Conferences and seminars since 2006
- Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
- Multi-Party PSM, Revisited: Improved Communication and Unbalanced Communication
- LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions
- Multi-Party Permutation for Syndrome Decoding: a new zk protocol and code-based signature
- Fast Verification of Masking Schemes in Characteristic Two
- Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
- Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
- Algorithms for the Sparse Random 3XOR Problem
- Attacks on Pseudo-Random Number Generators Hiding a Linear Structure
- On the Power of Expansion: More Efficient Constructions in the Random Probing Model
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- Random Probing Security: Verification, Composition, Expansion and New Constructions.
- Partage de secret multiplicatif sur les anneaux
- Journées Codage et Cryptographie 2020
- Logarithmes discrets elliptiques multiples
- Linearly-Homomorphic Signatures and Scalable Mix-Nets
- On Interactive Communication and Uncertainty
- Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
- Wave: a New Family of Trapdoor One-Way PSF Based on Codes
- Brute-Force Cryptanalysis with Aging Hardware: Controling Half the Output of SHA-256
- The Real Transform: Computing Positive Solutions of Fuzzy Polynomial Systems
- Full Disk Encryption and Beyond
- Séminaire C2
- Workshop on Randomness and Arithmetics for Cryptography on Hardware
- Séminaire C2
- Séminaire C2
- Efficient Arithmetic for Cryptography
- Journées Nationales 2018 Pré-GDR Sécurité Informatique
- Simplification de l’algorithme de Gentry-Szydlo
- Recent advances in Elliptic Curve Discrete Logarithm algorithms
- A Random Zoo: Sloth, Unicorn, and TRX