What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Antoine Joux
Google Scholar
68
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Kleptographic Attacks Against Implicit Rejection.
Antoine Joux
Julian Loss
Benedikt Wagner
2024
conf/crypto
MPC in the Head Using the Subfield Bilinear Collision Problem.
Janik Huth
Antoine Joux
2024
conf/eurocrypt
Key Recovery Attack on the Partial Vandermonde Knapsack Problem.
Dipayan Das
Antoine Joux
2024
conf/asiacrypt
Faster Signatures from MPC-in-the-Head.
Dung Bui
Eliana Carozza
Geoffroy Couteau
Dahmun Goudarzi
Antoine Joux
2024
conf/tcc
Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials.
Nico Döttling
Jesko Dujmovic
Antoine Joux
2023
conf/eurocrypt
On the Hardness of the Finite Field Isomorphism Problem.
Dipayan Das
Antoine Joux
2023
conf/eurocrypt
Short Signatures from Regular Syndrome Decoding in the Head.
Eliana Carozza
Geoffroy Couteau
Antoine Joux
2022
conf/crypto
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
Thibauld Feneuil
Antoine Joux
Matthieu Rivain
2022
conf/eurocrypt
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
Gang Tang
Dung Hoang Duong
Antoine Joux
Thomas Plantard
Youming Qiao
Willy Susilo
2018
conf/crypto
A New Public-Key Cryptosystem via Mersenne Numbers.
Divesh Aggarwal
Antoine Joux
Anupam Prakash
Miklos Santha
2018
conf/asiacrypt
How to Securely Compute with Noisy Leakage in Quasilinear Complexity.
Dahmun Goudarzi
Antoine Joux
Matthieu Rivain
2015
journals/joc
Cryptanalysis of SHA-0 and Reduced SHA-1.
Eli Biham
Rafi Chen
Antoine Joux
2014
conf/eurocrypt
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic.
Razvan Barbulescu
Pierrick Gaudry
Antoine Joux
Emmanuel Thomé
2014
conf/eurocrypt
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
Jean-Charles Faugère
Louise Huot
Antoine Joux
Guénaël Renault
Vanessa Vitse
2014
conf/asiacrypt
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE.
Pierre-Alain Fouque
Antoine Joux
Chrysanthi Mavromati
2014
conf/asiacrypt
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields.
Antoine Joux
Cécile Pierrot
2013
journals/joc
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields - Application to the Static Diffie-Hellman Problem on $E(\mathbb{F}_{q^{5}})$.
Antoine Joux
Vanessa Vitse
2013
conf/acisp
Injective Encodings to Elliptic Curves.
Pierre-Alain Fouque
Antoine Joux
Mehdi Tibouchi
2013
conf/eurocrypt
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields.
Antoine Joux
2013
conf/sacrypt
A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic.
Antoine Joux
2012
conf/ches
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
Marcel Medwed
François-Xavier Standaert
Antoine Joux
2012
conf/eurocrypt
A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract).
Antoine Joux
2012
conf/eurocrypt
Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $\mathbb{F}_{p^6}$.
Antoine Joux
Vanessa Vitse
2012
conf/eurocrypt
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding.
Anja Becker
Antoine Joux
Alexander May
Alexander Meurer
2011
conf/pkc
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005.
Jean-Sébastien Coron
Antoine Joux
Avradip Mandal
David Naccache
Mehdi Tibouchi
2011
conf/ctrsa
A Variant of the F4 Algorithm.
Antoine Joux
Vanessa Vitse
2011
conf/eurocrypt
Improved Generic Algorithms for Hard Knapsacks.
Anja Becker
Jean-Sébastien Coron
Antoine Joux
2010
conf/latincrypt
Cryptanalysis of the Hidden Matrix Cryptosystem.
Jean-Charles Faugère
Antoine Joux
Ludovic Perret
Joana Treger
2010
conf/eurocrypt
New Generic Algorithms for Hard Knapsacks.
