Publications HAL du labo/EPI crypt

2015

Journal articles

titre
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256
auteur
Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
article
IET Information Security, Institution of Engineering and Technology, 2015, 9 (3), 〈10.1049/iet-ifs.2013.0380〉
DOI
DOI : 10.1049/iet-ifs.2013.0380
Accès au bibtex
BibTex

Conference papers

titre
A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge
auteur
Dan Ding, Guizhen Zhu, Xiaoyun Wang
article
GECCO 2015, Jul 2015, Madrid, Spain. 2015, Proceedings of the Genetic and Evolutionary Computation Conference. 〈10.1145/2739480.2754639〉
DOI
DOI : 10.1145/2739480.2754639
Accès au bibtex
BibTex
titre
The Hardness of Lattice Problems: Worst-case to Average-case Reductions and Security Estimates
auteur
Phong Q. Nguyen
article
Mathematics of Lattices and Cybersecurity, Apr 2015, Providence, United States
Accès au bibtex
BibTex
titre
Finding Shortest Lattice Vectors in the Presence of Gaps
auteur
Wei Wei, Mingjie Liu, Xiaoyun Wang
article
Kaisa Nyberg. Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. Springer, 9048, pp.239-257, 2015, Lecture Notes in Computer Science. 〈10.1007/978-3-319-16715-2_13〉
DOI
DOI : 10.1007/978-3-319-16715-2_13
Accès au bibtex
BibTex
titre
Improved Attacks on Reduced-Round Camellia-128/192/256
auteur
Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
article
Springer. CT-RSA 2015, Apr 2015, San Francisco, United States. Lecture Notes in Computer Science 9048, Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015. 〈10.1007/978-3-319-16715-2_4〉
DOI
DOI : 10.1007/978-3-319-16715-2_4
Accès au bibtex
BibTex
titre
Simpler Efficient Group Signatures from Lattices
auteur
Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
article
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Mar 2015, Gaithersburg, United States. Springer, 9020, 2015, Lecture Notes in Computer Science. 〈10.1007/978-3-662-46447-2_18〉
DOI
DOI : 10.1007/978-3-662-46447-2_18
Accès au bibtex
BibTex
titre
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
auteur
Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong
article
Fast Software Encryption - 22nd International Workshop, FSE 2015, Mar 2015, Istanbul, Turkey. Springer, Lecture Notes in Computer Science (9054), pp.48-70, Fast Software Encryption - 22nd International Workshop, FSE 2015. 〈10.1007/978-3-662-48116-5_3〉
DOI
DOI : 10.1007/978-3-662-48116-5_3
Accès au bibtex
BibTex

Preprints, Working Papers, ...

titre
Counting Co-Cyclic Lattices
auteur
Phong Q. Nguyen, Igor E. Shparlinski
article
2015
Accès au bibtex
https://arxiv.org/pdf/1505.06429 BibTex

2014

Journal articles

titre
Approximating the densest sublattice from Rankin's inequality
auteur
Jianwei Li, Phong Q. Nguyen
article
LMS Journal of Computation and Mathematics, London Mathematical Society, 2014, Special Issue A (Algorithmic Number Theory Symposium XI), 7 (A), pp.92-111. 〈http://journals.cambridge.org/download.php?file=%2FJCM%2FJCM17_A%2FS1461157014000333a.pdf&code=1406c0f6df3124f0ff41ae708a1ef5e1〉. 〈10.1112/S1461157014000333〉
DOI
DOI : 10.1112/S1461157014000333
Accès au bibtex
BibTex
titre
New transference theorems on lattices possessing $n^ϵ-unique$ shortest vectors
auteur
Wei Wei, Chengliang Tian, Xiaoyun Wang
article
Discrete Mathematics, Elsevier, 2014, 315-316, pp.144-155. 〈10.1016/j.disc.2013.10.020〉
DOI
DOI : 10.1016/j.disc.2013.10.020
Accès au bibtex
BibTex
titre
Cryptanalysis of GOST R hash function
auteur
Zongyue Wang, Hongbo Yu, Xiaoyun Wang
article
Information Processing Letters (IPL), 2014, 114 (2), pp.8. 〈10.1016/j.ipl.2014.07.007〉
DOI
DOI : 10.1016/j.ipl.2014.07.007
Accès au bibtex
BibTex
titre
A note on BDD problems with λ2-gap
auteur
Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng
article
Information Processing Letters, Elsevier, 2014, 114 (1-2), pp.9-12. 〈10.1016/j.ipl.2013.10.004〉
DOI
DOI : 10.1016/j.ipl.2013.10.004
Accès au bibtex
BibTex
titre
Lower bounds of shortest vector lengths in random NTRU lattices
auteur
Jingguo Bi, Qi Cheng
article
Theoretical Computer Science, Elsevier, 2014, 560 (2), pp.121-130. 〈10.1016/j.tcs.2014.10.011〉
DOI
DOI : 10.1016/j.tcs.2014.10.011
Accès au bibtex
BibTex

