R. Moreira Ferreira, L. Perret : “Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV”, Progress in Cryptology - AFRICACRYPT 2024, vol. 14861, Lecture Notes in Computer Science, Douala, Cameroon, pp. 222-235, (Springer Nature Switzerland), (ISBN: 978-3-031-64381-1) (2024)
L. Bettale, D. Kahrobaei, L. Perret, J. Verbel : “Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials”, Applied Cryptography and Network Security (ACNS), vol. 14583, Lecture Notes in Computer Science, Abu Dhabi, United Arab Emirates, pp. 457-486, (Springer Nature Switzerland) (2024)
W. Beullens, J.‑Ch. Faugère, E. Koussa, G. Macario‑Rat, J. Patarin, L. Perret : “PKP-Based Signature Scheme”, Progress in Cryptology -- INDOCRYPT 2019, vol. 11898, Lecture Notes in Computer Science, Hyderabad, India, pp. 3-22, (Springer International Publishing), (ISBN: 978-3-030-35423-7) (2019)
J.‑Ch. Faugère, L. Perret, J. Ryckeghem : “Software Toolkit for HFE-based Multivariate Schemes”, CHES 2019 : International Conference on Cryptographic Hardware and Embedded Systems, vol. 2019 (3), IACR Transactions on Cryptographic Hardware and Embedded Systems, Atlanta, United States, pp. 257-304 (2019)
M. Bender, J.‑Ch. Faugère, L. Perret, E. Tsigaridas : “A Superfast Randomized Algorithm to Decompose Binary Forms”, ISSAC '16 - 41st International Symposium on Symbolic and Algebraic Computation, Waterloo, Canada, pp. 79-86, (ACM) (2016)
J.‑Ch. Faugère, D. Gligoroski, L. Perret, S. Simona, E. Thomae : “A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems”, IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'15), Maryland, United States (2015)
M. Albrecht, C. Cid, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “On the complexity of the BKW algorithm on LWE”, Designs, Codes and Cryptography, vol. 74 (2), pp. 26, (Springer Verlag) (2015)
M. Albrecht, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “Lazy Modulus Switching for the BKW Algorithm on LWE”, Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, (Springer) (2014)
J.‑Ch. Faugère, V. Gauthier‑Umana, A. Otmani, L. Perret, J.‑P. Tillich : “A Distinguisher for High Rate McEliece Cryptosystems”, IEEE Transactions on Information Theory, vol. 59 (10), pp. 6830-6844, (Institute of Electrical and Electronics Engineers) (2013)
M. Albrecht, C. Cid, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “On the Complexity of the BKW Algorithm on LWE”, SCC 2012 -- Third international conference on Symbolic Computation and Cryptography, Castro Urdiales, Spain, pp. 100-107 (2012)
M. Albrecht, C. Cid, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “On the complexity of the Arora-Ge Algorithm against LWE”, SCC 2012 -- Third international conference on Symbolic Computation and Cryptography, Castro Urdiales, Spain, pp. 93-99 (2012)
D. Gligoroski, R. Ødegard, R. Jensen, L. Perret, J.‑Ch. Faugère, S. Knapskog, S. Markovski : “MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme”, Trusted Systems - The Third International Conference on Trusted Systems - INTRUST 2011, vol. 7222, Lecture Notes in Computer Science, Beijing, China, pp. 184-203, (Springer Verlag) (2012)
2011
F. Armknecht, D. Augot, L. Perret, Ah. Sadeghi : “On Constructing Homomorphic Encryption Schemes from Coding Theory”, 13th IMA International Conference on Cryptography and Coding, vol. 7089, Lecture Notes in Computer Science, Oxford, United Kingdom, pp. 23-40, (Springer) (2011)
M. Albrecht, J.‑Ch. Faugère, P. Farshim, L. Perret : “Polly Cracker, Revisited”, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, vol. 7073, Lecture Notes in Computer Science, Seoul, Korea, Republic of, pp. 179-196, (Springer) (2011)
J.‑Ch. Faugère, V. Gauthier‑Umana, A. Otmani, L. Perret, J.‑P. Tillich : “A distinguisher for high rate McEliece cryptosystems”, ITW 2011- IEEE Information Theory Workshop, Paraty, Brazil, pp. 282-286, (IEEE) (2011)
