Follow
Pierre-Alain Fouque
Pierre-Alain Fouque
Professor of Computer Science, Rennes University, IRISA, Institut Universitaire de France
Verified email at ens.fr - Homepage
Title
Cited by
Cited by
Year
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
International Workshop on Public Key Cryptography, 65-84, 2005
10012005
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
International Workshop on Public Key Cryptography, 65-84, 2005
10012005
Anomaly detection in streams with extreme value theory
A Siffer, PA Fouque, A Termier, C Largouet
Proceedings of the 23rd ACM SIGKDD international conference on knowledge …, 2017
4982017
Sharing decryption in the context of voting or lotteries
PA Fouque, G Poupard, J Stern
Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001
4512001
Practical multi-candidate election system
O Baudron, PA Fouque, D Pointcheval, J Stern, G Poupard
Proceedings of the twentieth annual ACM symposium on Principles of …, 2001
4472001
Falcon: Fast-Fourier lattice-based compact signatures over NTRU
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to the NIST’s post-quantum cryptography standardization process …, 2018
4442018
Strong non-interference and type-directed higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
317*2016
The Doubling Attack – Why Upwards Is Better than Downwards
PA Fouque, F Valette
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2942003
Improved key recovery attacks on reduced-round AES in the single-key setting
P Derbez, PA Fouque, J Jean
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
2522013
An improved LPN algorithm
É Levieil, PA Fouque
Security and Cryptography for Networks: 5th International Conference, SCN …, 2006
2332006
Practical cryptanalysis of SFLASH
V Dubois, PA Fouque, A Shamir, J Stern
Annual International Cryptology Conference, 1-12, 2007
2122007
Verified proofs of higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub
Annual International Conference on the Theory and Applications of …, 2015
2052015
Falcon
T Prest, PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, ...
Post-Quantum Cryptography Project of NIST, 2020
2002020
Threshold cryptosystems secure against chosen-ciphertext attacks
PA Fouque, D Pointcheval
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
1782001
Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers
T Espitau, PA Fouque, B Gérard, M Tibouchi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1682017
Revisiting lattice attacks on overstretched NTRU parameters
P Kirchner, PA Fouque
Annual International Conference on the Theory and Applications of …, 2017
1642017
An improved BKW algorithm for LWE with applications to cryptography and lattices
P Kirchner, PA Fouque
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1592015
Tightly-secure signatures from lossy identification schemes
M Abdalla, PA Fouque, V Lyubashevsky, M Tibouchi
Annual International Conference on the Theory and Applications of …, 2012
149*2012
Fault attack on elliptic curve Montgomery ladder implementation
PA Fouque, R Lercier, D Réal, F Valette
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 92-98, 2008
1432008
Differential cryptanalysis for multivariate schemes
PA Fouque, L Granboulan, J Stern
Annual International Conference on the Theory and Applications of …, 2005
1382005
The system can't perform the operation now. Try again later.
Articles 1–20