|
Search the dblp DataBase
Pierre-Alain Fouque:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval
A Simple Threshold Authenticated Key Exchange from Short Secrets. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:566-584 [Conf]
- Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard
The Insecurity of Esign in Practical Implementations. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2003, pp:492-506 [Conf]
- Pierre-Alain Fouque, David Pointcheval
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:351-368 [Conf]
- Pierre-Alain Fouque, Jacques Stern
Fully Distributed Threshold RSA under Standard Assumptions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:310-330 [Conf]
- Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard
Attacking Unbalanced RSA-CRT Using SPA. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:254-268 [Conf]
- Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette
Defeating Countermeasures Based on Randomized BSD Representations. [Citation Graph (0, 0)][DBLP] CHES, 2004, pp:312-327 [Conf]
- Pierre-Alain Fouque, Frédéric Valette
The Doubling Attack - Why Upwards Is Better than Downwards. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:269-280 [Conf]
- Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette
Power Attack on Small RSA Public Exponent. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:339-353 [Conf]
- Pierre-Alain Fouque, Louis Granboulan, Jacques Stern
Differential Cryptanalysis for Multivariate Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:341-353 [Conf]
- Pierre-Alain Fouque, Guillaume Poupard
On the Security of RDSA. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:462-476 [Conf]
- Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern
Sharing Decryption in the Context of Voting or Lotteries. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2000, pp:90-104 [Conf]
- Pierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers
CryptoComputing with Rationals. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:136-146 [Conf]
- Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard
Practical Symmetric On-Line Encryption. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:362-375 [Conf]
- Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:240-251 [Conf]
- Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:65-84 [Conf]
- Pierre-Alain Fouque, Jacques Stern
One Round Threshold Discrete-Log Key Generation without Private Channels. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:300-316 [Conf]
- Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
The Twist-AUgmented Technique for Key Exchange. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:410-426 [Conf]
- Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Guillaume Poupard
Practical multi-candidate election system. [Citation Graph (0, 0)][DBLP] PODC, 2001, pp:274-283 [Conf]
- Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette
Authenticated On-Line Encryption. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:145-159 [Conf]
- Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:212-226 [Conf]
- Éric Levieil, Pierre-Alain Fouque
An Improved LPN Algorithm. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:348-359 [Conf]
- Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
Practical Cryptanalysis of SFLASH. [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:1-12 [Conf]
- Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:13-30 [Conf]
- Vivien Dubois, Pierre-Alain Fouque, Jacques Stern
Cryptanalysis of SFLASH with Slightly Modified Parameters. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:264-275 [Conf]
On the Security of the CCM Encryption Mode and of a Slight Variant. [Citation Graph (, )][DBLP]
HMAC is a randomness extractor and applications to TLS. [Citation Graph (, )][DBLP]
The Carry Leakage on the Randomized Exponent Countermeasure. [Citation Graph (, )][DBLP]
Practical Electromagnetic Template Attack on HMAC. [Citation Graph (, )][DBLP]
Cryptanalysis of the SFLASH Signature Scheme. [Citation Graph (, )][DBLP]
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. [Citation Graph (, )][DBLP]
Second Preimage Attacks on Dithered Hash Functions. [Citation Graph (, )][DBLP]
Key Recovery on Hidden Monomial Multivariate Schemes. [Citation Graph (, )][DBLP]
Optimal Randomness Extraction from a Diffie-Hellman Element. [Citation Graph (, )][DBLP]
Fault Attack on Schnorr Based Identification and Signature Schemes. [Citation Graph (, )][DBLP]
Fault Attack onElliptic Curve Montgomery Ladder Implementation. [Citation Graph (, )][DBLP]
Another Look at Complementation Properties. [Citation Graph (, )][DBLP]
Total Break of the l-IC Signature Scheme. [Citation Graph (, )][DBLP]
Cryptanalysis of Tweaked Versions of SMASH and Reparation. [Citation Graph (, )][DBLP]
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques. [Citation Graph (, )][DBLP]
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. [Citation Graph (, )][DBLP]
On Some Incompatible Properties of Voting Schemes. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|