BibTeX records: Charles Bouillaguet

download as .bib file

@article{DBLP:journals/iacr/BouillaguetS24,
  author       = {Charles Bouillaguet and
                  Julia Sauvage},
  title        = {Preliminary Cryptanalysis of the Biscuit Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/148},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BouillaguetFFK23,
  author       = {Charles Bouillaguet and
                  Ambroise Fleury and
                  Pierre{-}Alain Fouque and
                  Paul Kirchner},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {We are on the Same Side. Alternative Sieving Strategies for the Number
                  Field Sieve},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14441},
  pages        = {138--166},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8730-6\_5},
  doi          = {10.1007/978-981-99-8730-6\_5},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BouillaguetFFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/BouillaguetMV23,
  author       = {Charles Bouillaguet and
                  Florette Martinez and
                  Damien Vergnaud},
  editor       = {J{\'{e}}r{\^{o}}me Leroux and
                  Sylvain Lombardy and
                  David Peleg},
  title        = {Cryptanalysis of a Generalized Subset-Sum Pseudorandom Generator},
  booktitle    = {48th International Symposium on Mathematical Foundations of Computer
                  Science, {MFCS} 2023, August 28 to September 1, 2023, Bordeaux, France},
  series       = {LIPIcs},
  volume       = {272},
  pages        = {23:1--23:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.MFCS.2023.23},
  doi          = {10.4230/LIPICS.MFCS.2023.23},
  timestamp    = {Mon, 28 Aug 2023 15:00:20 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/BouillaguetMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFFK23,
  author       = {Charles Bouillaguet and
                  Ambroise Fleury and
                  Pierre{-}Alain Fouque and
                  Paul Kirchner},
  title        = {We Are on the Same Side. Alternative Sieving Strategies for the Number
                  Field Sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {801},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/801},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Bouillaguet22,
  author       = {Charles Bouillaguet},
  title        = {Les attaques cryptographiques sont-elles toujours meilleures que la
                  force brute ?},
  year         = {2022},
  url          = {https://tel.archives-ouvertes.fr/tel-03616505},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Bouillaguet22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/BouillaguetMV22,
  author       = {Charles Bouillaguet and
                  Florette Martinez and
                  Damien Vergnaud},
  title        = {Cryptanalysis of Modular Exponentiation Outsourcing Protocols},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {9},
  pages        = {2299--2314},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab066},
  doi          = {10.1093/COMJNL/BXAB066},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/BouillaguetMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosa/BouillaguetDT22,
  author       = {Charles Bouillaguet and
                  Claire Delaplace and
                  Monika Trimoska},
  editor       = {Karl Bringmann and
                  Timothy M. Chan},
  title        = {A Simple Deterministic Algorithm for Systems of Quadratic Polynomials
                  over F\({}_{\mbox{2}}\)},
  booktitle    = {5th Symposium on Simplicity in Algorithms, SOSA@SODA 2022, Virtual
                  Conference, January 10-11, 2022},
  pages        = {285--296},
  publisher    = {{SIAM}},
  year         = {2022},
  url          = {https://doi.org/10.1137/1.9781611977066.22},
  doi          = {10.1137/1.9781611977066.22},
  timestamp    = {Sat, 19 Aug 2023 18:10:48 +0200},
  biburl       = {https://dblp.org/rec/conf/sosa/BouillaguetDT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bouillaguet22,
  author       = {Charles Bouillaguet},
  title        = {Nice Attacks - but What is the Cost? Computational Models for Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/197},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bouillaguet22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bouillaguet22a,
  author       = {Charles Bouillaguet},
  title        = {Boolean Polynomial Evaluation for the Masses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1412},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1412},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Bouillaguet22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/BouamBDN21,
  author       = {Mellila Bouam and
                  Charles Bouillaguet and
                  Claire Delaplace and
                  Camille No{\^{u}}s},
  title        = {Computational records with aging hardware: Controlling half the output
                  of {SHA-256}},
  journal      = {Parallel Comput.},
  volume       = {106},
  pages        = {102804},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.parco.2021.102804},
  doi          = {10.1016/J.PARCO.2021.102804},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pc/BouamBDN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouamBDN21,
  author       = {Mellila Bouam and
                  Charles Bouillaguet and
                  Claire Delaplace and
                  Camille No{\^{u}}s},
  title        = {Computational Records with Aging Hardware: Controlling Half the Output
                  of {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {886},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/886},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouamBDN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDT21,
