Antoine Joux
Antoine Joux
Fondation Sorbonne Université, IMJ-PRG
Adresse e-mail validée de imj-prg.fr
TitreCitée parAnnée
A one round protocol for tripartite Diffie–Hellman
A Joux
Journal of Cryptology 17 (4), 263-276, 2004
1736*2004
Multicollisions in iterated hash functions. Application to cascaded constructions
A Joux
Annual International Cryptology Conference, 306-316, 2004
5792004
Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases
JC Faugere, A Joux
Annual International Cryptology Conference, 44-60, 2003
4682003
Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups
A Joux, K Nguyen
Journal of cryptology 16 (4), 239-247, 2003
4252003
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups.
A Joux, K Nguyen
IACR Cryptology ePrint Archive 2001, 3, 2001
425*2001
Differential collisions in SHA-0
F Chabaud, A Joux
Annual International Cryptology Conference, 56-71, 1998
4161998
Collisions of SHA-0 and Reduced SHA-1
E Biham, R Chen, A Joux, P Carribault, C Lemuet, W Jalby
Annual International Conference on the Theory and Applications of …, 2005
3242005
Improved low-density subset sum algorithms
MJ Coster, A Joux, BA LaMacchia, AM Odlyzko, CP Schnorr, J Stern
computational complexity 2 (2), 111-128, 1992
3111992
A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
R Barbulescu, P Gaudry, A Joux, E Thomé
Annual International Conference on the Theory and Applications of …, 2014
2972014
The Weil and Tate pairings as building blocks for public key cryptosystems
A Joux
International Algorithmic Number Theory Symposium, 20-32, 2002
2902002
Decoding random binary linear codes in 2 n/20: how 1+ 1= 0 improves information set decoding
A Becker, A Joux, A May, A Meurer
Annual International Conference on the Theory and Applications of …, 2012
2622012
Lattice reduction: A toolbox for the cryptanalyst
A Joux, J Stern
Journal of Cryptology 11 (3), 161-185, 1998
2031998
Fast correlation attacks: An algorithmic point of view
P Chose, A Joux, M Mitton
International Conference on the Theory and Applications of Cryptographic …, 2002
1782002
A new index calculus algorithm with complexity L (1/4+ o (1)) in very small characteristic
A Joux
Cryptology ePrint Archive, Report 2013/095, 2013. http://eprint. iacr. org, 0
162*
Algorithmic cryptanalysis
A Joux
Chapman and Hall/CRC, 2009
1572009
Encryption and authentication method and circuit for synchronous smart card
J Kowalski, M Martin, J Stern, A Joux
US Patent 5,825,882, 1998
1401998
Why textbook ElGamal and RSA encryption are insecure
D Boneh, A Joux, PQ Nguyen
International Conference on the Theory and Application of Cryptology and …, 2000
1282000
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method
A Joux, R Lercier
Mathematics of computation 72 (242), 953-967, 2003
1272003
The number field sieve in the medium prime case
A Joux, R Lercier, N Smart, F Vercauteren
Annual International Cryptology Conference, 326-344, 2006
1252006
The function field sieve in the medium prime case
A Joux, R Lercier
Annual International Conference on the Theory and Applications of …, 2006
1122006
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20