Pierre-Alain Fouque
Pierre-Alain Fouque
Professor of Computer Science, Rennes University, IRISA, Institut Universitaire de France
Verified email at ens.fr - Homepage
Title
Cited by
Cited by
Year
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
International Workshop on Public Key Cryptography, 65-84, 2005
5842005
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
International Workshop on Public Key Cryptography, 65-84, 2005
5842005
Practical multi-candidate election system
O Baudron, PA Fouque, D Pointcheval, J Stern, G Poupard
Proceedings of the twentieth annual ACM symposium on Principles of …, 2001
3932001
Sharing decryption in the context of voting or lotteries
PA Fouque, G Poupard, J Stern
International Conference on Financial Cryptography, 90-104, 2000
3822000
The Doubling Attack – Why Upwards Is Better than Downwards
PA Fouque, F Valette
International Workshop on Cryptographic Hardware and Embedded Systems, 269-280, 2003
2542003
An improved LPN algorithm
É Levieil, PA Fouque
International conference on security and cryptography for networks, 348-359, 2006
1922006
Practical cryptanalysis of SFLASH
V Dubois, PA Fouque, A Shamir, J Stern
Annual International Cryptology Conference, 1-12, 2007
1792007
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
176*2006
Improved key recovery attacks on reduced-round AES in the single-key setting
P Derbez, PA Fouque, J Jean
Annual International Conference on the Theory and Applications of …, 2013
1612013
Threshold cryptosystems secure against chosen-ciphertext attacks
PA Fouque, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2001
1562001
Strong non-interference and type-directed higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
140*2016
Verified proofs of higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub
Annual International Conference on the Theory and Applications of …, 2015
1222015
Differential cryptanalysis for multivariate schemes
PA Fouque, L Granboulan, J Stern
Annual International Conference on the Theory and Applications of …, 2005
1172005
Fault attack on elliptic curve Montgomery ladder implementation
PA Fouque, R Lercier, D Réal, F Valette
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 92-98, 2008
1162008
An improved BKW algorithm for LWE with applications to cryptography and lattices
P Kirchner, PA Fouque
Annual Cryptology Conference, 43-62, 2015
1122015
Fully distributed threshold RSA under standard assumptions
PA Fouque, J Stern
International Conference on the Theory and Application of Cryptology and …, 2001
992001
Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
PA Fouque, T Vannet
International Workshop on Fast Software Encryption, 502-517, 2013
962013
Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers
T Espitau, PA Fouque, B Gérard, M Tibouchi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
882017
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
882008
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
PA Fouque, G Leurent, PQ Nguyen
Annual International Cryptology Conference, 13-30, 2007
852007
The system can't perform the operation now. Try again later.
Articles 1–20