  author       = {Charles Bouillaguet and
                  Claire Delaplace and
                  Monika Trimoska},
  title        = {A Simple Deterministic Algorithm for Systems of Quadratic Polynomials
                  over {\unicode{54589}}\({}_{\mbox{2}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1639},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1639},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouillaguetMS20,
  author       = {Charles Bouillaguet and
                  Florette Martinez and
                  Julia Sauvage},
  title        = {Practical seed-recovery for the {PCG} Pseudo-Random Number Generator},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {175--196},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.175-196},
  doi          = {10.13154/TOSC.V2020.I3.175-196},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BouillaguetMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouillaguetDF18,
  author       = {Charles Bouillaguet and
                  Claire Delaplace and
                  Pierre{-}Alain Fouque},
  title        = {Revisiting and Improving Algorithms for the 3XOR Problem},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {254--276},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.254-276},
  doi          = {10.13154/TOSC.V2018.I1.254-276},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouillaguetDF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/BouillaguetDV17,
  author       = {Charles Bouillaguet and
                  Claire Delaplace and
                  Marie{-}Emilie Voge},
  editor       = {Jean{-}Charles Faug{\`{e}}re and
                  Michael B. Monagan and
                  Hans{-}Wolfgang Loidl},
  title        = {Parallel Sparse {PLUQ} Factorization modulo p},
  booktitle    = {Proceedings of the International Workshop on Parallel Symbolic Computation,
                  PASCO@ISSAC 2017, Kaiserslautern, Germany, July 23-24, 2017},
  pages        = {8:1--8:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3115936.3115944},
  doi          = {10.1145/3115936.3115944},
  timestamp    = {Tue, 06 Nov 2018 16:57:05 +0100},
  biburl       = {https://dblp.org/rec/conf/issac/BouillaguetDV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BouillaguetDFK17,
  author       = {Charles Bouillaguet and
                  Claire Delaplace and
                  Pierre{-}Alain Fouque and
                  Paul Kirchner},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {Fast Lattice-Based Encryption: Stretching Spring},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {125--142},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_8},
  doi          = {10.1007/978-3-319-59879-6\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BouillaguetDFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/0001BDFHKSZ16,
  author       = {Elena Andreeva and
                  Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Jonathan J. Hoch and
                  John Kelsey and
                  Adi Shamir and
                  S{\'{e}}bastien Zimmer},
  title        = {New Second-Preimage Attacks on Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {4},
  pages        = {657--696},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9206-4},
  doi          = {10.1007/S00145-015-9206-4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/0001BDFHKSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/casc/BouillaguetD16,
  author       = {Charles Bouillaguet and
                  Claire Delaplace},
  editor       = {Vladimir P. Gerdt and
                  Wolfram Koepf and
                  Werner M. Seiler and
                  Evgenii V. Vorozhtsov},
  title        = {Sparse Gaussian Elimination Modulo p: An Update},
  booktitle    = {Computer Algebra in Scientific Computing - 18th International Workshop,
                  {CASC} 2016, Bucharest, Romania, September 19-23, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9890},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45641-6\_8},
  doi          = {10.1007/978-3-319-45641-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/casc/BouillaguetD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BiryukovBK14,
  author       = {Alex Biryukov and
                  Charles Bouillaguet and
                  Dmitry Khovratovich},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Cryptographic Schemes Based on the {ASASA} Structure: Black-Box, White-Box,
                  and Public-Key (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {63--84},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_4},
  doi          = {10.1007/978-3-662-45611-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BiryukovBK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovBK14,
  author       = {Alex Biryukov and
                  Charles Bouillaguet and
                  Dmitry Khovratovich},
  title        = {Cryptographic Schemes Based on the {ASASA} Structure: Black-box, White-box,
                  and Public-key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovBK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BouillaguetFV13,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Amandine V{\'{e}}ber},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Graph-Theoretic Algorithms for the "Isomorphism of Polynomials"
                  Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {211--227},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_13},
  doi          = {10.1007/978-3-642-38348-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BouillaguetFV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetCCNY13,
  author       = {Charles Bouillaguet and
