Here is a list of my publications. Click on titles for abstracts and additionnal information.

  1. Sparse Gaussian Elimination modulo p: an Update (CASC, 2016)
  2. New Second-Preimage Attacks on Hash Functions (Journal of Cryptology, 2015)
  3. Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key (Asiacrypt'14)
  4. Provable Second Preimage Resistance Revisited (SAC'13)
  5. Fast Exhaustive Search for Quadratic Systems in GF(2) on FPGAs (SAC'13)
  6. Graph-Theoretic Algorithms for the Isomorphism of Polynomials Problem (Eurocrypt'13)
  7. Practical Key-recovery For All Possible Parameters of SFLASH (Asiacrypt'11)
  8. Automatic Search of Attacks on round-reduced AES and Applications (Crypto'11)
  9. New Insights on Impossible Differential Cryptanalysis (SAC'11)
  10. Low Data Complexity Attacks on AES (IEEE Tr. on Inf. Th.)
  11. Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial With One Secret Problem (PKC'11)
  12. Fast Exhaustive Search for Polynomial Systems in F_2 (CHES'10)
  13. Security Analysis of SIMD (SAC'10)
  14. Attacks on Hash Functions based on Generalized Feistel, Application to Reduced-Round Lesamnta and SHAvite-3/512 (SAC'10)
  15. Another Look at Complementation Properties (FSE'10)
  16. A Family of Weak Keys in HFE and the Corresponding Practical Key-Recovery (Journal of Mathematical Cryptology,2009)
  17. Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard (SAC'09)
  18. Analysis of the Collision Resistance of RadioGatún using Algebraic Techniques (SAC'08)
  19. Second Preimage Attacks on Dithered Hash Functions (submitted + EUCROCRYPT'08)
  20. Sécurité et preuves de sécurité des fonctions de hachage (Master's thesis, in french)
  21. Using First-Order Theorem Provers in the Jahob Data Structure Verification System (VMCAI'07)

Valid XHTML 1.1