The SCEAS System
Navigation Menu

Search the dblp DataBase


Pierre-Alain Fouque: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval
    A Simple Threshold Authenticated Key Exchange from Short Secrets. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:566-584 [Conf]
  2. Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard
    The Insecurity of Esign in Practical Implementations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:492-506 [Conf]
  3. Pierre-Alain Fouque, David Pointcheval
    Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:351-368 [Conf]
  4. Pierre-Alain Fouque, Jacques Stern
    Fully Distributed Threshold RSA under Standard Assumptions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:310-330 [Conf]
  5. Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard
    Attacking Unbalanced RSA-CRT Using SPA. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:254-268 [Conf]
  6. Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette
    Defeating Countermeasures Based on Randomized BSD Representations. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:312-327 [Conf]
  7. Pierre-Alain Fouque, Frédéric Valette
    The Doubling Attack - Why Upwards Is Better than Downwards. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:269-280 [Conf]
  8. Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette
    Power Attack on Small RSA Public Exponent. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:339-353 [Conf]
  9. Pierre-Alain Fouque, Louis Granboulan, Jacques Stern
    Differential Cryptanalysis for Multivariate Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:341-353 [Conf]
  10. Pierre-Alain Fouque, Guillaume Poupard
    On the Security of RDSA. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:462-476 [Conf]
  11. Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern
    Sharing Decryption in the Context of Voting or Lotteries. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:90-104 [Conf]
  12. Pierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers
    CryptoComputing with Rationals. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:136-146 [Conf]
  13. Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard
    Practical Symmetric On-Line Encryption. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:362-375 [Conf]
  14. Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer
    Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:240-251 [Conf]
  15. Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
    Password-Based Authenticated Key Exchange in the Three-Party Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:65-84 [Conf]
  16. Pierre-Alain Fouque, Jacques Stern
    One Round Threshold Discrete-Log Key Generation without Private Channels. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:300-316 [Conf]
  17. Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
    The Twist-AUgmented Technique for Key Exchange. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:410-426 [Conf]
  18. Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Guillaume Poupard
    Practical multi-candidate election system. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:274-283 [Conf]
  19. Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette
    Authenticated On-Line Encryption. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:145-159 [Conf]
  20. Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard
    Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:212-226 [Conf]
  21. Éric Levieil, Pierre-Alain Fouque
    An Improved LPN Algorithm. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:348-359 [Conf]
  22. Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
    Practical Cryptanalysis of SFLASH. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:1-12 [Conf]
  23. Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen
    Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:13-30 [Conf]
  24. Vivien Dubois, Pierre-Alain Fouque, Jacques Stern
    Cryptanalysis of SFLASH with Slightly Modified Parameters. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:264-275 [Conf]

  25. On the Security of the CCM Encryption Mode and of a Slight Variant. [Citation Graph (, )][DBLP]

  26. HMAC is a randomness extractor and applications to TLS. [Citation Graph (, )][DBLP]

  27. The Carry Leakage on the Randomized Exponent Countermeasure. [Citation Graph (, )][DBLP]

  28. Practical Electromagnetic Template Attack on HMAC. [Citation Graph (, )][DBLP]

  29. Cryptanalysis of the SFLASH Signature Scheme. [Citation Graph (, )][DBLP]

  30. Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. [Citation Graph (, )][DBLP]

  31. Second Preimage Attacks on Dithered Hash Functions. [Citation Graph (, )][DBLP]

  32. Key Recovery on Hidden Monomial Multivariate Schemes. [Citation Graph (, )][DBLP]

  33. Optimal Randomness Extraction from a Diffie-Hellman Element. [Citation Graph (, )][DBLP]

  34. Fault Attack on Schnorr Based Identification and Signature Schemes. [Citation Graph (, )][DBLP]

  35. Fault Attack onElliptic Curve Montgomery Ladder Implementation. [Citation Graph (, )][DBLP]

  36. Another Look at Complementation Properties. [Citation Graph (, )][DBLP]

  37. Total Break of the l-IC Signature Scheme. [Citation Graph (, )][DBLP]

  38. Cryptanalysis of Tweaked Versions of SMASH and Reparation. [Citation Graph (, )][DBLP]

  39. Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques. [Citation Graph (, )][DBLP]

  40. Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. [Citation Graph (, )][DBLP]

  41. On Some Incompatible Properties of Voting Schemes. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002