• Publications
  • Influence
Unbalanced Oil and Vinegar Signature Schemes
TLDR
In [16], J. Patarin designed a new scheme, called "Oil and Vinegar", for computing asymmetric signatures. Expand
  • 387
  • 36
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
  • L. Goubin
  • Computer Science
  • Public Key Cryptography
  • 6 January 2003
TLDR
We expose a new Power Analysis strategy that can be successful for elliptic curves, including most of the sample curves recommended by standard bodies such as ANSI, IEEE, ISO, NIST, SECG or WTLS. Expand
  • 220
  • 31
  • PDF
DES and Differential Power Analysis (The "Duplication" Method)
TLDR
In this paper, we present several ideas to resist this type of attack, and in particular we develop one of them which leads, interestingly, to rather precise mathematical analysis. Expand
  • 510
  • 18
Cryptanalysis of the TTM Cryptosystem
TLDR
In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. Expand
  • 183
  • 17
  • PDF
A Sound Method for Switching between Boolean and Arithmetic Masking
TLDR
We present two new “BooleanToArithmetic” and “ArithmeticToBoolean” algorithms that are proven secure against DPA. Expand
  • 130
  • 17
  • PDF
Sosemanuk, a Fast Software-Oriented Stream Cipher
TLDR
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Expand
  • 126
  • 16
  • PDF
QUARTZ, 128-Bit Long Digital Signatures
TLDR
For some applications of digital signatures the traditional schemes as RSA, DSA or Elliptic Curve schemes, give signature size that are not short enough (with security 280, the minimal length of these signatures is always ? 320 bits, and even ? 1024 bits for RSA). We present a first well defined algorithm and signature scheme, with concrete parameter choice, that gives 128-bit signatures while the best known attack to forge a signature is in 280. Expand
  • 183
  • 9
Improved Algorithms for Isomorphisms of Polynomials
TLDR
This paper is about the design of improved algorithms to solve Isomorphisms of Polynomials (IP) problems. Expand
  • 106
  • 9
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
TLDR
In [4], H. Matsumoto presented new candidate trapdoor one-way permutations with a public key given as multivariate polynomials over a finite field. Expand
  • 127
  • 8
  • PDF
A Fast and Secure Implementation of Sflash
TLDR
Sflash is a multivariate signature scheme, and a candidate for standardisation, currently evaluated by the European call for primitives Nessie. Expand
  • 73
  • 8
  • PDF