dblp.uni-trier.dewww.uni-trier.de

Antoine Joux Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
48EEAntoine Joux: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings Springer 2009
47EEJean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier: Fault Attacks on RSA Signatures with Partially Unknown Messages. CHES 2009: 444-456
2008
46EEPascal Delaunay, Antoine Joux: Yet Another Attack on Vest. AFRICACRYPT 2008: 221-235
45EESorina Ionica, Antoine Joux: Another Approach to Pairing Computation in Edwards Coordinates. INDOCRYPT 2008: 400-413
2007
44EEAntoine Joux, David Naccache, Emmanuel Thomé: When e-th Roots Become Easier Than Factoring. ASIACRYPT 2007: 13-28
43EEAntoine Joux, Thomas Peyrin: Hash Functions and the (Amplified) Boomerang Attack. CRYPTO 2007: 244-263
42EEAurélie Bauer, Antoine Joux: Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. EUROCRYPT 2007: 361-378
41EEAntoine Joux, Jean-René Reinhard: Overtaking VEST. FSE 2007: 58-72
2006
40EEAntoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren: The Number Field Sieve in the Medium Prime Case. CRYPTO 2006: 326-344
39EELouis Granboulan, Antoine Joux, Jacques Stern: Inverting HFE Is Quasipolynomial. CRYPTO 2006: 345-356
38EEAntoine Joux, Reynald Lercier: The Function Field Sieve in the Medium Prime Case. EUROCRYPT 2006: 254-270
37EEAntoine Joux, Frédéric Muller: Chosen-Ciphertext Attacks Against MOSQUITO. FSE 2006: 390-404
36EEAntoine Joux, Pascal Delaunay: Galois LFSR, Embedded Devices and Side Channel Weaknesses. INDOCRYPT 2006: 436-451
2005
35EEEli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby: Collisions of SHA-0 and Reduced SHA-1. EUROCRYPT 2005: 36-57
34EEAntoine Joux, Frédéric Muller: Two Attacks Against the HBB Stream Cipher. FSE 2005: 330-341
33EEAntoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel: Cryptanalysis of the Tractable Rational Map Cryptosystem. Public Key Cryptography 2005: 258-274
2004
32EEAntoine Joux: Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. CRYPTO 2004: 306-316
31EEPierre-Alain Fouque, Antoine Joux, Guillaume Poupard: Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Selected Areas in Cryptography 2004: 212-226
30EEAntoine Joux: A One Round Protocol for Tripartite Diffie-Hellman. J. Cryptology 17(4): 263-276 (2004)
2003
29EEJean-Charles Faugère, Antoine Joux: Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. CRYPTO 2003: 44-60
28EEAntoine Joux: Cryptanalysis of the EMD Mode of Operation. EUROCRYPT 2003: 1-16
27EEAntoine Joux, Guillaume Poupard, Jacques Stern: New Attacks against Standardized MACs. FSE 2003: 170-181
26EEAntoine Joux, Frédéric Muller: Loosening the KNOT. FSE 2003: 87-99
25EEPierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette: Authenticated On-Line Encryption. Selected Areas in Cryptography 2003: 145-159
24EEAntoine Joux, Frédéric Muller: A Chosen IV Attack Against Turing. Selected Areas in Cryptography 2003: 194-207
23EEAntoine Joux, Kim Nguyen: Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. J. Cryptology 16(4): 239-247 (2003)
22 Antoine Joux, Reynald Lercier: Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method. Math. Comput. 72(242): 953-967 (2003)
2002
21EEAntoine Joux: The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems. ANTS 2002: 20-32
20EEAntoine Joux, Reynald Lercier: The Function Field Sieve Is Quite Special. ANTS 2002: 431-445
19EEAntoine Joux, Gwenaëlle Martinet, Frédéric Valette: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. CRYPTO 2002: 17-30
18EEPhilippe Chose, Antoine Joux, Michel Mitton: Fast Correlation Attacks: An Algorithmic Point of View. EUROCRYPT 2002: 209-221
17EEÉliane Jaulmes, Antoine Joux, Frédéric Valette: On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. FSE 2002: 237-251
2001
16EEÉliane Jaulmes, Antoine Joux: Cryptanalysis of PKP: A New Approach. Public Key Cryptography 2001: 165-172
15 Antoine Joux, Reynald Lercier: "Chinese & Match", an alternative to Atkin's "Match and Sort" method used in the SEA algorithm. Math. Comput. 70(234): 827-836 (2001)
2000
14 Antoine Joux: A One Round Protocol for Tripartite Diffie-Hellman. ANTS 2000: 385-394
13EEDan Boneh, Antoine Joux, Phong Q. Nguyen: Why Textbook ElGamal and RSA Encryption Are Insecure. ASIACRYPT 2000: 30-43
12EEÉliane Jaulmes, Antoine Joux: A Chosen-Ciphertext Attack against NTRU. CRYPTO 2000: 20-35
11EEÉliane Jaulmes, Antoine Joux: A NICE Cryptanalysis. EUROCRYPT 2000: 382-391
10EEHenri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay: A Statistical Attack on RC6. FSE 2000: 64-74
1998
9EEFlorent Chabaud, Antoine Joux: Differential Collisions in SHA-0. CRYPTO 1998: 56-71
8EEAntoine Joux, Jacques Stern: Lattice Reduction: A Toolbox for the Cryptanalyst. J. Cryptology 11(3): 161-185 (1998)
7 Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich: The action of a few permutations on r-tuples is quickly transitive. Random Struct. Algorithms 12(4): 335-350 (1998)
1996
6EEJoel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich: The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography. STACS 1996: 375-386
1994
5EEAntoine Joux, Louis Granboulan: A Practical Attack against Knapsack based Hash Functions (Extended Abstract). EUROCRYPT 1994: 58-66
1992
4 Matthijs J. Coster, Antoine Joux, Brian A. LaMacchia, Andrew M. Odlyzko, Claus-Peter Schnorr, Jacques Stern: Improved Low-Density Subset Sum Algorithms. Computational Complexity 2: 111-128 (1992)
1991
3EEAntoine Joux, Jacques Stern: Cryptanalysis of Another Knapsack Cryptosystem. ASIACRYPT 1991: 470-476
2EEYeow Meng Chee, Antoine Joux, Jacques Stern: The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. CRYPTO 1991: 204-212
1 Antoine Joux, Jacques Stern: Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems. FCT 1991: 258-264