M. Albrecht, C. Cid, Th. Dulien, J.‑Ch. Faugère, L. Perret : “Algebraic Precomputations in Differential Cryptanalysis”, Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Revised Selected Papers, vol. 6584, Lecture Notes in Computer Science, Shanghai, China, pp. 387-403, (Springer Berlin / Heidelberg) (2011)
J.‑Ch. Faugère, R. Ødegard, L. Perret, D. Gligoroski : “Analysis of the MQQ Public Key Cryptosystem”, Cryptology and Network Security, vol. 6467, Lecture Notes in Computer Science, Kuala Lumpur, Malaysia, pp. 169-183, (Springer Berlin / Heidelberg) (2010)
J.‑Ch. Faugère, A. Joux, L. Perret, J. Treger : “Cryptanalysis of the Hidden Matrix Cryptosystem”, Progress in Cryptology - LATINCRYPT 2010, vol. 6212, Lecture Notes in Computer Science, Puebla, Mexico, pp. 241-254, (Springer Berlin / Heidelberg) (2010)
J.‑Ch. Faugère, J. Gathen, L. Perret : “Decomposition of Generic Multivariate Polynomials”, ISSAC '10: Proceedings of the 2010 international symposium on Symbolic and algebraic computation, Munich, Germany, pp. 131-137, (ACM) (2010)
M. Albrecht, C. Cid, Th. Dulien, J.‑Ch. Faugère, L. Perret : “Algebraic Precomputations in Differential Cryptanalysis”, Tools'10: Proceedings of the Workshop on Tools for Cryptanalysis 2010, London, United Kingdom, pp. 37-50, (Ecrypt II) (2010)
J.‑Ch. Faugère, R. Ødegard, L. Perret, D. Gligoroski : “Analysis of the MQQ Public Key Cryptosystem”, SCC'10: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography, Londres, United Kingdom, pp. 101-116 (2010)
L. Bettale, J.‑Ch. Faugère, L. Perret : “Hybrid Approach : a Tool for Multivariate Cryptography”, Tools'10: Proceedings of the Workshop on Tools for Cryptanalysis 2010, London, United Kingdom, pp. 15-23, (Ecrypt II) (2010)
J.‑Ch. Faugère, A. Otmani, L. Perret, J.‑P. Tillich : “Algebraic Cryptanalysis of McEliece Variants with Compact Keys”, Eurocrypt 2010 - 29th International Conference on Cryptology, vol. 6110, Lecture Notes in Computer Science, Monaco, Monaco, pp. 279-298, (Springer Verlag) (2010)
J.‑Ch. Faugère, L. Perret : “Symbolic Computation and Cryptography”, vol. 3 (2), Mathematics in Computer Science, 127-224 pages, (Birkhäuser and Springer) (2010)
J.‑Ch. Faugère, L. Perret : “Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages”, Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December, 2009, Revised Selected Papers, vol. 6151, Lecture Notes in Computer Science, Beijing, China, pp. 266-277, (Springer-Verlag) (2009)
L. Bettale, J.‑Ch. Faugère, L. Perret : “Security Analysis of Multivariate Polynomials for Hashing”, Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Revised Selected Papers, vol. 5487, Lecture Notes in Computer Science, Beijing, China, pp. 115-124, (Springer-Verlag) (2009)
J.‑Ch. Faugère, L. Perret, P.‑J. Spaenlehauer : “Algebraic-Differential Cryptanalysis of DES”, Western European Workshop on Research in Cryptology - WEWoRC 2009, Graz, Austria, pp. 1-5 (2009)
F. Levy‑dit‑Vehel, M.‑G. Marinari, L. Perret, C. Traverso : “A Survey on Polly Cracker Systems”, chapter in Gröbner Bases, Coding, and Cryptography, pp. 285-305, (Springer), (ISBN: 978-3-540-93805-7) (2009)
J.‑Ch. Faugère, F. Levy‑dit‑Vehel, L. Perret : “Cryptanalysis of MinRank”, Advances in Cryptology – CRYPTO 2008, vol. 5157, Lecture Notes in Computer Science, Santa Barbara, CA, United States, pp. 280-296, (Springer) (2008)
2007
M. Sugita, M. Kawazoe, L. Perret, H. Imai : “Algebraic Cryptanalysis of 58-Round SHA-1”, Fast Software Encryption, 14th International Workshop, FSE, vol. 4593, Lecture Notes in Computer Science, Luxembourg, Luxembourg, pp. 349-365, (Springer) (2007)
2006
J.‑Ch. Faugère, L. Perret : “Cryptanalysis of 2R-- schemes”, Advances in Cryptology CRYPTO 2006, vol. 4117, Lecture Notes in Computer Science, Santa Barbara, California, United States, pp. 357-372, (Springer-Verlag) (2006)