Conference papers

titre
The Algorithmic Revolution in Geometry of Numbers
auteur
Phong Q. Nguyen
article
The First NTU-VIASM Workshop on Discrete Mathematics, Dec 2014, Hanoi, Vietnam
Accès au bibtex
BibTex
titre
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012
auteur
Yanbin Pan, Yingpu Deng
article
ACISP 2014-19th Australasian Conference on Information Security and Privacy, Jul 2014, Wollongong, Australia. Springer, 8544, 2014, ACISP 2014-19th Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science. 〈10.1007/978-3-319-08344-5_10〉
DOI
DOI : 10.1007/978-3-319-08344-5_10
Accès au bibtex
BibTex
titre
Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
auteur
Gengran Hu, Yanbin Pan, Feng Zhang
article
PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (2014), Mar 2014, Buenos Aires, Argentina. Springer, 2014, PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (2014)
Accès au bibtex
BibTex
titre
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
auteur
Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
article
Hugo Krawczyk. PKC 2014 - 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, Mar 2014, Buenos Aires, Argentina. Springer, 8383, pp.185-202, 2014, Lecture Notes in Computer Science. 〈10.1007/978-3-642-54631-0_11〉
DOI
DOI : 10.1007/978-3-642-54631-0_11
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00926902/file/PKC14_Copp.pdf BibTex
titre
Improved Single-Key Attacks on 9-Round AES-192/256
auteur
Leibo Li, Keting Jia, Xiaoyun Wang
article
FSE 2014 (21st International Workshop on Fast Software Encryption), Mar 2014, Londres, United Kingdom. Springer, 2014
Accès au bibtex
BibTex

Directions of work or proceedings

titre
Advances in Cryptology - EUROCRYPT 2014
auteur
Phong Q. Nguyen, Elisabeth Oswald
article
EUROCRYPT 2014, May 2014, Copenhague, Denmark. 8441, Springer, 2014, Lecture Notes in Computer Science, 〈10.1007/978-3-642-55220-5〉
DOI
DOI : 10.1007/978-3-642-55220-5
Accès au bibtex
BibTex

2013

Journal articles

titre
Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently
auteur
An Wang, Man Chen, Zongyue Wang, Xiaoyun Wang
article
IEEE Transactions on Circuits and Systems Part 2 Analog and Digital Signal Processing, Institute of Electrical and Electronics Engineers (IEEE), 2013, 60 (8), pp.517-521. 〈10.1109/TCSII.2013.2268379〉
DOI
DOI : 10.1109/TCSII.2013.2268379
Accès au bibtex
BibTex
titre
Slide reduction, successive minima and several applications
auteur
Jianwei Li, Wei Wei
article
Bulletin of the Australian Mathematical Society, 2013, 88 (3), pp.17. 〈10.1017/S0004972713000257〉
DOI
DOI : 10.1017/S0004972713000257
Accès au bibtex
BibTex
titre
Tribo-aero-electrostatic separator for coarse granular insulating materials
auteur
Mohamed Miloudi, Lucian Dascalescu, Jia Li, Sofiane El-Mossouess, Karim Medles
article
IEEE Transactions on Dielectrics and Electrical Insulation, Institute of Electrical and Electronics Engineers, 2013, 20, pp.1510 - 1515. 〈10.1109/TDEI.2013.6633677〉
DOI
DOI : 10.1109/TDEI.2013.6633677
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-01104816/file/Paper%203807%20%28Dascalescu%29%2029%20March%202013%2C%20proofread%20by%20author%20%281%29.pdf BibTex