Nick Howgrave-Graham
Antoine Joux
2009
conf/ches
Fault Attacks on RSA Signatures with Partially Unknown Messages.
Jean-Sébastien Coron
Antoine Joux
Ilya Kizhvatov
David Naccache
Pascal Paillier
2009
conf/asiacrypt
<sup>2</sup> with Quadratic Forms: Nice Cryptanalyses.
Guilhem Castagnos
Antoine Joux
Fabien Laguillaumie
Phong Q. Nguyen
2009
conf/asiacrypt
Improved Generic Algorithms for 3-Collisions.
Antoine Joux
Stefan Lucks
2008
conf/africacrypt
Yet Another Attack on Vest.
Pascal Delaunay
Antoine Joux
2008
conf/sacrypt
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers.
Côme Berbain
Henri Gilbert
Antoine Joux
2007
conf/fse
Overtaking VEST.
Antoine Joux
Jean-René Reinhard
2007
conf/crypto
Hash Functions and the (Amplified) Boomerang Attack.
Antoine Joux
Thomas Peyrin
2007
conf/eurocrypt
Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables.
Aurélie Bauer
Antoine Joux
2007
conf/asiacrypt
-th Roots Become Easier Than Factoring.
Antoine Joux
David Naccache
Emmanuel Thomé
2006
conf/fse
Chosen-Ciphertext Attacks Against MOSQUITO.
Antoine Joux
Frédéric Muller
2006
conf/crypto
The Number Field Sieve in the Medium Prime Case.
Antoine Joux
Reynald Lercier
Nigel P. Smart
Frederik Vercauteren
2006
conf/crypto
Inverting HFE Is Quasipolynomial.
Louis Granboulan
Antoine Joux
Jacques Stern
2006
conf/eurocrypt
The Function Field Sieve in the Medium Prime Case.
Antoine Joux
Reynald Lercier
2005
conf/fse
Two Attacks Against the HBB Stream Cipher.
Antoine Joux
Frédéric Muller
2005
conf/pkc
Cryptanalysis of the Tractable Rational Map Cryptosystem.
Antoine Joux
Sébastien Kunz-Jacques
Frédéric Muller
Pierre-Michel Ricordel
2005
conf/eurocrypt
Collisions of SHA-0 and Reduced SHA-1.
Eli Biham
Rafi Chen
Antoine Joux
Patrick Carribault
Christophe Lemuet
William Jalby
2004
journals/joc
A One Round Protocol for Tripartite Diffie-Hellman.
Antoine Joux
2004
conf/crypto
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
Antoine Joux
2004
conf/sacrypt
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Pierre-Alain Fouque
Antoine Joux
Guillaume Poupard
2003
journals/joc
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups.
Antoine Joux
Kim Nguyen
2003
conf/fse
New Attacks against Standardized MACs.
Antoine Joux
Guillaume Poupard
Jacques Stern
2003
conf/fse
Loosening the KNOT.
Antoine Joux
Frédéric Muller
2003
conf/crypto
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.
Jean-Charles Faugère
Antoine Joux
2003
conf/eurocrypt
Cryptanalysis of the EMD Mode of Operation.
Antoine Joux
2003
conf/sacrypt
Authenticated On-Line Encryption.
Pierre-Alain Fouque
Antoine Joux
Gwenaëlle Martinet
Frédéric Valette
2003
conf/sacrypt
A Chosen IV Attack Against Turing.
Antoine Joux
Frédéric Muller
2002
conf/fse
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction.
Éliane Jaulmes
Antoine Joux
Frédéric Valette
2002
conf/crypto
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC.
Antoine Joux
Gwenaëlle Martinet
Frédéric Valette
2002
conf/eurocrypt
Fast Correlation Attacks: An Algorithmic Point of View.
Philippe Chose
Antoine Joux
Michel Mitton
2001
conf/pkc
Cryptanalysis of PKP: A New Approach.
