publications
recent publications in reversed chronological order
2026
-
Threshold Niederreiter: Chosen-Ciphertext Security and Improved Distributed Decoding
Des. Codes Cryptogr. to appear, (2026).
open access -
Blinding Post-Quantum Hash-and-Sign Signatures
In IEEE Symposium on Security and Privacy, SP 2026, San Francisco, CA, USA, May 18-20, 2026 IEEE, (2026).
open access
2025
-
Cryptographic Primitives in Quantum Idealized Models.
Thèse de doctorat. Sorbonne Université (2025).
open access -
Implementations of Post-Quantum Cryptography Algorithms Secured Against Physical Attacks.
Thèse de doctorat. Sorbonne Université (2025).
open access -
Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding
In Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part IV Springer, Lecture Notes in Computer Science, vol. 16248, pp. 436–465 (2025).
open access doi
winner of the Best Paper Award (Practice) -
Uncompressing Dilithium’s Public Key
In Advances in Cryptology - CRYPTO 2025 - 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part I (Yael Tauman Kalai, and Seny F. Kamara, eds), Springer, Lecture Notes in Computer Science, vol. 16000, pp. 417–443 (2025).
open access doi -
The May-Ozerov Algorithm for Syndrome Decoding is “Galactic”
IACR Comm. in Cryptology. 2, 1, (2025).
open access doi -
Breaking HuFu with 0 Leakage - A Side-Channel Analysis
In Constructive Approaches for Security Analysis and Design of Embedded Systems - First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings (Matthieu Rivain, and Pascal Sasdrich, eds), Springer, Lecture Notes in Computer Science, vol. 15952, pp. 93–116 (2025).
open access doi -
Simple Power Analysis Assisted Chosen Cipher-Text Attack on ML-KEM
In Constructive Approaches for Security Analysis and Design of Embedded Systems - First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings (Matthieu Rivain, and Pascal Sasdrich, eds), Springer, Lecture Notes in Computer Science, vol. 15952, pp. 3–26 (2025).
open access doi -
Compact Zero-Knowledge Arguments for Blum Integers
Theor. Comput. Sci. 1038, pp. 115155 (2025).
open access doi -
Finding a Polytope: A Practical Fault Attack Against Dilithium
In Public-Key Cryptography - PKC 2025 - 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025, Proceedings, Part I (Tibor Jager, and Jiaxin Pan, eds), Springer, Lecture Notes in Computer Science, vol. 15674, pp. 259–283 (2025).
open access doi
2024
-
Amélioration des algorithmes de crible. Application à la factorisation des entiers.
Thèse de doctorat. Université Paris-Saclay (2024).
open access -
Zero-knowledge arguments from secure multiparty computation.
Thèse de doctorat. Sorbonne Université (2024).
open access -
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
In 5th Conference on Information-Theoretic Cryptography, ITC 2024, August 14-16, 2024, Stanford, CA, USA (Divesh Aggarwal, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. 304, pp. 11:1–11:24 (2024).
open access doi -
Algorithm 1052: Evaluating a Boolean Polynomial on All Possible Inputs
ACM Trans. Math. Softw. 50, 4, pp. 28:1–28:37 (2024).
open access doi -
Preliminary Cryptanalysis of the Biscuit Signature Scheme
IACR Comm. in Cryptology. 1, 1, (2024).
open access doi -
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
IACR Comm. in Cryptology. 1, 1, (2024).
open access doi -
Secure Multi-Party Linear Algebra with Perfect Correctness
IACR Comm. in Cryptology. 1, 1, (2024).
open access doi -
Lattice attacks on pairing-based signatures
Inf. Secur. J. A Glob. Perspect. 33, 2, pp. 138-157 (2024).
open access doi