Search the dblp DataBase
Antoine Joux :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman. [Citation Graph (0, 0)][DBLP ] ANTS, 2000, pp:385-394 [Conf ] Antoine Joux The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] ANTS, 2002, pp:20-32 [Conf ] Antoine Joux , Reynald Lercier The Function Field Sieve Is Quite Special. [Citation Graph (0, 0)][DBLP ] ANTS, 2002, pp:431-445 [Conf ] Dan Boneh , Antoine Joux , Phong Q. Nguyen Why Textbook ElGamal and RSA Encryption Are Insecure. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:30-43 [Conf ] Antoine Joux , Jacques Stern Cryptanalysis of Another Knapsack Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:470-476 [Conf ] Florent Chabaud , Antoine Joux Differential Collisions in SHA-0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:56-71 [Conf ] Yeow Meng Chee , Antoine Joux , Jacques Stern The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:204-212 [Conf ] Jean-Charles Faugère , Antoine Joux Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:44-60 [Conf ] Éliane Jaulmes , Antoine Joux A Chosen-Ciphertext Attack against NTRU. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:20-35 [Conf ] Antoine Joux Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:306-316 [Conf ] Antoine Joux , Gwenaëlle Martinet , Frédéric Valette Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:17-30 [Conf ] Louis Granboulan , Antoine Joux , Jacques Stern Inverting HFE Is Quasipolynomial. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:345-356 [Conf ] Antoine Joux , Reynald Lercier , Nigel P. Smart , Frederik Vercauteren The Number Field Sieve in the Medium Prime Case. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:326-344 [Conf ] Eli Biham , Rafi Chen , Antoine Joux , Patrick Carribault , Christophe Lemuet , William Jalby Collisions of SHA-0 and Reduced SHA-1. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:36-57 [Conf ] Philippe Chose , Antoine Joux , Michel Mitton Fast Correlation Attacks: An Algorithmic Point of View. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:209-221 [Conf ] Éliane Jaulmes , Antoine Joux A NICE Cryptanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:382-391 [Conf ] Antoine Joux Cryptanalysis of the EMD Mode of Operation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:1-16 [Conf ] Antoine Joux , Louis Granboulan A Practical Attack against Knapsack based Hash Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:58-66 [Conf ] Antoine Joux , Reynald Lercier The Function Field Sieve in the Medium Prime Case. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:254-270 [Conf ] Antoine Joux , Jacques Stern Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems. [Citation Graph (0, 0)][DBLP ] FCT, 1991, pp:258-264 [Conf ] Henri Gilbert , Helena Handschuh , Antoine Joux , Serge Vaudenay A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:64-74 [Conf ] Éliane Jaulmes , Antoine Joux , Frédéric Valette On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:237-251 [Conf ] Antoine Joux , Frédéric Muller Loosening the KNOT. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:87-99 [Conf ] Antoine Joux , Frédéric Muller Two Attacks Against the HBB Stream Cipher. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:330-341 [Conf ] Antoine Joux , Guillaume Poupard , Jacques Stern New Attacks against Standardized MACs. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:170-181 [Conf ] Antoine Joux , Frédéric Muller Chosen-Ciphertext Attacks Against MOSQUITO. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:390-404 [Conf ] Antoine Joux , Pascal Delaunay Galois LFSR, Embedded Devices and Side Channel Weaknesses. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:436-451 [Conf ] Éliane Jaulmes , Antoine Joux Cryptanalysis of PKP: A New Approach. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:165-172 [Conf ] Antoine Joux , Sébastien Kunz-Jacques , Frédéric Muller , Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:258-274 [Conf ] Antoine Joux , Frédéric Muller A Chosen IV Attack Against Turing. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:194-207 [Conf ] Pierre-Alain Fouque , Antoine Joux , Gwenaëlle Martinet , Frédéric Valette Authenticated On-Line Encryption. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:145-159 [Conf ] Pierre-Alain Fouque , Antoine Joux , Guillaume Poupard Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:212-226 [Conf ] Joel Friedman , Antoine Joux , Yuval Roichman , Jacques Stern , Jean-Pierre Tillich The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography. [Citation Graph (0, 0)][DBLP ] STACS, 1996, pp:375-386 [Conf ] Matthijs J. Coster , Antoine Joux , Brian A. LaMacchia , Andrew M. Odlyzko , Claus-Peter Schnorr , Jacques Stern Improved Low-Density Subset Sum Algorithms. [Citation Graph (0, 0)][DBLP ] Computational Complexity, 1992, v:2, n:, pp:111-128 [Journal ] Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2004, v:17, n:4, pp:263-276 [Journal ] Antoine Joux , Kim Nguyen Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2003, v:16, n:4, pp:239-247 [Journal ] Antoine Joux , Jacques Stern Lattice Reduction: A Toolbox for the Cryptanalyst. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1998, v:11, n:3, pp:161-185 [Journal ] Antoine Joux , Reynald Lercier "Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm. [Citation Graph (0, 0)][DBLP ] Math. Comput., 2001, v:70, n:234, pp:827-836 [Journal ] Antoine Joux , Reynald Lercier Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method. [Citation Graph (0, 0)][DBLP ] Math. Comput., 2003, v:72, n:242, pp:953-967 [Journal ] Joel Friedman , Antoine Joux , Yuval Roichman , Jacques Stern , Jean-Pierre Tillich The action of a few permutations on r-tuples is quickly transitive. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 1998, v:12, n:4, pp:335-350 [Journal ] Antoine Joux , David Naccache , Emmanuel Thomé When e -th Roots Become Easier Than Factoring. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:13-28 [Conf ] Antoine Joux , Thomas Peyrin Hash Functions and the (Amplified) Boomerang Attack. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:244-263 [Conf ] Aurélie Bauer , Antoine Joux Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:361-378 [Conf ] Antoine Joux , Jean-René Reinhard Overtaking VEST. [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:58-72 [Conf ] Pairing the Volcano. [Citation Graph (, )][DBLP ] Improved Generic Algorithms for 3-Collisions. [Citation Graph (, )][DBLP ] Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses. [Citation Graph (, )][DBLP ] Fault Attacks on RSA Signatures with Partially Unknown Messages. [Citation Graph (, )][DBLP ] New Generic Algorithms for Hard Knapsacks. [Citation Graph (, )][DBLP ] Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. [Citation Graph (, )][DBLP ] Another Approach to Pairing Computation in Edwards Coordinates. [Citation Graph (, )][DBLP ] Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers. [Citation Graph (, )][DBLP ] Yet Another Attack on Vest. [Citation Graph (, )][DBLP ] Cryptanalysis of the Hidden Matrix Cryptosystem. [Citation Graph (, )][DBLP ] Search in 0.030secs, Finished in 0.034secs