Follow
Charles Bouillaguet
Charles Bouillaguet
LIP6, Sorbonne Université, Paris, France
Verified email at lip6.fr - Homepage
Title
Cited by
Cited by
Year
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key
A Biryukov, C Bouillaguet, D Khovratovich
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1632014
Fast exhaustive search for polynomial systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
1242010
Automatic search of attacks on round-reduced AES and applications
C Bouillaguet, P Derbez, PA Fouque
Annual Cryptology Conference, 169-187, 2011
1202011
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
992008
Low-data complexity attacks on AES
C Bouillaguet, P Derbez, O Dunkelman, PA Fouque, N Keller, V Rijmen
IEEE transactions on information theory 58 (11), 7002-7017, 2012
832012
Using first-order theorem provers in the Jahob data structure verification system
C Bouillaguet, V Kuncak, T Wies, K Zee, M Rinard
Verification, Model Checking, and Abstract Interpretation: 8th International …, 2007
692007
Graph-theoretic algorithms for the “isomorphism of polynomials” problem
C Bouillaguet, PA Fouque, A Véber
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
532013
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem
C Bouillaguet, JC Faugere, PA Fouque, L Perret
Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011
472011
Herding, second preimage and trojan message attacks beyond Merkle-Damgård
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 …, 2009
452009
Another look at complementation properties
C Bouillaguet, O Dunkelman, G Leurent, PA Fouque
International Workshop on Fast Software Encryption, 347-364, 2010
39*2010
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29, 657-696, 2016
382016
Fast exhaustive search for quadratic systems in on FPGAs
C Bouillaguet, CM Cheng, T Chou, R Niederhagen, BY Yang
International Conference on Selected Areas in Cryptography, 205-222, 2013
322013
New insights on impossible differential cryptanalysis
C Bouillaguet, O Dunkelman, PA Fouque, G Leurent
Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012
312012
Practical key-recovery for all possible parameters of SFLASH
C Bouillaguet, PA Fouque, G Macario-Rat
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
272011
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512
C Bouillaguet, O Dunkelman, G Leurent, PA Fouque
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
252011
Security Analysis of SIMD
C Bouillaguet, PA Fouque, G Leurent
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
252011
Revisiting and improving algorithms for the 3xor problem
C Bouillaguet, C Delaplace, PA Fouque
IACR Transactions on Symmetric Cryptology, 254-276, 2018
242018
A family of weak keys in HFE and the corresponding practical key-recovery
C Bouillaguet, PA Fouque, A Joux, J Treger
Journal of Mathematical Cryptology 5 (3-4), 247-275, 2012
232012
Sparse Gaussian Elimination Modulo p: An Update
C Bouillaguet, C Delaplace
International Workshop on Computer Algebra in Scientific Computing, 101-116, 2016
172016
Etudes d’hypotheses algorithmiques et attaques de primitives cryptographiques
C Bouillaguet
PhD thesis, PhD thesis, Université Paris-Diderot–École Normale Supérieure, 2011
132011
The system can't perform the operation now. Try again later.
Articles 1–20