Conference papers

titre
Abstracting Lattice-based Cryptography
auteur
Phong Q. Nguyen
article
Workshop on Algebraic Aspects of Cryptography, Aug 2013, Fukuoka, Japan. 2013
Accès au bibtex
BibTex
titre
Improvements on Reductions among DIfferent Variants SVP and CVP
auteur
Gengran Hu, Yanbin Pan
article
Yongdae Kim and Heejo Lee and Adrian Perrig. WISA 2013 - 14th International Workshop on Information Security Applications, Aug 2013, Jeju Island, South Korea. Springer, 2013, Lecture Notes in Computer Science
Accès au bibtex
BibTex
titre
A Three-Level Sieve Algorithm for the Shortest Vector Problem
auteur
Feng Zhang, Yanbin Pan, Gengran Hu
article
Tanja Lange and Kristin Lauter and Petr Lisonek. SAC 2013 - 20th International Conference on Selected Areas in Cryptography, Aug 2013, Burnaby, Canada. Springer, Lecture Notes in Computer Science, 2013
Accès au bibtex
BibTex
titre
Lattices and Finite Groups: Mathematics, Complexity and Cryptography
auteur
Phong Q. Nguyen
article
Workshop on Number Theory, Geometry and Cryptography, Jul 2013, Warwick, United Kingdom. 2013
Accès au bibtex
BibTex
titre
Improved Boomerang Attacks on SM3
auteur
Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
article
Colin Boyd and Leonie Simpson. ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. Springer, Lecture Notes in Computer Science, 7959, pp.251-266, 2013, ACISP 2013: Information Security and Privacy. 〈10.1007/978-3-642-39059-3_17〉
DOI
DOI : 10.1007/978-3-642-39059-3_17
Accès au bibtex
BibTex
titre
Sub-linear root detection, and new hardness results, for sparse polynomials over finite fields
auteur
Jingguo Bi, Qi Cheng, Maurice Rojas
article
Michael B. Monagan and Gene Cooperman and Mark Giesbrecht. ISSAC '13 - 38th international symposium on International symposium on symbolic and algebraic computation, Jun 2013, Boston, United States. ACM, pp.61-68, 2013, International Symposium on Symbolic and Algebraic Computation, ISSAC'13, Boston, MA, USA, June 26-29, 2013. 〈10.1145/2465506.2465514〉
DOI
DOI : 10.1145/2465506.2465514
Accès au bibtex
BibTex
titre
Solving BDD by Enumeration: An Update
auteur
Mingjie Liu, Phong Q. Nguyen
article
Ed Dawson. CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, Feb 2013, San Francisco, United States. Springer, 7779, pp.293-309, 2013, Lecture Notes in Computer Science. 〈http://link.springer.com/chapter/10.1007%2F978-3-642-36095-4_19〉. 〈10.1007/978-3-642-36095-4_19〉
DOI
DOI : 10.1007/978-3-642-36095-4_19
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00864361/file/LiuNguyen.pdf BibTex

Directions of work or proceedings

titre
Advances in Cryptology -- EUROCRYPT 2013
auteur
Thomas Johansson, Phong Q. Nguyen
article
Thomas Johansson and Phong Q. Nguyen. 7881, Springer, pp.736, 2013, Lecture Notes in Computer Science, 978-3-642-38347-2. 〈10.1007/978-3-642-38348-9〉
DOI
DOI : 10.1007/978-3-642-38348-9
Accès au bibtex
BibTex

