2015
Journal articles
- titre
- Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256
- auteur
- Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
- article
- IET Information Security, 2015, 9 (3), ⟨10.1049/iet-ifs.2013.0380⟩
- DOI
- DOI : 10.1049/iet-ifs.2013.0380
- Accès au bibtex
-
Conference papers
- titre
- A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge
- auteur
- Dan Ding, Guizhen Zhu, Xiaoyun Wang
- article
- GECCO 2015, ACM, Jul 2015, Madrid, Spain. ⟨10.1145/2739480.2754639⟩
- DOI
- DOI : 10.1145/2739480.2754639
- Accès au bibtex
-
- titre
- The Hardness of Lattice Problems: Worst-case to Average-case Reductions and Security Estimates
- auteur
- Phong Q. Nguyen
- article
- Mathematics of Lattices and Cybersecurity, Apr 2015, Providence, United States
- Accès au bibtex
-
- titre
- Improved Attacks on Reduced-Round Camellia-128/192/256
- auteur
- Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
- article
- CT-RSA 2015, Apr 2015, San Francisco, United States. ⟨10.1007/978-3-319-16715-2_4⟩
- DOI
- DOI : 10.1007/978-3-319-16715-2_4
- Accès au bibtex
-
- titre
- Finding Shortest Lattice Vectors in the Presence of Gaps
- auteur
- Wei Wei, Mingjie Liu, Xiaoyun Wang
- article
- Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.239-257, ⟨10.1007/978-3-319-16715-2_13⟩
- DOI
- DOI : 10.1007/978-3-319-16715-2_13
- Accès au bibtex
-
- titre
- Simpler Efficient Group Signatures from Lattices
- auteur
- Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
- article
- Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, IACR, Mar 2015, Gaithersburg, United States. ⟨10.1007/978-3-662-46447-2_18⟩
- DOI
- DOI : 10.1007/978-3-662-46447-2_18
- Accès au bibtex
-
- titre
- Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
- auteur
- Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong
- article
- Fast Software Encryption - 22nd International Workshop, FSE 2015, IACR, Mar 2015, Istanbul, Turkey. pp.48-70, ⟨10.1007/978-3-662-48116-5_3⟩
- DOI
- DOI : 10.1007/978-3-662-48116-5_3
- Accès au bibtex
-
Preprints, Working Papers, ...
- titre
- Counting Co-Cyclic Lattices
- auteur
- Phong Q. Nguyen, Igor E. Shparlinski
- article
- 2015
- Accès au bibtex
-
2014
Journal articles
- titre
- Approximating the densest sublattice from Rankin's inequality
- auteur
- Jianwei Li, Phong Q. Nguyen
- article
- LMS Journal of Computation and Mathematics, 2014, Special Issue A (Algorithmic Number Theory Symposium XI), 7 (A), pp.92-111. ⟨10.1112/S1461157014000333⟩
- DOI
- DOI : 10.1112/S1461157014000333
- Accès au bibtex
-
- titre
- New transference theorems on lattices possessing $n^ϵ-unique$ shortest vectors
- auteur
- Wei Wei, Chengliang Tian, Xiaoyun Wang
- article
- Discrete Mathematics, 2014, 315-316, pp.144-155. ⟨10.1016/j.disc.2013.10.020⟩
- DOI
- DOI : 10.1016/j.disc.2013.10.020
- Accès au bibtex
-
- titre
- A note on BDD problems with λ2-gap
- auteur
- Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng
- article
- Information Processing Letters, 2014, 114 (1-2), pp.9-12. ⟨10.1016/j.ipl.2013.10.004⟩
- DOI
- DOI : 10.1016/j.ipl.2013.10.004
- Accès au bibtex
-
- titre
- Cryptanalysis of GOST R hash function
- auteur
- Zongyue Wang, Hongbo Yu, Xiaoyun Wang
- article
- Information Processing Letters, 2014, 114 (2), pp.8. ⟨10.1016/j.ipl.2014.07.007⟩
- DOI
- DOI : 10.1016/j.ipl.2014.07.007
- Accès au bibtex
-
- titre
- Lower bounds of shortest vector lengths in random NTRU lattices
- auteur
- Jingguo Bi, Qi Cheng
- article
- Theoretical Computer Science, 2014, 560 (2), pp.121-130. ⟨10.1016/j.tcs.2014.10.011⟩
- DOI
- DOI : 10.1016/j.tcs.2014.10.011
- Accès au bibtex
-
Conference papers
- titre
- The Algorithmic Revolution in Geometry of Numbers
- auteur
- Phong Q. Nguyen
- article
- The First NTU-VIASM Workshop on Discrete Mathematics, VIASM, Dec 2014, Hanoi, Vietnam
- Accès au bibtex
-
- titre
- A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012
- auteur
- Yanbin Pan, Yingpu Deng