                  Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Bo{-}Yin Yang},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Fast Exhaustive Search for Quadratic Systems in {\textdollar}{\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}\{2\}{\textdollar}{\textdollar} on FPGAs},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_11},
  doi          = {10.1007/978-3-662-43414-7\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetCCNY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetV13,
  author       = {Charles Bouillaguet and
                  Bastien Vayssi{\`{e}}re},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Provable Second Preimage Resistance Revisited},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {513--532},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_26},
  doi          = {10.1007/978-3-662-43414-7\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetCCNY13,
  author       = {Charles Bouillaguet and
                  Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Bo{-}Yin Yang},
  title        = {Fast Exhaustive Search for Quadratic Systems in {\(\mathbb{F}\)}\({}_{\mbox{2}}\)
                  on FPGAs - Extended Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetCCNY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BouillaguetFJT12,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Joana Treger},
  title        = {A family of weak keys in {HFE} and the corresponding practical key-recovery},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {3-4},
  pages        = {247--275},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.012},
  doi          = {10.1515/JMC.2011.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BouillaguetFJT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BouillaguetDDFKR12,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Nathan Keller and
                  Vincent Rijmen},
  title        = {Low-Data Complexity Attacks on {AES}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {11},
  pages        = {7002--7017},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2207880},
  doi          = {10.1109/TIT.2012.2207880},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BouillaguetDDFKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDF12,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Pierre{-}Alain Fouque},
  title        = {Automatic Search of Attacks on round-reduced {AES} and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFV12,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Amandine V{\'{e}}ber},
  title        = {Graph-Theoretic Algorithms for the "Isomorphism of Polynomials"
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Bouillaguet11,
  author       = {Charles Bouillaguet},
  title        = {Algorithms for some hard problems and cryptographic attacks against
                  specific cryptographic primitives. ({\'{E}}tudes d'hypoth{\`{e}}ses
                  algorithmiques et attaques de primitives cryptographiques)},
  school       = {Paris Diderot University, France},
  year         = {2011},
  url          = {https://tel.archives-ouvertes.fr/tel-03630843},
  timestamp    = {Fri, 27 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Bouillaguet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BouillaguetFM11,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Gilles Macario{-}Rat},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Practical Key-Recovery for All Possible Parameters of {SFLASH}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {667--685},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_36},
  doi          = {10.1007/978-3-642-25385-0\_36},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BouillaguetFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BouillaguetDF11,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Pierre{-}Alain Fouque},
  editor       = {Phillip Rogaway},
  title        = {Automatic Search of Attacks on Round-Reduced {AES} and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_10},
  doi          = {10.1007/978-3-642-22792-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BouillaguetDF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BouillaguetFFP11,
  author       = {Charles Bouillaguet and
                  Jean{-}Charles Faug{\`{e}}re and
                  Pierre{-}Alain Fouque and
                  Ludovic Perret},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Practical Cryptanalysis of the Identification Scheme Based on the
                  Isomorphism of Polynomial with One Secret Problem},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {473--493},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_29},
  doi          = {10.1007/978-3-642-19379-8\_29},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BouillaguetFFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetDFL11,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {New Insights on Impossible Differential Cryptanalysis},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_15},
  doi          = {10.1007/978-3-642-28496-0\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetDFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFM11,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Gilles Macario{-}Rat},
  title        = {Practical Key-recovery For All Possible Parameters of {SFLASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BouillaguetCCCNSY10,
  author       = {Charles Bouillaguet and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Adi Shamir and
                  Bo{-}Yin Yang},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fast Exhaustive Search for Polynomial Systems in \emph{F}\({}_{\mbox{2}}\)},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_14},
  doi          = {10.1007/978-3-642-15031-9\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BouillaguetCCCNSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Another Look at Complementation Properties},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {347--364},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_20},