2012

Conference papers

titre
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
auteur
Léo Ducas, Phong Q. Nguyen
article
Xiaoyun Wang and Kazue Sako. ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2012, Beijing, China. Springer, 7658, pp.433-450, 2012, Lecture Notes in Computer Science. 〈http://link.springer.com/chapter/10.1007%2F978-3-642-34961-4_27〉. 〈10.1007/978-3-642-34961-4_27〉
DOI
DOI : 10.1007/978-3-642-34961-4_27
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00864359/file/DucasNguyen_Learning.pdf BibTex
titre
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
auteur
Léo Ducas, Phong Q. Nguyen
article
Xiaoyun Wang and Kazue Sako. ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2012, Beijing, China. Springer, 7658, pp.415-432, 2012, Advances in Cryptology - ASIACRYPT 2012. 〈http://link.springer.com/chapter/10.1007%2F978-3-642-34961-4_26〉. 〈10.1007/978-3-642-34961-4_26〉
DOI
DOI : 10.1007/978-3-642-34961-4_26
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00864360/file/DucasNguyen_Sampling.pdf BibTex
titre
The Boomerang Attacks on the Round-Reduced Skein-512
auteur
Hongbo Yu, Jiazhe Chen, Xiaoyun Wang
article
Lars R. Knudsen and Huapeng Wu. SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. Springer, Lecture Notes in Computer Science, 7707, pp.287-303, 2012, SAC 2012: Selected Areas in Cryptography. 〈10.1007/978-3-642-35999-6_19〉
DOI
DOI : 10.1007/978-3-642-35999-6_19
Accès au bibtex
BibTex
titre
Improved Cryptanalysis of the Block Cipher KASUMI
auteur
Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang
article
Lars R. Knudsen and Huapeng Wu. SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. Springer, Lecture Notes in Computer Science, 7707, pp.222-233, 2012, SAC 2012: Selected Areas in Cryptography. 〈10.1007/978-3-642-35999-6_15〉
DOI
DOI : 10.1007/978-3-642-35999-6_15
Accès au bibtex
BibTex
titre
An Algebraic Broadcast Attack against NTRU
auteur
Jintai Ding, Yanbin Pan, Yingpu Deng
article
Willy Susilo and Yi Mu and Jennifer Seberry. ACISP 2012 - 7th Australasian Conference on Information Security and Privacy, Jul 2012, Wollongong, Australia. Springer, Lecture Notes in Computer Science, 7372, pp.124-137, 2012, ACISP 2012: Information Security and Privacy 〈10.1007/978-3-642-31448-3_10〉
DOI
DOI : 10.1007/978-3-642-31448-3_10
Accès au bibtex
BibTex
titre
Cryptanalysis of a homomorphic encryption scheme from ISIT 2008
auteur
Jingguo Bi, Mingjie Liu, Xiaoyun Wang
article
ISIT 2012 - IEEE International Symposium on Information Theory, Jul 2012, Cambridge, United States. IEEE, pp.2152 - 2156, 2012, Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012. 〈10.1109/ISIT.2012.6283832〉
DOI
DOI : 10.1109/ISIT.2012.6283832
Accès au bibtex
BibTex
titre
An efficient broadcast attack against NTRU
auteur
Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
article
Heung Youl Youm and Yoojae Won. ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security, May 2012, Seoul, South Korea. ACM, 2012, 〈10.1145/2414456.2414467〉
DOI
DOI : 10.1145/2414456.2414467
Accès au bibtex
BibTex
titre
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
auteur
Yuanmi Chen, Phong Q. Nguyen
article
David Pointcheval and Thomas Johansson. EUROCRYPT 2012, Apr 2012, Cambridge, United Kingdom. Springer, 7237, pp.502-519, 2012, Lecture Notes in Computer Science. 〈http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_30〉. 〈10.1007/978-3-642-29011-4_30〉
DOI
DOI : 10.1007/978-3-642-29011-4_30
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-00864374/file/ChenNguyen.pdf BibTex
titre
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
auteur
Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li
article
Anne Canteaut. FSE 2012 - 19th International Workshop Fast Software Encryption, Mar 2012, Washington, United States. Springer, Lecture Notes in Computer Science, 7549, pp.90-109, 2012, Fast Software Encryption. 〈10.1007/978-3-642-34047-5_6〉
DOI
DOI : 10.1007/978-3-642-34047-5_6
Accès au bibtex
BibTex

Book sections

titre
Lattice-Based Fault Attacks on Signatures
auteur
Phong Q. Nguyen, Mehdi Tibouchi
article
Marc Joye and Michael Tunstall. Fault Analysis in Cryptography, Springer, pp.201-220, 2012, Information Security and Cryptography, 〈10.1007/978-3-642-29656-7_12〉
DOI
DOI : 10.1007/978-3-642-29656-7_12
Accès au bibtex
BibTex

Directions of work or proceedings

titre
Advances in Cryptology - ASIACRYPT 2012
auteur
Xiaoyun Wang, Kazue Sako
article
Xiaoyun Wang and Kazue Sako. ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2012, Beijing, China. 7658, Springer, pp.1-780, 2012, Lecture Notes in Computer Science, 978-3-642-34960-7. 〈10.1007/978-3-642-34961-4〉
DOI
DOI : 10.1007/978-3-642-34961-4
Accès au bibtex
BibTex