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2019
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IEEE Trans. Computers, 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data.
IACR Cryptol. ePrint Arch., 2017
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers.
IACR Cryptol. ePrint Arch., 2017
Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding.
IACR Cryptol. ePrint Arch., 2017
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L<sub>|Δ𝕂|</sub>(½) and Application to the Cryptanalysis of a FHE Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
2016
Proc. Priv. Enhancing Technol., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Solving the "Isomorphism of Polynomials with Two Secrets" Problem for all Pairs of Quadratic Forms.
CoRR, 2014
Statistical Properties of Short RSA Distribution and Their Cryptographic Applications.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Math. Comput., 2013
J. Cryptogr. Eng., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
J. Math. Cryptol., 2012
IET Inf. Secur., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round <i>Lesamnta</i> and <i>SHAvite-3</i><sub>512</sub>.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3<sub>512</sub>.
IACR Cryptol. ePrint Arch., 2009
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Financial Cryptography, 2000