Coauthor Index

1Aurélie Bauer [42]
2Eli Biham [35]
3Dan Boneh [13]
4Patrick Carribault [35]
5Florent Chabaud [9]
6Yeow Meng Chee [2]
7Rafi Chen [35]
8Philippe Chose [18]
9Jean-Sébastien Coron [47]
10Matthijs J. Coster [4]
11Pascal Delaunay [36] [46]
12Jean-Charles Faugère [29]
13Pierre-Alain Fouque [25] [31]
14Joel Friedman [6] [7]
15Henri Gilbert [10]
16Louis Granboulan [5] [39]
17Helena Handschuh [10]
18Sorina Ionica [45]
19William Jalby [35]
20Éliane Jaulmes [11] [12] [16] [17]
21Ilya Kizhvatov [47]
22Sébastien Kunz-Jacques [33]
23Brian A. LaMacchia [4]
24Christophe Lemuet [35]
25Reynald Lercier [15] [20] [22] [38] [40]
26Gwenaëlle Martinet [19] [25]
27Michel Mitton [18]
28Frédéric Muller [24] [26] [33] [34] [37]
29David Naccache [44] [47]
30Kim Nguyen [23]
31Phong Q. Nguyen [13]
32Andrew M. Odlyzko [4]
33Pascal Paillier [47]
34Thomas Peyrin [43]
35Guillaume Poupard [27] [31]
36Jean-René Reinhard [41]
37Pierre-Michel Ricordel [33]
38Yuval Roichman [6] [7]
39Claus-Peter Schnorr [4]
40Nigel P. Smart [40]
41Jacques Stern [1] [2] [3] [4] [6] [7] [8] [27] [39]
42Emmanuel Thomé [44]
43Jean-Pierre Tillich [6] [7]
44Frédéric Valette [17] [19] [25]
45Serge Vaudenay [10]
46Frederik Vercauteren [40]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)