|
J.-C. Faugère, R. Odegard, L. Perret, and D. Gligoroski.
Analysis of the MQQ Public Key Cryptosystem.
In Swee-Huay Heng, Rebecca N. Wright, and Bok-Min Goi, editors,
Ninth International Conference on Cryptology And Network Security (CANS
2010), volume 6467 of Subseries: Security and Cryptology, pages 1-14.
Springer-Verlag, December 2010.
[ bib |
]
|
|
M. Albrecht, C. Cid, T. Dulien, J.-C. Faugère, and L. Perret.
Algebraic Precomputations in Differential Cryptanalysis.
In M. Yung and X. Lai, editors, Information Security and
Cryptology: 6th International Conference, Inscrypt 2010, Revised Selected
Papers, volume To appear, pages 1-18. Springer-Verlag, October 2010.
[ bib |
]
|
|
J.-C. Faugère.
FGb: A Library for Computing Gröbner Bases.
In Komei Fukuda, Joris Hoeven, Michael Joswig, and Nobuki Takayama,
editors, Mathematical Software ICMS 2010, volume 6327 of
Lecture Notes in Computer Science, pages 84-87, Berlin, Heidelberg,
September 2010. Springer Berlin / Heidelberg.
[ bib |
|
]
|
|
J.-C. Faugère and S. Lachartre.
Parallel Gaussian Elimination for Gröbner bases computations in
finite fields.
In M. Moreno-Maza and J.L. Roch, editors, Proceedings of the 4th
International Workshop on Parallel and Symbolic Computation, PASCO '10,
pages 89-97, New York, NY, USA, July 2010. ACM.
[ bib |
|
]
|
|
J.-C. Faugère, A Otmani, L. Perret, and J.-P. Tillich.
Algebraic Cryptanalysis of McEliece variants with compact keys -
toward a complexity analysis.
In SCC '10: Proceedings of the 2nd International Conference on
Symbolic Computation and Cryptography, pages 45-55, RHUL, June 2010.
[ bib |
]
|
|
J.-C. Faugère, R. Odegard, L. Perret, and D. Gligoroski.
Analysis of the MQQ Public Key Cryptosystem.
In SCC'10: Proceedings of the 2nd International Conference on
Symbolic Computation and Cryptography, pages 101-116, RHUL, June 2010.
[ bib |
]
|
|
L. Bettale, J.-C. Faugère, and L. Perret.
Hybrid Approach : a Tool for Multivariate Cryptography.
In Tools'10: Proceedings of the Workshop on Tools for
Cryptanalysis 2010, pages 1-2, RHUL, June 2010. Ecrypt II.
[ bib |
]
|
|
M. Albrecht, C. Cid, T. Dulien, J.-C. Faugère, and L. Perret.
Algebraic Precomputations in Differential Cryptanalysis.
In Tools'10: Proceedings of the Workshop on Tools for
Cryptanalysis 2010, pages 1-14, RHUL, June 2010. Ecrypt II.
[ bib |
]
|
|
J.-C. Faugère and L. Perret.
Algebraic Cryptanalysis of Curry and Flurry using Correlated
Messages.
In M. Yung and F. Bao, editors, Information Security and
Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China,
December, 2009, Revised Selected Papers, volume 6151, pages 266-277,
Berlin, Heidelberg, 2010. Springer-Verlag.
[ bib |
]
|
|
J.-C. Faugère, A. Joux, L. Perret, and J. Treger.
Cryptanalysis of the Hidden Matrix Cryptosystem.
In Michel Abdalla and Paulo Barreto, editors, Progress in
Cryptology LATINCRYPT 2010, volume 6212 of Lecture Notes in
Computer Science, pages 241-254. Springer Berlin / Heidelberg, 2010.
[ bib |
|
]
|
|
J.-C. Faugère, R. Marinier, and G. Renault.
Implicit Factoring with Shared Most Significant and Middle Bits.
