Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Code-Based Cryptography

    10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29–30, 2022, Revised Selected Papers

    Jean-Christophe Deneuville in Lecture Notes in Computer Science (2023)

  2. No Access

    Chapter and Conference Paper

    Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC

    While hardware implementations allow the production of highly efficient and performance-oriented designs, exploiting features such as parallelization, their longer time to code and implement often bottlenecks ...

    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion in Code-Based Cryptography (2023)

  3. No Access

    Article

    Cryptanalysis of a code-based full-time signature

    We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in the SHMWW scheme contains co...

    Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville in Designs, Codes and Cryptography (2021)

  4. No Access

    Article

    Cryptanalysis of a code-based one-time signature

    In 2012, Lyubashevsky introduced a new framework for building lattice-based signature schemes without resorting to any trapdoor [such as Gentry C, Peikert C, Vaikuntanathan V, in: Ladner and Dwork (eds) 40th A...

    Jean-Christophe Deneuville, Philippe Gaborit in Designs, Codes and Cryptography (2020)

  5. No Access

    Article

    Cryptanalysis of a rank-based signature with short public keys

    Following Schnorr framework for obtaining digital signatures, Song et al. recently proposed a new instantiation of a signature scheme featuring small public keys from coding assumptions in rank metric, which w...

    Nicolas Aragon, Olivier Blazy in Designs, Codes and Cryptography (2020)

  6. No Access

    Chapter and Conference Paper

    Who Let the \(\mathcal {DOGS}\) Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening

    Over the past two decades, group signature schemes have been developed and used to enable authenticated and anonymous peer-to-peer communications. Initial protocols rely on two main authorities, Issuer and Ope...

    Marina Dehez-Clementi in Data Privacy Management, Cryptocurrencies … (2020)

  7. No Access

    Chapter and Conference Paper

    Extending Atomic Cross-Chain Swaps

    Cryptocurrencies enable users to send and receive value in a trust-less manner. Unfortunately trading the associated assets usually happens on centralized exchange which becomes a trusted third party. This d...

    Jean-Yves Zie, Jean-Christophe Deneuville in Data Privacy Management, Cryptocurrencies … (2019)

  8. No Access

    Chapter and Conference Paper

    Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory

    We introduce Ouroboros (The Ouroboros symbol is an ancient symbol which represents the notion of cyclicity in many civilizations), a new Key Exchange protocol based on coding theory. The protocol gathers the b...

    Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor in Post-Quantum Cryptography (2017)

  9. No Access

    Chapter and Conference Paper

    Sealing the Leak on Classical NTRU Signatures

    Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some in...

    Carlos Aguilar Melchor, Xavier Boyen in Post-Quantum Cryptography (2014)