- article
- ACISP 2014-19th Australasian Conference on Information Security and Privacy, Jul 2014, Wollongong, Australia. ⟨10.1007/978-3-319-08344-5_10⟩
- DOI
- DOI : 10.1007/978-3-319-08344-5_10
- Accès au bibtex
-
- titre
- Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
- auteur
- Gengran Hu, Yanbin Pan, Feng Zhang
- article
- PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (2014), IACR, Mar 2014, Buenos Aires, Argentina
- Accès au bibtex
-
- titre
- Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
- auteur
- Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
- article
- PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, Mar 2014, Buenos Aires, Argentina. pp.185-202, ⟨10.1007/978-3-642-54631-0_11⟩
- DOI
- DOI : 10.1007/978-3-642-54631-0_11
- Accès au texte intégral et bibtex
-
- titre
- Improved Single-Key Attacks on 9-Round AES-192/256
- auteur
- Leibo Li, Keting Jia, Xiaoyun Wang
- article
- FSE 2014 (21st International Workshop on Fast Software Encryption), IACR, Mar 2014, Londres, United Kingdom
- Accès au bibtex
-
Proceedings
- titre
- Advances in Cryptology - EUROCRYPT 2014
- auteur
- Phong Q. Nguyen, Elisabeth Oswald
- article
- EUROCRYPT 2014, May 2014, Copenhague, Denmark. 8441, Springer, 2014, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-55220-5⟩
- DOI
- DOI : 10.1007/978-3-642-55220-5
- Accès au bibtex
-
2013
Journal articles
- titre
- Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently
- auteur
- An Wang, Man Chen, Zongyue Wang, Xiaoyun Wang
- article
- IEEE Transactions on Circuits and Systems Part 2 Analog and Digital Signal Processing, 2013, 60 (8), pp.517-521. ⟨10.1109/TCSII.2013.2268379⟩
- DOI
- DOI : 10.1109/TCSII.2013.2268379
- Accès au bibtex
-
- titre
- Slide reduction, successive minima and several applications
- auteur
- Jianwei Li, Wei Wei
- article
- Bulletin of the Australian Mathematical Society, 2013, 88 (3), pp.17. ⟨10.1017/S0004972713000257⟩
- DOI
- DOI : 10.1017/S0004972713000257
- Accès au bibtex
-
Conference papers
- titre
- Abstracting Lattice-based Cryptography
- auteur
- Phong Q. Nguyen
- article
- Workshop on Algebraic Aspects of Cryptography, Aug 2013, Fukuoka, Japan
- Accès au bibtex
-
- titre
- Improvements on Reductions among DIfferent Variants SVP and CVP
- auteur
- Gengran Hu, Yanbin Pan
- article
- WISA 2013 - 14th International Workshop on Information Security Applications, Aug 2013, Jeju Island, South Korea
- Accès au bibtex
-
- titre
- A Three-Level Sieve Algorithm for the Shortest Vector Problem
- auteur
- Feng Zhang, Yanbin Pan, Gengran Hu
- article
- SAC 2013 - 20th International Conference on Selected Areas in Cryptography, Aug 2013, Burnaby, Canada
- Accès au bibtex
-
- titre
- Improved Boomerang Attacks on SM3
- auteur
- Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
- article
- ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. pp.251-266, ⟨10.1007/978-3-642-39059-3_17⟩
- DOI
- DOI : 10.1007/978-3-642-39059-3_17
- Accès au bibtex
-
- titre
- Lattices and Finite Groups: Mathematics, Complexity and Cryptography
- auteur
- Phong Q. Nguyen
- article
- Workshop on Number Theory, Geometry and Cryptography, Jul 2013, Warwick, United Kingdom
- Accès au bibtex
-
- titre
- Sub-linear root detection, and new hardness results, for sparse polynomials over finite fields
- auteur
- Jingguo Bi, Qi Cheng, Maurice Rojas
- article
- ISSAC '13 - 38th international symposium on International symposium on symbolic and algebraic computation, ACM, Jun 2013, Boston, United States. pp.61-68, ⟨10.1145/2465506.2465514⟩
- DOI
- DOI : 10.1145/2465506.2465514
- Accès au bibtex
-
- titre
- Solving BDD by Enumeration: An Update
- auteur
- Mingjie Liu, Phong Q. Nguyen
- article
- CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, Feb 2013, San Francisco, United States. pp.293-309, ⟨10.1007/978-3-642-36095-4_19⟩
- DOI
- DOI : 10.1007/978-3-642-36095-4_19
- Accès au texte intégral et bibtex
-
