Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Jacques Patarin
Search web for home page
Program Committees
1
2008
Asiacrypt
pc
2
2003
PKC
pc
3
2001
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
tcc
285-302
2
2010
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
asiacrypt
94-111
3
2010
Transfinite Cryptography
eprint
online
4
2010
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
eprint
online
5
2010
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
eprint
online
6
2008
The Random Oracle Model and the Ideal Cipher Model are Equivalent
eprint
online
7
2008
Generic Attacks for the Xor of k random permutations
eprint
online
8
2008
A Proof of Security in O(2^n) for the Xor of Two Random Permutations
eprint
online
9
2008
Generic Attacks on Feistel Schemes
eprint
online
10
2008
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
crypto
1-20
11
2007
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
eprint
online
12
2007
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
asiacrypt
325-341
13
2006
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions
asiacrypt
online
14
2006
QUAD: A Practical Stream Cipher with Provable Security
eurocrypt
online
15
2005
Benes and Butterfly schemes revisited
eprint
online
16
2005
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
eprint
online
17
2004
Security of Random Feistel Schemes with 5 or More Rounds
crypto
online
18
2003
Luby-Rackoff: 7 Rounds Are Enough for 2
n(1-epsilon)
Security
crypto
513-529
19
2003
SFLASHv3, a fast asymmetric signature scheme
eprint
online
20
2001
Generic Attacks on Feistel Schemes
asiacrypt
222-238
21
2000
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
eurocrypt
392-407
22
1999
Unbalanced Oil and Vinegar Signature Schemes
eurocrypt
206-222
23
1999
DES and Differential Power Analysis (The "Duplication" Method)
ches
158-172
24
1998
About Feistel Schemes with Six (or More) Rounds
fse
103-121
25
1998
C
*
-+
and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
asiacrypt
35-49
26
1998
Improved Algorithms for Isomorphisms of Polynomials
eurocrypt
184-200
27
1996
Low-Exponent RSA with Related Messages
eurocrypt
1-9
28
1996
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
eurocrypt
33-48
29
1996
Asymmetric Cryptography with a Hidden Monomial
crypto
45-60
30
1995
Cryptoanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88
crypto
248-261
31
1994
Collisions and Inversions for Damgård's Whole Hash Function
asiacrypt
307-321
32
1993
How to Find and Avoid Collisions for the Knapsack Hash Function
eurocrypt
305-317
33
1993
Improved Algorithms for the Permuted Kernel Problem
crypto
391-402
34
1992
How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function
eurocrypt
256-266
35
1991
New Results on Pseudorandom Permutation Generators Based on the DES Scheme
crypto
301-312
36
1991
The Knapsack Hash Function proposed at Crypto'89 can be broken
eurocrypt
39-53
Coauthors of Jacques Patarin
Côme Berbain
Paul Camion
Pascal Chauvaud
Don Coppersmith
Jean-Sébastien Coron
Nicolas Courtois
Matthew K. Franklin
Henri Gilbert
Louis Goubin
Aviad Kipnis
Alexander Klimov
Avradip Mandal
Audrey Montreuil
Valérie Nachef
Michael K. Reiter
Yannick Seurin
Adi Shamir
Emmanuel Volte