Here is a list of my publications. Click on titles for abstracts and additionnal information.

  1. Practical Key-recovery For All Possible Parameters of SFLASH (Asiacrypt'11)
  2. Automatic Search of Attacks on round-reduced AES and Applications (Crypto'11)
  3. New Insights on Impossible Differential Cryptanalysis (SAC'11)
  4. Low Data Complexity Attacks on AES (submitted)
  5. Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial With One Secret Problem (PKC'11)
  6. Fast Exhaustive Search for Polynomial Systems in F_2 (CHES'10)
  7. Security Analysis of SIMD (SAC'10)
  8. Attacks on Hash Functions based on Generalized Feistel, Application to Reduced-Round Lesamnta and SHAvite-3/512 (SAC'10)
  9. Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound (Submitted)
  10. Another Look at Complementation Properties (FSE'10)
  11. A Family of Weak Keys in HFE and the Corresponding Practical Key-Recovery (Journal of Mathematical Cryptology,2009)
  12. Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard (SAC'09)
  13. Analysis of the Collision Resistance of RadioGatún using Algebraic Techniques (SAC'08)
  14. Second Preimage Attacks on Dithered Hash Functions (submitted + EUCROCRYPT'08)
  15. Sécurité et preuves de sécurité des fonctions de hachage (Master's thesis, in french)
  16. Using First-Order Theorem Provers in the Jahob Data Structure Verification System (VMCAI'07)

ENS INRIA CNRS
Valid XHTML 1.1