We are actively finding new and effective ways to ensure security through adequate and proper
research.
Selected publications of Boris TAKO FOUOTSA
[1] Andrea Basso,Mingjie Chen,Peter Kutas,Abel Laval,Laurane Marco,and Gustave Tchoffo Saah.(2024)Exploring SIDH-based Signature Parameters. To appear at ACNS 2024, 2024.https://eprint.iacr.org/2023/1906
[2] Andrea Basso,Giulio Codogni,Deirdre Connolly,Luca De Feo,Guido Maria Lido,Travis Morrison,Lorenz Panny,Sikhar Patranabis,and Benjamin Wesolowski.(2023)Supersingular curves you can trust. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part II, volume 14005 of LNCS, pages 405–437. Springer, Heidelberg, April 2023..https://link.springer.com/chapter/10.1007/978-3-031-30617-4_14
[3] Andrea Basso(2023)New SIDH Countermeasures for a More Efficient Key Exchange. To appear at ASIACRYT 2023, 2023..https://eprint.iacr.org/2023/791
[4] Jeremy Booher,Ross Bowden,Javad Doliskani,Steven D Galbraith,Sabrina Kunzweiler,Simon-Philipp Merz,Christophe Petit,Benjamin Smith,Katherine E Stange,Yan Bo Ti,Christelle Vincent,Jose Felipe Voloch,Charlotte Weitk¨amper,and Lucas Zobernig.(2022)Failing to hash into supersingular isogeny graphs. Extended abstract at CFAIL 2022, 2022..https://eprint.iacr.org/2022/518.pdf
[5] Luca De Feo,Cyprien Delpech de Saint Guilhem,Peter Kutas,Antonin Leroux,Christophe Petit,Javier Silva,and Benjamin Wesolowski. Seta(2021)from torsion attacks. In Mehdi Tibouchi and Huaxiong Wang, editors, ASIACRYPT 2021, Part IV, volume 13093 of LNCS, pages 249–278. Springer, Heidelberg, December 2021..https://link.springer.com/chapter/10.1007/978-3-030-92068-5_9
[6] Luca De Feo,Peter Kutas,Antonin Leroux,Simon-Philipp Merz,Lorenz Panny,and Benjamin Wesolowski.(2023)SCALLOP: Scaling the CSI-FiSh. In Alexandra Boldyreva and Vladimir Kolesnikov, editors, PKC 2023, Part I, volume 13940 of LNCS, pages 345–375. Springer, Heidelberg, May 2023..https://link.springer.com/chapter/10.1007/978-3-031-31368-4_13
[7] Peter Kutas,Simon-Philipp Merz,and Yan Bo Ti(2022)On the isogeny problem with torsion point information. In Goichiro Hanaoka, Junji Shikata, and Yohei Watanabe, editors, PKC 2022, Part I, volume 13177 of LNCS, pages 142–161. Springer, Heidelberg, March 2022..https://link.springer.com/chapter/10.1007/978-3-030-97121-2_6
[8] Tomoki Moriya,and Christophe Petit. M-SIDH and MD-SIDH(2023): Countering SIDH attacks by masking information. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part V, volume 14008 of LNCS, pages 282–309. Springer, Heidelberg, April 2023..https://link.springer.com/chapter/10.1007/978-3-031-30589-4_10
[3] Andrea Basso and Peter Kutas and Simon-Philipp Merz,and Antonio Sanso(2021)Cryptanalysis of an oblivious PRF from supersingular isogenies. To appear at ASIACRYPT 2021..https://eprint.iacr.org/2021/706
[5] Luca De Feo,Boris Fouotsa,Cyprien Delpech de Saint-Guilhem,Antonin Leroux,Peter Kutas,Javier Silva,Benjamin Wesolowski.Seta(2021): Supersingular encryption from torsion attacks. To appear at ASIACRYPT 2021..https://eprint.iacr.org/2019/1291
[8] Tako Boris Fouotsa,SimS(2021): A simplification of SiGamal. In Jung Hee Cheon and Jean-Pierre Tillich, editors, Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, pages 277–295. Springer, Heidelberg, 2021.https://dl.acm.org/doi/proceedings/10.1007/978-3-030-81293-5
[9] Peter Kutas,Simon-Philipp Merz,Charlotte Weitk¨amper(2021)One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols Advances in Cryptology - EUROCRYPT 2021, LNCS 12696, pp 242-271..https://eprint.iacr.org/2021/282
[10] Peter Kutas,Javier Silva(2020)Trapdoor DDH groups, revisited. Selected Areas in Cryptography - SAC 2020, LNCS 12804, pp 431-450..https://eprint.iacr.org/2019/1290
[11] Steven Galbraith; Robert Granger; Simon-Philipp Merz;(2020)On Index Calculus Algorithms for Subfield Curves. Selected Areas in Cryptography - SAC 2020, LNCS 12804, pp 115-138..https://eprint.iacr.org/2020/1315
[1] Nadia EL Mrabet(2015)Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography, In Codes, Cryptology, and Information Security. Vol 9084. pp 259-273, Springer, (2015).https://link.springer.com/chapter/10.1007/978-3-319-18681-8_21