Books
- titre
- Advances in Cryptology -- EUROCRYPT 2013
- auteur
- Thomas Johansson, Phong Q. Nguyen
- article
- Thomas Johansson and Phong Q. Nguyen. Springer, 7881, pp.736, 2013, Lecture Notes in Computer Science, 978-3-642-38347-2. ⟨10.1007/978-3-642-38348-9⟩
- DOI
- DOI : 10.1007/978-3-642-38348-9
- Accès au bibtex
-
2012
Conference papers
- titre
- Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
- auteur
- Léo Ducas, Phong Q. Nguyen
- article
- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, IACR, Dec 2012, Beijing, China. pp.433-450, ⟨10.1007/978-3-642-34961-4_27⟩
- DOI
- DOI : 10.1007/978-3-642-34961-4_27
- Accès au texte intégral et bibtex
-
- titre
- Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
- auteur
- Léo Ducas, Phong Q. Nguyen
- article
- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, IACR, Dec 2012, Beijing, China. pp.415-432, ⟨10.1007/978-3-642-34961-4_26⟩
- DOI
- DOI : 10.1007/978-3-642-34961-4_26
- Accès au texte intégral et bibtex
-
- titre
- The Boomerang Attacks on the Round-Reduced Skein-512
- auteur
- Hongbo Yu, Jiazhe Chen, Xiaoyun Wang
- article
- SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.287-303, ⟨10.1007/978-3-642-35999-6_19⟩
- DOI
- DOI : 10.1007/978-3-642-35999-6_19
- Accès au bibtex
-
- titre
- Improved Cryptanalysis of the Block Cipher KASUMI
- auteur
- Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang
- article
- SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.222-233, ⟨10.1007/978-3-642-35999-6_15⟩
- DOI
- DOI : 10.1007/978-3-642-35999-6_15
- Accès au bibtex
-
- titre
- An Algebraic Broadcast Attack against NTRU
- auteur
- Jintai Ding, Yanbin Pan, Yingpu Deng
- article
- ACISP 2012 - 7th Australasian Conference on Information Security and Privacy, Jul 2012, Wollongong, Australia. pp.124-137, ⟨10.1007/978-3-642-31448-3_10⟩
- DOI
- DOI : 10.1007/978-3-642-31448-3_10
- Accès au bibtex
-
- titre
- Cryptanalysis of a homomorphic encryption scheme from ISIT 2008
- auteur
- Jingguo Bi, Mingjie Liu, Xiaoyun Wang
- article
- ISIT 2012 - IEEE International Symposium on Information Theory, IEEE, Jul 2012, Cambridge, United States. pp.2152 - 2156, ⟨10.1109/ISIT.2012.6283832⟩
- DOI
- DOI : 10.1109/ISIT.2012.6283832
- Accès au bibtex
-
- titre
- An efficient broadcast attack against NTRU
- auteur
- Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
- article
- ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security, ACM, May 2012, Seoul, South Korea. ⟨10.1145/2414456.2414467⟩
- DOI
- DOI : 10.1145/2414456.2414467
- Accès au bibtex
-
- titre
- Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
- auteur
- Yuanmi Chen, Phong Q. Nguyen
- article
- EUROCRYPT 2012, IACR, Apr 2012, Cambridge, United Kingdom. pp.502-519, ⟨10.1007/978-3-642-29011-4_30⟩
- DOI
- DOI : 10.1007/978-3-642-29011-4_30
- Accès au texte intégral et bibtex
-
- titre
- New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
- auteur
- Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li
- article
- FSE 2012 - 19th International Workshop Fast Software Encryption, IACR, Mar 2012, Washington, United States. pp.90-109, ⟨10.1007/978-3-642-34047-5_6⟩
- DOI
- DOI : 10.1007/978-3-642-34047-5_6
- Accès au bibtex
-
Book sections
- titre
- Lattice-Based Fault Attacks on Signatures
- auteur
- Phong Q. Nguyen, Mehdi Tibouchi
- article
- Marc Joye and Michael Tunstall. Fault Analysis in Cryptography, Springer, pp.201-220, 2012, Information Security and Cryptography, ⟨10.1007/978-3-642-29656-7_12⟩
- DOI
- DOI : 10.1007/978-3-642-29656-7_12
- Accès au bibtex
-
Proceedings
- titre
- Advances in Cryptology - ASIACRYPT 2012
- auteur
- Xiaoyun Wang, Kazue Sako
- article
- Xiaoyun Wang and Kazue Sako. ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2012, Beijing, China. 7658, Springer, pp.1-780, 2012, Lecture Notes in Computer Science, 978-3-642-34960-7. ⟨10.1007/978-3-642-34961-4⟩
- DOI
- DOI : 10.1007/978-3-642-34961-4
- Accès au bibtex
-