Charles Bouillaguet
Charles Bouillaguet
CRIStAL, university of Lille
Verified email at univ-lille.fr - Homepage
TitleCited byYear
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
842008
Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key
A Biryukov, C Bouillaguet, D Khovratovich
International Conference on the Theory and Application of Cryptology and …, 2014
772014
Automatic search of attacks on round-reduced AES and applications
C Bouillaguet, P Derbez, PA Fouque
Annual Cryptology Conference, 169-187, 2011
672011
Using first-order theorem provers in the Jahob data structure verification system
C Bouillaguet, V Kuncak, T Wies, K Zee, M Rinard
International Workshop on Verification, Model Checking, and Abstract …, 2007
602007
Low-data complexity attacks on AES
C Bouillaguet, P Derbez, O Dunkelman, PA Fouque, N Keller, V Rijmen
IEEE Transactions on Information Theory 58 (11), 7002-7017, 2012
582012
Fast Exhaustive Search for Polynomial Systems in
C Bouillaguet, HC Chen, CM Cheng, T Chou, R Niederhagen, A Shamir, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 203-218, 2010
552010
Herding, second preimage and trojan message attacks beyond Merkle-Damgård
E Andreeva, C Bouillaguet, O Dunkelman, J Kelsey
International Workshop on Selected Areas in Cryptography, 393-414, 2009
322009
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem
C Bouillaguet, JC Faugère, PA Fouque, L Perret
International Workshop on Public Key Cryptography, 473-493, 2011
302011
Another look at complementation properties
C Bouillaguet, O Dunkelman, G Leurent, PA Fouque
International Workshop on Fast Software Encryption, 347-364, 2010
29*2010
New insights on impossible differential cryptanalysis
C Bouillaguet, O Dunkelman, PA Fouque, G Leurent
International Workshop on Selected Areas in Cryptography, 243-259, 2011
242011
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29 (4), 657-696, 2016
202016
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512
C Bouillaguet, O Dunkelman, G Leurent, PA Fouque
International Workshop on Selected Areas in Cryptography, 18-35, 2010
202010
Security Analysis of SIMD
C Bouillaguet, PA Fouque, G Leurent
International Workshop on Selected Areas in Cryptography, 351-368, 2010
202010
Graph-theoretic algorithms for the “Isomorphism of Polynomials” problem
C Bouillaguet, PA Fouque, A Véber
Annual International Conference on the Theory and Applications of …, 2013
192013
A family of weak keys in HFE and the corresponding practical key-recovery
C Bouillaguet, PA Fouque, A Joux, J Treger
Journal of Mathematical Cryptology 5 (3-4), 247-275, 2012
162012
Fast Exhaustive Search for Quadratic Systems in on FPGAs
C Bouillaguet, CM Cheng, T Chou, R Niederhagen, BY Yang
International Conference on Selected Areas in Cryptography, 205-222, 2013
122013
Practical key-recovery for all possible parameters of SFLASH
C Bouillaguet, PA Fouque, G Macario-Rat
International Conference on the Theory and Application of Cryptology and …, 2011
122011
Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques
C Bouillaguet, PA Fouque
International Workshop on Selected Areas in Cryptography, 245-261, 2008
102008
Revisiting and improving algorithms for the 3XOR problem
C Bouillaguet, C Delaplace, PA Fouque
IACR Transactions on Symmetric Cryptology, 254-276, 2018
92018
Sparse gaussian elimination modulo p: An update
C Bouillaguet, C Delaplace
International Workshop on Computer Algebra in Scientific Computing, 101-116, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20