In SCC '10: Proceedings of the 2nd International Conference on
Symbolic Computation and Cryptography, pages 197-201, RHUL, 2010.
[ bib |
]
|
|
J.-C. Faugère, A Otmani, L. Perret, and J.-P. Tillich.
A Distinguisher for High Rate McEliece Cryptosystem - Extended
Abstract.
In P. Véron, editor, Yet Another Conference on Cryptography,
YACC 2010, pages 1-4, Toulon, 2010.
[ bib |
]
|
|
J.-C. Faugère, A Otmani, L. Perret, and J.-P. Tillich.
Algebraic Cryptanalysis of McEliece variants with compact keys -
toward a complexity analysis.
In P. Véron, editor, Yet Another Conference on Cryptography,
YACC 2010, pages 1-4, Toulon, 2010.
[ bib |
]
|
|
J.-C. Faugère.
Structured Polynomial Systems and Algebraic Cryptanalysis of
McEliece Variants with Compact Keys.
In DSO National Labs, pages 1-1, January 2010.
[ bib ]
|
|
L. Bettale, J.-C. Faugère, and L. Perret.
Security Analysis of Multivariate Polynomials for Hashing.
In Moti Yung, Dongdai Lin, and Peng Liu, editors, Information
Security and Cryptology: 4th International Conference, Inscrypt 2008, Revised
Selected Papers, volume 5487, pages 115-124, Berlin, Heidelberg, December
2009. Springer-Verlag.
[ bib |
|
]
|
|
J.-C. Faugère, L. Perret, and P.-J. Spaenlehauer.
Algebraic-Differential Cryptanalysis of DES.
In Western European Workshop on Research in Cryptology - WEWoRC
2009, pages 1-5, July 2009.
[ bib |
|
]
|
|
J.-C. Faugère.
Efficient algorithms to compute Groebner Bases and applications in
Cryptology.
In Polynomial Computer Algebra'09, pages 1-1, April 2009.
[ bib ]
|
|
J.-C. Faugère.
Interactions between computer algebra (Gröbner bases) and
cryptology.
In ISSAC '09: Proceedings of the 2009 international symposium on
Symbolic and algebraic computation, ISSAC '09, pages 383-384, New York, NY,
USA, 2009. ACM.
[ bib |
|
]
|
|
J.-C. Faugère.
Solving Structured Polynomial Systems and Applications to
Cryptology.
In Vladimir Gerdt, Ernst Mayr, and Evgenii Vorozhtsov, editors,
Computer Algebra in Scientific Computing - CASC'09, volume 5743 of
Lecture Notes in Computer Science, pages 79-80. Springer Berlin /
Heidelberg, 2009.
[ bib |
|
]
|
|
J.-C Faugère.
On the complexity of the Minrank problem.
In Second Workshop on Mathematical Cryptology, pages 2-3,
Santander, Spain, October 2008.
[ bib ]
|
|
J.-C. Faugère and L. Perret.
High order derivatives and decomposition of multivariate
polynomials.
In Second Workshop on Mathematical Cryptology, pages 15-19,
Santander (Spain), October 2008.
[ bib ]
|
|
J.-C. Faugère and L. Perret.
On the Security of UOV.
In First International Conference on Symbolic Computation and
Cryptography, SCC 08, LMIB, pages 103-109, Beijing, China, April 2008.
[ bib |
]
|
|
I. Simonetti, J.-C. Faugère, and L. Perret.
Algebraic Attack Against Trivium.
In First International Conference on Symbolic Computation and
Cryptography, SCC 08, LMIB, pages 95-102, Beijing, China, April 2008.
[ bib |
]
|
|
L. Bettale, J.-C. Faugère, and L Perret.
Cryptanalysis of the TRMS Cryptosystem of PKC'05.
In Serge Vaudenay, editor, AfricaCrypt 2008, volume 5023 of
Lecture Notes in Computer Science, pages 143-155, Casablanca, Morocco,
2008. Springer.
[ bib |
|
]
|
|