publications
recent publications in reversed chronological order
2024
-
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
In 5th Conference on Information-Theoretic Cryptography, ITC 2024, August 14-16, 2024, Stanford, CA, USA (Divesh Aggarwal, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs), vol. to appear, (2024).
open access -
Preliminary Cryptanalysis of the Biscuit Signature Scheme
IACR Comm. in Cryptology. 1, 1, (2024).
open access doi -
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
IACR Comm. in Cryptology. 1, 1, (2024).
open access doi -
Secure Multi-Party Linear Algebra with Perfect Correctness
IACR Comm. in Cryptology. 1, 1, (2024).
open access doi -
Lattice attacks on pairing-based signatures
Inf. Secur. J. A Glob. Perspect. 33, 2, pp. 138-157 (2024).
open access doi
2023
-
Mathematical studies of arithmetical pseudo-random numbers generators. (Étude de générateurs pseudo aléatoires en cryptographie mathématique)
Thèse de doctorat. Sorbonne Université (2023).
open access -
Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification
In Smart Card Research and Advanced Applications - 22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers (Shivam Bhasin, and Thomas Roche, eds), Springer, Lecture Notes in Computer Science, vol. 14530, pp. 62–83 (2023).
open access doi -
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve
In Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV (Jian Guo, and Ron Steinfeld, eds), Springer, Lecture Notes in Computer Science, vol. 14441, pp. 138–166 (2023).
open access doi -
Cryptanalysis of an Outsourced Modular Inversion Protocol
Math. Cryptol. 3, 1, pp. 29–43 (2023).
open access doi -
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023, 4, pp. 188–210 (2023).
open access doi -
Cryptanalysis of a Generalized Subset-Sum Pseudorandom Generator
In 48th International Symposium on Mathematical Foundations of Computer Science, MFCS 2023, August 28 to September 1, 2023, Bordeaux, France (Jérôme Leroux, Sylvain Lombardy, and David Peleg, eds), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. 272, pp. 23:1–23:15 (2023).
open access doi -
Reciprocal space temperature-dependent phonons method from ab-initio dynamics
Journal of Physics: Condensed Matter 35, 39, pp. 395402 (2023).
open access doi -
VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
In Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023 (Sabrina De Capitani Vimercati, and Pierangela Samarati, eds), SCITEPRESS, pp. 520–527 (2023).
open access doi -
Unifying Freedom and Separation for Tight Probing-Secure Composition
In Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III (Helena Handschuh, and Anna Lysyanskaya, eds), Springer, Lecture Notes in Computer Science, vol. 14083, pp. 440–472 (2023).
open access doi -
Quantum security of subset cover problems
In 4th Conference on Information-Theoretic Cryptography, ITC 2023, June 6-8, 2023, Aarhus, Denmark (Kai-Min Chung, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs), vol. 267, pp. 9:1–9:17 (2023).
open access doi -
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 189–208 (2023).
open access doi -
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 435–454 (2023).
open access doi
2022
-
Les attaques cryptographiques sont-elles toujours meilleures que la force brute ?
Habilitation à diriger des recherches. Sorbonne Université (2022).
open access -
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
open access doi -
On Polynomial Modular Number Systems over Z/pZ
Adv. in Math. of Comm. to appear, (2022).
open access doi -
Practical Seed-Recovery of Fast Cryptographic Pseudo-Random Number Generators
In Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings (Giuseppe Ateniese, and Daniele Venturi, eds), Springer, Lecture Notes in Computer Science, vol. 13269, pp. 212–229 (2022).
open access doi -
Secure storage - Confidentiality and Authentication
Comput. Sci. Rev. 44, pp. 100465 (2022).
open access doi -
IronMask: Versatile Verification of Masking Security
In 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022 IEEE, pp. 142–160 (2022).
open access doi -
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
In Topics in Cryptology - CT-RSA 2022 - Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings (Steven D. Galbraith, ed), Springer, Lecture Notes in Computer Science, vol. 13161, pp. 145–168 (2022).
open access doi -
Cryptanalysis of Modular Exponentiation Outsourcing Protocols
Comput. J. 65, 9, pp. 2299-2314 (2022).
open access doi -
A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over F2
In 5th SIAM symposium on simplicity in algorithms, SOSA 2022, co-located with SODA 2022, virtual, in January 10–11, 2022. Proceedings. pp. 285-296 (2022).
open access doi