What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jacques Patarin
Google Scholar
53
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/sacrypt
Classical and Quantum Generic Attacks on 6-Round Feistel Schemes.
Maya Chartouny
Benoît Cogliati
Jacques Patarin
2023
conf/eurocrypt
Proof of Mirror Theory for a Wide Range of $\xi _{\max }$.
Benoît Cogliati
Avijit Dutta
Mridul Nandi
Jacques Patarin
Abishanka Saha
2021
conf/icbc2
Unpredictability properties in Algorand consensus protocol.
Aline Gouget
Jacques Patarin
Ambre Toulemonde
2020
conf/icisc
(Quantum) Cryptanalysis of Misty Schemes.
Aline Gouget
Jacques Patarin
Ambre Toulemonde
2018
conf/africacrypt
Two Simple Composition Theorems with H-coefficients.
Jacques Patarin
2018
conf/africacrypt
Two-Face: New Public Key Multivariate Schemes.
Gilles Macario-Rat
Jacques Patarin
2016
journals/joc
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction.
Jean-Sébastien Coron
Thomas Holenstein
Robin Künzler
Jacques Patarin
Yannick Seurin
Stefano Tessaro
2014
conf/fse
The Indistinguishability of the XOR of k Permutations.
Benoit Cogliati
Rodolphe Lampe
Jacques Patarin
2014
conf/sacrypt
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.
Benoit Cogliati
Jacques Patarin
Yannick Seurin
2013
conf/acns
Generic Attacks for the Xor of k Random Permutations.
Jacques Patarin
2013
conf/cans
Zero Knowledge with Rubik's Cubes and Non-abelian Groups.
Emmanuel Volte
Jacques Patarin
Valérie Nachef
2013
conf/cans
Differential Attacks on Generalized Feistel Schemes.
Valérie Nachef
Emmanuel Volte
Jacques Patarin
2012
conf/latincrypt
Zero-Knowledge for Multivariate Polynomials.
Valérie Nachef
Jacques Patarin
Emmanuel Volte
2012
conf/asiacrypt
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher.
Rodolphe Lampe
Jacques Patarin
Yannick Seurin
2012
conf/tcc
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction.
Avradip Mandal
Jacques Patarin
Yannick Seurin
2010
conf/latincrypt
Generic Attacks on Misty Schemes.
Valérie Nachef
Jacques Patarin
Joana Treger
2010
conf/asiacrypt
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
Emmanuel Volte
Valérie Nachef
Jacques Patarin
2009
conf/africacrypt
Generic Attacks on Feistel Networks with Internal Permutations.
Joana Treger
Jacques Patarin
2008
conf/crypto
The Random Oracle Model and the Ideal Cipher Model Are Equivalent.
Jean-Sébastien Coron
Jacques Patarin
Yannick Seurin
2008
conf/africacrypt
A Proof of Security in O(2<sup>n</sup>) for the Benes Scheme.
Jacques Patarin
2008
conf/sacrypt
The "Coefficients H" Technique.
Jacques Patarin
2008
conf/sacrypt
Building Secure Block Ciphers on Generic Attacks Assumptions.
Jacques Patarin
Yannick Seurin
2007
conf/asiacrypt
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
Jacques Patarin
Valérie Nachef
Côme Berbain
2006
conf/eurocrypt
QUAD: A Practical Stream Cipher with Provable Security.
Côme Berbain
Henri Gilbert
Jacques Patarin
2006
conf/asiacrypt
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions.
Jacques Patarin
Valérie Nachef
Côme Berbain
2005
conf/icisc
On Linear Systems of Equations with Distinct Variables and Small Block Size.
Jacques Patarin
2005
conf/icisc
Benes and Butterfly Schemes Revisited.
Jacques Patarin
Audrey Montreuil
2004
conf/crypto
Security of Random Feistel Schemes with 5 or More Rounds.
Jacques Patarin
2003
conf/crypto
Luby-Rackoff: 7 Rounds Are Enough for 2<sup>n(1-epsilon)</sup>Security.
