Pierre-Alain Fouque
Pierre-Alain Fouque
Professor of Computer Science, Rennes University, IRISA, Institut Universitaire de France
Verified email at ens.fr - Homepage
Title
Cited by
Cited by
Year
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
International Workshop on Public Key Cryptography, 65-84, 2005
6282005
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
International Workshop on Public Key Cryptography, 65-84, 2005
6282005
Practical multi-candidate election system
O Baudron, PA Fouque, D Pointcheval, J Stern, G Poupard
Proceedings of the twentieth annual ACM symposium on Principles of …, 2001
3982001
Sharing decryption in the context of voting or lotteries
PA Fouque, G Poupard, J Stern
International Conference on Financial Cryptography, 90-104, 2000
3922000
The Doubling Attack – Why Upwards Is Better than Downwards
PA Fouque, F Valette
International Workshop on Cryptographic Hardware and Embedded Systems, 269-280, 2003
2562003
An improved LPN algorithm
É Levieil, PA Fouque
International conference on security and cryptography for networks, 348-359, 2006
1982006
Practical cryptanalysis of SFLASH
V Dubois, PA Fouque, A Shamir, J Stern
Annual International Cryptology Conference, 1-12, 2007
1862007
Improved key recovery attacks on reduced-round AES in the single-key setting
P Derbez, PA Fouque, J Jean
Annual International Conference on the Theory and Applications of …, 2013
1762013
Strong non-interference and type-directed higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
162*2016
Threshold cryptosystems secure against chosen-ciphertext attacks
PA Fouque, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2001
1602001
Verified proofs of higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub
Annual International Conference on the Theory and Applications of …, 2015
1362015
Fault attack on elliptic curve Montgomery ladder implementation
PA Fouque, R Lercier, D Réal, F Valette
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 92-98, 2008
1262008
Differential cryptanalysis for multivariate schemes
PA Fouque, L Granboulan, J Stern
Annual International Conference on the Theory and Applications of …, 2005
1222005
An improved BKW algorithm for LWE with applications to cryptography and lattices
P Kirchner, PA Fouque
Annual Cryptology Conference, 43-62, 2015
1212015
Anomaly detection in streams with extreme value theory
A Siffer, PA Fouque, A Termier, C Largouet
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
1202017
Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers
T Espitau, PA Fouque, B Gérard, M Tibouchi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1052017
Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
PA Fouque, T Vannet
International Workshop on Fast Software Encryption, 502-517, 2013
1012013
Fully distributed threshold RSA under standard assumptions
PA Fouque, J Stern
International Conference on the Theory and Application of Cryptology and …, 2001
1002001
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
882008
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
IEE Proceedings-Information Security 153 (1), 27-39, 2006
872006
The system can't perform the operation now. Try again later.
Articles 1–20