[2] Loubna Ghammam(2016)Adequate Elliptic Curves for Computing the Product of n Pairings In Arithmetic of Finite Fields. Vol 10064. pp 36- 53 Springer, (2016).https://hal.science/hal-01548925
[9] Abderrahmane Nitaj(2019)A New Attack on RSA and Demytko’s Elliptic Curve Cryptosystem, In Journal of Discrete Mathematical Science and Cryptography, Vol. 22(3) , pp 391-409, Taylors and Francis, (2019).https://www.tandfonline.com/doi/abs/10.1080/09720529.2019.1587827
[13] Perez F. Lontouo,and Daniel Tieudjo(2020)Division Polynomials on the Hessian Model of Elliptic Curves. In Applicable Algebra in Engineering, Communication and Computing, Springer (2020) Vol. 34, Pages 1-16, DOI : 10.1007/s00200-020-00470-8.https://link.springer.com/article/10.1007/s00200-020-00470-8
[14] Anne Hanwa(2021)Elliptic divisibility sequences over the Edwards model of elliptic curves, In Journal of Discrete Mathematical Science and Cryptography, Taylor and Francis (2021) Vol. 25 (8) : https ://doi.org/10.1080/09720529.2020.1822042..https://www.tandfonline.com/doi/pdf/10.1080/09720529.2020.1822042
[16] Franck. Kamwa,and Herve Tale(2021): Generalization of low rank parity-check (LRPC) codes over the ring of integers modulo a positive integer; In Arabian Journal of Mathematics, Springer (2021) ; Vol. 10 (2), Pages 357-366, https ://doi.org/10.1007/s40065-021-00327- z..https://link.springer.com/article/10.1007/s40065-021-00327-z
[18] Nadia El Mrabet,Loubna Ghammam,and Nicolas Meloni(2022): New Versions of Miller-loop Secured against Side-Channel Attacks; In Arithmetic of Finite Field Springer (2022); Vol. 13638, pp 269-287; https://doi.org/10.1007/978-3-031-22944-2_17.https://link.springer.com/chapter/10.1007/978-3-031-22944-2_17
[20] Senegue Gomez Nyamsi,and Calvin Tcheka(2023): Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees 𝑘=5,7; In Discrete Mathematics, Algorithm and Applications. World Scientific (2023) https://doi.org/10.1142/S1793830923500544.https://www.worldscientific.com/doi/abs/10.1142/S1793830923500544
[21] Fobasso Tchinda Arnaud G,Celestin Nkuimi Jugnia(2023): A Polynomial Algorithm for Solving the Closest Vector Problem in Tensored Root Lattices of Type D, In SN Computer Science Springer (2023), Vol 4(19) https://doi.org/10.1007/s42979-022-01440-2.https://link.springer.com/article/10.1007/s42979-022-01440-2
[23] Kamwa Djomou Franck Rivel,and Tadmon Calvin(2023): Expanded low-rank parity-check codes and their application to cryptography, In CRYPTOLOGIA, Taylor and Francis (2023) https://doi.org/10.1080/01611194.2023.2202960.https://www.tandfonline.com/doi/abs/10.1080/01611194.2023.2202960
[1] Gaborit,P.,Otmani,A.(2017)(2017). Polynomial-time key recovery attack on the Faure–Loidreau scheme based on Gabidulin codes. Designs, Codes and Cryptography, 86(7), 1391–1403. https://doi.org/10.1007/s10623-017-0402-0.https://link.springer.com/article/10.1007/s10623-017-0402-0
[2] Otmani,A.,& Ndjeya(2017)Improved cryptanalysis of rank metric schemes based on Gabidulin codes. Designs, Codes and Cryptography, 86(9), 1983–1996. https://doi.org/10.1007/s10623-017-0434-5.https://link.springer.com/article/10.1007/s10623-017-0434-5
[5] Djomou,F. R. K.,& Fouotsa,E(2021)Generalization of low rank parity-check (LRPC) codes over the ring of integers modulo a positive integer. Arabian Journal of Mathematics, 10(2), 357–366. https://doi.org/10.1007/s40065-021-00327-z.https://link.springer.com/article/10.1007/s40065-021-00327-z
[6] Hermann Tchatchiem Kamche(2023)On the rank decoding problem over finite principal ideal rings. To appear in Advances in Mathematics of Communications, https://doi.org/10.3934/amc.2023003.https://www.aimsciences.org/article/doi/10.3934/amc.2023003
Selected publications of TCHATCHIEM KAMCHE Hermann
[1] C Mouaha(2019): Rank-metric codes over finite principal ideal rings and applications, In IEEE Transactions on Information Theory, Vol. 65(12) pp. 7718-7735, 2019.https://ieeexplore.ieee.org/document/8789543
Selected publications of Tony Mack Robert EZOME MINTSA
[1] Jean-Marc Couveignes(2023)Jean-Marc Couveignes and Tony Ezome: The equivariant complexity of multiplication in finite fields extensions. Journal of algebra, 622, 694-720 (2023), https://doi.org/10.1016/j.jalgebra.2023.01.022.https://www.sciencedirect.com/science/article/abs/pii/S0021869323000376