Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Jacques Patarin
Search web for home page
Program Committees
1
2008
Asiacrypt
pc
2
2003
PKC
pc
3
2001
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
asiacrypt
278-295
2
2012
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
tcc
285-302
3
2010
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
asiacrypt
94-111
4
2010
Transfinite Cryptography
eprint
online
5
2010
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
eprint
online
6
2010
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
eprint
online
7
2008
The Random Oracle Model and the Ideal Cipher Model are Equivalent
eprint
online
8
2008
Generic Attacks for the Xor of k random permutations
eprint
online
9
2008
A Proof of Security in O(2^n) for the Xor of Two Random Permutations
eprint
online
10
2008
Generic Attacks on Feistel Schemes
eprint
online
11
2008
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
crypto
1-20
12
2007
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
eprint
online
13
2007
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
asiacrypt
325-341
14
2006
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions
asiacrypt
online
15
2006
QUAD: A Practical Stream Cipher with Provable Security
eurocrypt
online
16
2005
Benes and Butterfly schemes revisited
eprint
online
17
2005
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
eprint
online
18
2004
Security of Random Feistel Schemes with 5 or More Rounds
crypto
online
19
2003
Luby-Rackoff: 7 Rounds Are Enough for 2
n(1-epsilon)
Security
crypto
513-529
20
2003
SFLASHv3, a fast asymmetric signature scheme
eprint
online
21
2001
Generic Attacks on Feistel Schemes
asiacrypt
222-238
22
2000
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
eurocrypt
392-407
23
1999
Unbalanced Oil and Vinegar Signature Schemes
eurocrypt
206-222
24
1999
DES and Differential Power Analysis (The "Duplication" Method)
ches
158-172
25
1998
About Feistel Schemes with Six (or More) Rounds
fse
103-121
26
1998
C
*
-+
and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
asiacrypt
35-49
27
1998
Improved Algorithms for Isomorphisms of Polynomials
eurocrypt
184-200
28
1996
Low-Exponent RSA with Related Messages
eurocrypt
1-9
29
1996
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
eurocrypt
33-48
30
1996
Asymmetric Cryptography with a Hidden Monomial
crypto
45-60
31
1995
Cryptoanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88
crypto
248-261
32
1994
Collisions and Inversions for Damgård's Whole Hash Function
asiacrypt
307-321
33
1993
How to Find and Avoid Collisions for the Knapsack Hash Function
eurocrypt
305-317
34
1993
Improved Algorithms for the Permuted Kernel Problem
crypto
391-402
35
1992
How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function
eurocrypt
256-266
36
1991
New Results on Pseudorandom Permutation Generators Based on the DES Scheme
crypto
301-312
37
1991
The Knapsack Hash Function proposed at Crypto'89 can be broken
eurocrypt
39-53
Coauthors of Jacques Patarin
Côme Berbain
Paul Camion
Pascal Chauvaud
Don Coppersmith
Jean-Sébastien Coron
Nicolas Courtois
Matthew K. Franklin
Henri Gilbert
Louis Goubin
Aviad Kipnis
Alexander Klimov
Rodolphe Lampe
Avradip Mandal
Audrey Montreuil
Valérie Nachef
Michael K. Reiter
Yannick Seurin
Adi Shamir
Emmanuel Volte