  doi          = {10.1007/978-3-642-13858-4\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Attacks on Hash Functions Based on Generalized Feistel: Application
                  to Reduced-Round \emph{Lesamnta} and \emph{SHAvite-3}\({}_{\mbox{512}}\)},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_2},
  doi          = {10.1007/978-3-642-19574-7\_2},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetFL10,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Security Analysis of {SIMD}},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_24},
  doi          = {10.1007/978-3-642-19574-7\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetCCNSY10,
  author       = {Charles Bouillaguet and
                  Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Adi Shamir and
                  Bo{-}Yin Yang},
  title        = {Fast Exhaustive Search for Polynomial Systems in F\({}_{\mbox{2}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetCCNSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFL10,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  title        = {Security Analysis of {SIMD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFFP10,
  author       = {Charles Bouillaguet and
                  Jean{-}Charles Faug{\`{e}}re and
                  Pierre{-}Alain Fouque and
                  Ludovic Perret},
  title        = {Practical Cryptanalysis of the Identification Scheme Based on the
                  Isomorphism of Polynomial with One Secret Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDDKRF10,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Orr Dunkelman and
                  Nathan Keller and
                  Vincent Rijmen and
                  Pierre{-}Alain Fouque},
  title        = {Low Data Complexity Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDDKRF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AndreevaBDK09,
  author       = {Elena Andreeva and
                  Charles Bouillaguet and
                  Orr Dunkelman and
                  John Kelsey},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damg{\aa}rd},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {393--414},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_25},
  doi          = {10.1007/978-3-642-05445-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AndreevaBDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDFJ09,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Antoine Joux},
  title        = {On the Security of Iterated Hashing based on Forgery-resistant Compression
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFFP09,
  author       = {Charles Bouillaguet and
                  Jean{-}Charles Faug{\`{e}}re and
                  Pierre{-}Alain Fouque and
                  Ludovic Perret},
  title        = {Differential-Algebraic Algorithms for the Isomorphism of Polynomials
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFFP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFJT09,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Joana Treger},
  title        = {A Family of Weak Keys in {HFE} (and the Corresponding Practical Key-Recovery)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/619},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFJT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDLF09,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  title        = {Attacks on Hash Functions based on Generalized Feistel - Application
                  to Reduced-Round Lesamnta and SHAvite-3\({}_{\mbox{512}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDLF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AndreevaBFHKSZ08,
  author       = {Elena Andreeva and
                  Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Jonathan J. Hoch and
                  John Kelsey and
                  Adi Shamir and
                  S{\'{e}}bastien Zimmer},
  editor       = {Nigel P. Smart},
  title        = {Second Preimage Attacks on Dithered Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {270--288},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_16},
  doi          = {10.1007/978-3-540-78967-3\_16},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AndreevaBFHKSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetF08,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Analysis of the Collision Resistance of RadioGat{\'{u}}nUsing
                  Algebraic Techniques},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {245--261},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_16},
  doi          = {10.1007/978-3-642-04159-4\_16},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/BouillaguetKWZR07,
  author       = {Charles Bouillaguet and
                  Viktor Kuncak and
                  Thomas Wies and
                  Karen Zee and
                  Martin C. Rinard},
  editor       = {Byron Cook and
                  Andreas Podelski},
  title        = {Using First-Order Theorem Provers in the Jahob Data Structure Verification
                  System},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation, 8th International
                  Conference, {VMCAI} 2007, Nice, France, January 14-16, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4349},
  pages        = {74--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69738-1\_5},
  doi          = {10.1007/978-3-540-69738-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/vmcai/BouillaguetKWZR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFSZ07,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Adi Shamir and
                  S{\'{e}}bastien Zimmer},
  title        = {Second Preimage Attacks on Dithered Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics