Dernières publications mises à jour
- Computing isogenies from modular equations in genus two, J. Kieffer, A. Page, D. Robert.
- Correct Rounding in Double Extended Precision, S. Corbineau, P. Zimmermann.
- FastTwoSum revisited, C.-P. Jeannerod, P. Zimmermann.
- Breaking verifiability and vote privacy in CHVote, V. Cortier, A. Debant, P. Gaudry.
- Provable randomness over lightweight permutations, J. Di Mauro, H. Boukkerou, G. Millerioux, M. Minier, T. Stoll.
- Note on FastTwoSum with Directed Roundings, S. Corbineau, P. Zimmermann.
- Monitoring the execution of cryptographic functions, M. Amet, O. Ben Moussa, G. Bonfante, S. Duval.
- The asymptotic distribution of Elkies primes for reductions of abelian varieties is Gaussian, A. Benoist, J. Kieffer.
- Block Cipher Doubling for a Post-Quantum World, R. Bhaumik, A. Chailloux, P. Frixons, B. Mennink, M. Naya-Plasencia.
- Discrete Logarithm Factory, H. Al Aswad, C. Pierrot, E. Thomé.
- A Note on Related-Tweakey Impossible Differential Attacks, X. Bonnetain, V. Lallemand.
- A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level, D.F. Aranha, G. Fotiadis, A. Guillevic.
- Belenios with cast-as-intended: towards a usable interface, V. Cortier, P. Gaudry, A. Goetschmann, S. Lemonnier.
- Accuracy of Complex Mathematical Operations and Functions in Single and Double Precision, P. Caprioli, V. Innocente, P. Zimmermann.
- Morphisms of Drinfeld Modules and their Algorithms, A. Leudière.
- Single-Query Quantum Hidden Shift Attacks, X. Bonnetain, A. Schrottenloher.
- Quantum Lattice Enumeration in Limited Depth, N. Bindel, X. Bonnetain, M. Tiepelt, F. Virdia.
- Improving Generic Attacks Using Exceptional Functions, X. Bonnetain, R. Heim Boissier, G. Leurent, A. Schrottenloher.
- Accuracy of Mathematical Functions in Single, Double, Double Extended, and Quadruple Precision, B. Gladman, V. Innocente, J. Mather, P. Zimmermann.
- Quadratic Short Division, J. Sukop, P. Zimmermann.