Cryptographers' World
 

Pierre-Alain Fouque


Author's Web Page Link

28 papers in database with 961 citations StarStar

Editor of 1 conference proceedings book

H-number: 16

Conference Proceedings

 
1. Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud, editors, Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. Springer, 2009. ISBN 978-3-642-01956-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. C√©line Chevalier,  Pierre-Alain Fouque,  David Pointcheval,  S√©bastien Zimmer,  Optimal Randomness Extraction from a Diffie-Hellman Element, pp. 572 - 589, EUROCRYPT 2009.

[Electronic Edition][Cited 2 times ]

2. Pierre-Alain Fouque,  Denis R√©al,  Fr√©d√©ric Valette,  M'hamed Drissi,  The Carry Leakage on the Randomized Exponent Countermeasure, pp. 198 - 213, CHES 2008.

[Electronic Edition][Cited 4 times ]

3. Pierre-Alain Fouque,  Gwena√ęlle Martinet,  Fr√©d√©ric Valette,  S√©bastien Zimmer,  On the Security of the CCM Encryption Mode and of a Slight Variant, pp. 411 - 428, ACNS 2008.

[Electronic Edition][Cited 3 times ]

4. Elena Andreeva,  Charles Bouillaguet,  Pierre-Alain Fouque,  Jonathan J. Hoch,  John Kelsey,  Adi Shamir,  S√©bastien Zimmer,  Second Preimage Attacks on Dithered Hash Functions, pp. 270 - 288, EUROCRYPT 2008.

[Electronic Edition][Cited 33 times ]

5. Pierre-Alain Fouque,  Gilles Macario-Rat,  Jacques Stern,  Key Recovery on Hidden Monomial Multivariate Schemes, pp. 19 - 30, EUROCRYPT 2008.

[Electronic Edition][Cited 16 times ]

6. Pierre-Alain Fouque,  Ga√ętan Leurent,  Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes, pp. 19 - 35, CT-RSA 2008.

[Electronic Edition][Cited 3 times ]

7. Pierre-Alain Fouque,  Gilles Macario-Rat,  Ludovic Perret,  Jacques Stern,  Total Break of the l-IC Signature Scheme , pp. 1 - 17, PKC 2008.

[Electronic Edition][Cited 8 times ]

8. Pierre-Alain Fouque,  Ga√ętan Leurent,  Phong Q. Nguyen,  Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, pp. 13 - 30, CRYPTO 2007.

[Electronic Edition][Cited 31 times ]

9. Vivien Dubois,  Pierre-Alain Fouque,  Adi Shamir,  Jacques Stern,  Practical Cryptanalysis of SFLASH, pp. 1 - 12, CRYPTO 2007.

[Electronic Edition][Cited 47 times ]

10. Vivien Dubois,  Pierre-Alain Fouque,  Jacques Stern,  Cryptanalysis of SFLASH with Slightly Modified Parameters, pp. 264 - 275, EUROCRYPT 2007.

[Electronic Edition][Cited 28 times ]

11. Olivier Chevassut,  Pierre-Alain Fouque,  Pierrick Gaudry,  David Pointcheval,  The Twist-AUgmented Technique for Key Exchange, pp. 410 - 426, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

12. Pierre-Alain Fouque,  S√©bastien Kunz-Jacques,  Gwena√ęlle Martinet,  Fr√©d√©ric Muller,  Fr√©d√©ric Valette,  Power Attack on Small RSA Public Exponent, pp. 339 - 353, CHES 2006.

[Electronic Edition][Cited 15 times ]

13. Michel Abdalla,  Olivier Chevassut,  Pierre-Alain Fouque,  David Pointcheval,  A Simple Threshold Authenticated Key Exchange from Short Secrets, pp. 566 - 584, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

14. Pierre-Alain Fouque,  Louis Granboulan,  Jacques Stern,  Differential Cryptanalysis for Multivariate Schemes, pp. 341 - 353, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 55 times Red Star]

15. Michel Abdalla,  Pierre-Alain Fouque,  David Pointcheval,  Password-Based Authenticated Key Exchange in the Three-Party Setting, pp. 65 - 84, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 147 times Red StarRed Star]

16. Pierre-Alain Fouque,  Fr√©d√©ric Muller,  Guillaume Poupard,  Fr√©d√©ric Valette,  Defeating Countermeasures Based on Randomized BSD Representations, pp. 312 - 327, CHES 2004.

[Electronic Edition][Cited 24 times ]

17. Pierre-Alain Fouque,  Antoine Joux,  Guillaume Poupard,  Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes, pp. 212 - 226, SAC 2004.

[Electronic Edition][Cited 11 times ]

18. Pierre-Alain Fouque,  Nick Howgrave-Graham,  Gwena√ęlle Martinet,  Guillaume Poupard,  The Insecurity of Esign in Practical Implementations, pp. 492 - 506, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2 times ]

19. Pierre-Alain Fouque,  Gwena√ęlle Martinet,  Guillaume Poupard,  Attacking Unbalanced RSA-CRT Using SPA, pp. 254 - 268, CHES 2003.

[Electronic Edition][Cited 10 times ]

20. Pierre-Alain Fouque,  Fr√©d√©ric Valette,  The Doubling Attack - , pp. 269 - 280, CHES 2003.

[Electronic Edition][Cited 77 times Red Star]

21. Pierre-Alain Fouque,  Antoine Joux,  Gwena√ęlle Martinet,  Fr√©d√©ric Valette,  Authenticated On-Line Encryption, pp. 145 - 159, SAC 2003.

[Electronic Edition][Cited 9 times ]

22. Pierre-Alain Fouque,  Guillaume Poupard,  On the Security of RDSA, pp. 462 - 476, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

23. Pierre-Alain Fouque,  Gwena√ęlle Martinet,  Guillaume Poupard,  Practical Symmetric On-Line Encryption, pp. 362 - 375, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

24. Pierre-Alain Fouque,  Jacques Stern,  Jan-Geert Wackers,  CryptoComputing with Rationals, pp. 136 - 146, FC 2002.

[Electronic Edition][Cited 18 times ]

25. Pierre-Alain Fouque,  David Pointcheval,  Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks, pp. 351 - 368, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 78 times Red Star]

26. Pierre-Alain Fouque,  Jacques Stern,  Fully Distributed Threshold RSA under Standard Assumptions, pp. 310 - 330, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 61 times Red Star]

27. Pierre-Alain Fouque,  Jacques Stern,  One Round Threshold Discrete-Log Key Generation without Private Channels, pp. 300 - 316, PKC 2001.

[Electronic Edition][Cited 27 times ]

28. Pierre-Alain Fouque,  Guillaume Poupard,  Jacques Stern,  Sharing Decryption in the Context of Voting or Lotteries, pp. 90 - 104, FC 2000.

[Electronic Edition][Cited 178 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...