Cryptographers' World
 

Antoine Joux


Author's Web Page Link

39 papers and 1 book in database with 2283 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 18

Books

 
1. Antoine JouxAlgorithmic Cryptanalysis. Chapman & Hall / CRC, 2009. ISBN 978-1-420-07002-6.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[No citation]


Conference Proceedings

 
1. Antoine Joux, editor, Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. Springer, 2009. ISBN 978-3-642-01000-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Antoine Joux,  A One Round Protocol for Tripartite Diffie-Hellman, Journal of Cryptology, Volume 17(4), pp. 263 - 276, Springer, 2004.

[Cited 524 times Red StarRed StarRed StarRed Star]

2. Antoine Joux,  Kim Nguyen,  Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups, Journal of Cryptology, Volume 16(4), pp. 239 - 247, Springer, 2003.

[Cited 186 times Red StarRed Star]

3. Antoine Joux,  Jacques Stern,  Lattice Reduction: A Toolbox for the Cryptanalyst, Journal of Cryptology, Volume 11(3), pp. 161 - 185, Springer, 1998.

[Cited 86 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Antoine Joux,  Stefan Lucks,  Improved Generic Algorithms for 3-Collisions, pp. 347 - 363, ASIACRYPT 2009.

[Electronic Edition][Cited 6 times ]

2. Guilhem Castagnos,  Antoine Joux,  Fabien Laguillaumie,  Phong Q. Nguyen,  Factoring pq^2 with Quadratic Forms: Nice Cryptanalyses, pp. 469 - 486, ASIACRYPT 2009.

[Electronic Edition][Cited 1 times ]

3. Sorina Ionica,  Antoine Joux,  Another Approach to Pairing Computation in Edwards Coordinates, pp. 400 - 413, INDOCRYPT 2008.

[Electronic Edition][Cited 18 times ]

4. Pascal Delaunay,  Antoine Joux,  Yet Another Attack on Vest, pp. 221 - 235, AFRICACRYPT 2008.

[Electronic Edition][No citation]

5. Antoine Joux,  Jean-René Reinhard,  Overtaking VEST, pp. 58 - 72, FSE 2007.

[Electronic Edition][Cited 4 times ]

6. Antoine Joux,  David Naccache,  Emmanuel Thomé,  When e-th Roots Become Easier Than Factoring, pp. 13 - 28, ASIACRYPT 2007.

[Electronic Edition][Cited 13 times ]

7. Antoine Joux,  Thomas Peyrin,  Hash Functions and the (Amplified) Boomerang Attack, pp. 244 - 263, CRYPTO 2007.

[Electronic Edition][Cited 35 times ]

8. Aurélie Bauer,  Antoine Joux,  Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables, pp. 361 - 378, EUROCRYPT 2007.

[Electronic Edition][Cited 11 times ]

9. Antoine Joux,  Pascal Delaunay,  Galois LFSR, Embedded Devices and Side Channel Weaknesses, pp. 436 - 451, INDOCRYPT 2006.

[Electronic Edition][Cited 6 times ]

10. Antoine Joux,  Reynald Lercier,  The Function Field Sieve in the Medium Prime Case, pp. 254 - 270, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

11. Antoine Joux,  Frédéric Muller,  Chosen-Ciphertext Attacks Against MOSQUITO, pp. 390 - 404, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

12. Antoine Joux,  Reynald Lercier,  Nigel P. Smart,  Frederik Vercauteren,  The Number Field Sieve in the Medium Prime Case, pp. 326 - 344, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

13. Louis Granboulan,  Antoine Joux,  Jacques Stern,  Inverting HFE Is Quasipolynomial, pp. 345 - 356, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

14. Eli Biham,  Rafi Chen,  Antoine Joux,  Patrick Carribault,  Christophe Lemuet,  William Jalby,  Collisions of SHA-0 and Reduced SHA-1, pp. 36 - 57, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 184 times Red StarRed Star]