Jacques Patarin
2003
conf/ctrsa
About the XL Algorithm over GF(2).
Nicolas T. Courtois
Jacques Patarin
2001
conf/ctrsa
FLASH, a Fast Multivariate Signature Algorithm.
Jacques Patarin
Nicolas T. Courtois
Louis Goubin
2001
conf/ctrsa
QUARTZ, 128-Bit Long Digital Signatures.
Jacques Patarin
Nicolas T. Courtois
Louis Goubin
2001
conf/asiacrypt
Generic Attacks on Feistel Schemes.
Jacques Patarin
2000
conf/eurocrypt
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
Nicolas T. Courtois
Alexander Klimov
Jacques Patarin
Adi Shamir
1999
conf/ches
DES and Differential Power Analysis (The "Duplication" Method).
Louis Goubin
Jacques Patarin
1999
conf/eurocrypt
Unbalanced Oil and Vinegar Signature Schemes.
Aviad Kipnis
Jacques Patarin
Louis Goubin
1998
conf/fse
About Feistel Schemes with Six (or More) Rounds.
Jacques Patarin
1998
conf/eurocrypt
Improved Algorithms for Isomorphisms of Polynomials.
Jacques Patarin
Louis Goubin
Nicolas T. Courtois
1998
conf/asiacrypt
<sup>*</sup><sub>-+</sub> and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.
Jacques Patarin
Louis Goubin
Nicolas T. Courtois
1997
conf/ccs
Improved Security Bounds for Pseudorandom Permutations.
Jacques Patarin
1997
conf/icics
Trapdoor one-way permutations and multivariate polynominals.
Jacques Patarin
Louis Goubin
1997
conf/icics
Asymmetric cryptography with S-Boxes.
Jacques Patarin
Louis Goubin
1996
conf/crypto
Asymmetric Cryptography with a Hidden Monomial.
Jacques Patarin
1996
conf/eurocrypt
Low-Exponent RSA with Related Messages.
Don Coppersmith
Matthew K. Franklin
Jacques Patarin
Michael K. Reiter
1996
conf/eurocrypt
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms.
Jacques Patarin
1995
conf/crypto
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88.
Jacques Patarin
1994
conf/asiacrypt
Collisions and Inversions for Damgård's Whole Hash Function.
Jacques Patarin
1993
conf/crypto
Improved Algorithms for the Permuted Kernel Problem.
Jacques Patarin
Pascal Chauvaud
1993
conf/eurocrypt
How to Find and Avoid Collisions for the Knapsack Hash Function.
Jacques Patarin
1992
conf/eurocrypt
How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function.
Jacques Patarin
1991
conf/crypto
New Results on Pseudorandom Permutation Generators Based on the DES Scheme.
Jacques Patarin
1991
conf/eurocrypt
The Knapsack Hash Function proposed at Crypto'89 can be broken.
Paul Camion
Jacques Patarin
1990
conf/esorics
Pseudorandom Permutations Based on the D.E.S. Scheme.
Jacques Patarin
Coauthors
Abishanka Saha
(1)
Adi Shamir
(1)
Alexander Klimov
(1)
Aline Gouget
(2)
Ambre Toulemonde
(2)
Audrey Montreuil
(1)
Aviad Kipnis
(1)
Avijit Dutta
(1)
Avradip Mandal
(1)
Benoît Cogliati
(4)
Côme Berbain
(3)
Don Coppersmith
(1)
Emmanuel Volte
(4)
Gilles Macario-Rat
(1)
Henri Gilbert
(1)
Jacques Patarin
(53)
Jean-Sébastien Coron
(2)
Joana Treger
(2)
Louis Goubin
(8)
Matthew K. Franklin
(1)
Maya Chartouny
(1)
Michael K. Reiter
(1)
Mridul Nandi
(1)
Nicolas T. Courtois
(6)
Pascal Chauvaud
(1)
Paul Camion
(1)
Robin Künzler
(1)
Rodolphe Lampe
(2)
Stefano Tessaro
(1)
Thomas Holenstein
(1)
Valérie Nachef
(7)
Yannick Seurin
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to