Éliane Jaulmes
Antoine Joux
2000
conf/fse
A Statistical Attack on RC6.
Henri Gilbert
Helena Handschuh
Antoine Joux
Serge Vaudenay
2000
conf/crypto
A Chosen-Ciphertext Attack against NTRU.
Éliane Jaulmes
Antoine Joux
2000
conf/eurocrypt
A NICE Cryptanalysis.
Éliane Jaulmes
Antoine Joux
2000
conf/asiacrypt
Why Textbook ElGamal and RSA Encryption Are Insecure.
Dan Boneh
Antoine Joux
Phong Q. Nguyen
1998
journals/joc
Lattice Reduction: A Toolbox for the Cryptanalyst.
Antoine Joux
Jacques Stern
1998
conf/crypto
Differential Collisions in SHA-0.
Florent Chabaud
Antoine Joux
1994
conf/eurocrypt
A Practical Attack against Knapsack based Hash Functions (Extended Abstract).
Antoine Joux
Louis Granboulan
1991
conf/crypto
The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
Yeow Meng Chee
Antoine Joux
Jacques Stern
1991
conf/asiacrypt
Cryptanalysis of Another Knapsack Cryptosystem.
Antoine Joux
Jacques Stern
Coauthors
Alexander May
(1)
Alexander Meurer
(1)
Anja Becker
(2)
Antoine Joux
(68)
Anupam Prakash
(1)
Aurélie Bauer
(1)
Avradip Mandal
(1)
Benedikt Wagner
(1)
Cécile Pierrot
(1)
Christophe Lemuet
(1)
Chrysanthi Mavromati
(1)
Côme Berbain
(1)
Dahmun Goudarzi
(2)
Dan Boneh
(1)
David Naccache
(3)
Dipayan Das
(2)
Divesh Aggarwal
(1)
Dung Bui
(1)
Dung Hoang Duong
(1)
Eli Biham
(2)
Eliana Carozza
(2)
Éliane Jaulmes
(4)
Emmanuel Thomé
(2)
Fabien Laguillaumie
(1)
Florent Chabaud
(1)
François-Xavier Standaert
(1)
Frédéric Muller
(5)
Frédéric Valette
(3)
Frederik Vercauteren
(1)
Gang Tang
(1)
Geoffroy Couteau
(2)
Guénaël Renault
(1)
Guilhem Castagnos
(1)
Guillaume Poupard
(2)
Gwenaëlle Martinet
(2)
Helena Handschuh
(1)
Henri Gilbert
(2)
Ilya Kizhvatov
(1)
Jacques Stern
(5)
Janik Huth
(1)
Jean-Charles Faugère
(3)
Jean-René Reinhard
(1)
Jean-Sébastien Coron
(3)
Jesko Dujmovic
(1)
Joana Treger
(1)
Julian Loss
(1)
Kim Nguyen
(1)
Louis Granboulan
(2)
Louise Huot
(1)
Ludovic Perret
(1)
Marcel Medwed
(1)
Matthieu Rivain
(2)
Mehdi Tibouchi
(2)
Michel Mitton
(1)
Miklos Santha
(1)
Nick Howgrave-Graham
(1)
Nico Döttling
(1)
Nigel P. Smart
(1)
Pascal Delaunay
(1)
Pascal Paillier
(1)
Patrick Carribault
(1)
Philippe Chose
(1)
Phong Q. Nguyen
(2)
Pierre-Alain Fouque
(4)
Pierre-Michel Ricordel
(1)
Pierrick Gaudry
(1)
Rafi Chen
(2)
Razvan Barbulescu
(1)
Reynald Lercier
(2)
Sébastien Kunz-Jacques
(1)
Serge Vaudenay
(1)
Stefan Lucks
(1)
Thibauld Feneuil
(1)
Thomas Peyrin
(1)
Thomas Plantard
(1)
Vanessa Vitse
(4)
William Jalby
(1)
Willy Susilo
(1)
Yeow Meng Chee
(1)
Youming Qiao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to