15. Antoine Joux,  Frédéric Muller,  Two Attacks Against the HBB Stream Cipher, pp. 330 - 341, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

16. Antoine Joux,  Sébastien Kunz-Jacques,  Frédéric Muller,  Pierre-Michel Ricordel,  Cryptanalysis of the Tractable Rational Map Cryptosystem, pp. 258 - 274, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 12 times ]

17. Antoine Joux,  Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, pp. 306 - 316, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 263 times Red StarRed StarRed Star]

18. Pierre-Alain Fouque,  Antoine Joux,  Guillaume Poupard,  Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes, pp. 212 - 226, SAC 2004.

[Electronic Edition][Cited 11 times ]

19. Jean-Charles Faugère,  Antoine Joux,  Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases, pp. 44 - 60, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 207 times Red StarRed Star]

20. Antoine Joux,  Frédéric Muller,  A Chosen IV Attack Against Turing, pp. 194 - 207, SAC 2003.

[Electronic Edition][Cited 10 times ]

21. Pierre-Alain Fouque,  Antoine Joux,  Gwenaëlle Martinet,  Frédéric Valette,  Authenticated On-Line Encryption, pp. 145 - 159, SAC 2003.

[Electronic Edition][Cited 9 times ]

22. Antoine Joux,  Cryptanalysis of the EMD Mode of Operation, pp. 1 - 16, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

23. Antoine Joux,  Frédéric Muller,  Loosening the KNOT, pp. 87 - 99, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

24. Antoine Joux,  Guillaume Poupard,  Jacques Stern,  New Attacks against Standardized MACs, pp. 170 - 181, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

25. Antoine Joux,  Gwenaëlle Martinet,  Frédéric Valette,  Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC, pp. 17 - 30, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

26. Philippe Chose,  Antoine Joux,  Michel Mitton,  Fast Correlation Attacks: An Algorithmic Point of View, pp. 209 - 221, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 92 times Red Star]

27. Ã‰liane Jaulmes,  Antoine Joux,  Frédéric Valette,  On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction, pp. 237 - 251, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 56 times Red Star]

28. Ã‰liane Jaulmes,  Antoine Joux,  Cryptanalysis of PKP: A New Approach, pp. 165 - 172, PKC 2001.

[Electronic Edition][Cited 3 times ]

29. Dan Boneh,  Antoine Joux,  Phong Q. Nguyen,  Why Textbook ElGamal and RSA Encryption Are Insecure, pp. 30 - 43, ASIACRYPT 2000.

[Electronic Edition][Cited 63 times Red Star]

30. Ã‰liane Jaulmes,  Antoine Joux,  A Chosen-Ciphertext Attack against NTRU, pp. 20 - 35, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

31. Ã‰liane Jaulmes,  Antoine Joux,  A NICE Cryptanalysis, pp. 382 - 391, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

32. Henri Gilbert,  Helena Handschuh,  Antoine Joux,  Serge Vaudenay,  A Statistical Attack on RC6, pp. 64 - 74, FSE 2000.

[Electronic Edition][Cited 30 times ]

33. Florent Chabaud,  Antoine Joux,  Differential Collisions in SHA-0, pp. 56 - 71, CRYPTO 1998.

[Electronic Edition][Cited 212 times Red StarRed Star]

34. Antoine Joux,  Louis Granboulan,  A Practical Attack against Knapsack based Hash Functions (Extended Abstract), pp. 58 - 66, EUROCRYPT 1994.

[Electronic Edition][Cited 16 times ]

35. Antoine Joux,  Jacques Stern,  Cryptanalysis of Another Knapsack Cryptosystem, pp. 470 - 476, ASIACRYPT 1991.

[Electronic Edition][Cited 13 times ]

36. Yeow Meng Chee,  Antoine Joux,  Jacques Stern,  The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks, pp. 204 - 212, CRYPTO 1991.

[Electronic Edition][Cited 13 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...