Follow
Antoine Joux
Antoine Joux
CISPA
Verified email at cispa.saarland
Title
Cited by
Cited by
Year
A one round protocol for tripartite Diffie–Hellman
A Joux
Journal of Cryptology 17 (4), 263-276, 2004
2109*2004
Multicollisions in iterated hash functions. Application to cascaded constructions
A Joux
Annual International Cryptology Conference, 306-316, 2004
6752004
Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases
JC Faugere, A Joux
Annual International Cryptology Conference, 44-60, 2003
5892003
Decoding random binary linear codes in 2 n/20: how 1+ 1= 0 improves information set decoding
A Becker, A Joux, A May, A Meurer
Annual International Conference on the Theory and Applications of …, 2012
4922012
Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups
A Joux, K Nguyen
Journal of cryptology 16 (4), 239-247, 2003
4822003
Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups
A Joux, K Nguyen
Journal of cryptology 16 (4), 239-247, 2003
4822003
Differential collisions in SHA-0
F Chabaud, A Joux
Annual International Cryptology Conference, 56-71, 1998
4771998
A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
R Barbulescu, P Gaudry, A Joux, E Thomé
Annual International Conference on the Theory and Applications of …, 2014
3842014
Improved low-density subset sum algorithms
MJ Coster, A Joux, BA LaMacchia, AM Odlyzko, CP Schnorr, J Stern
computational complexity 2 (2), 111-128, 1992
3671992
Collisions of SHA-0 and Reduced SHA-1
E Biham, R Chen, A Joux, P Carribault, C Lemuet, W Jalby
Annual International Conference on the Theory and Applications of …, 2005
3592005
The Weil and Tate pairings as building blocks for public key cryptosystems
A Joux
International Algorithmic Number Theory Symposium, 20-32, 2002
3292002
Algorithmic cryptanalysis
A Joux
CRC press, 2009
2482009
Lattice reduction: A toolbox for the cryptanalyst
A Joux, J Stern
Journal of Cryptology 11 (3), 161-185, 1998
2411998
Fast correlation attacks: An algorithmic point of view
P Chose, A Joux, M Mitton
International Conference on the Theory and Applications of Cryptographic …, 2002
2332002
A new index calculus algorithm with complexity L (1/4+ o (1)) in very small characteristic
A Joux
Cryptology ePrint Archive, Report 2013/095, 2013. http://eprint. iacr. org, 0
218*
New generic algorithms for hard knapsacks
N Howgrave-Graham, A Joux
Advances in Cryptology–EUROCRYPT 2010, 235-256, 2010
1822010
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method
A Joux, R Lercier
Mathematics of computation 72 (242), 953-967, 2003
1682003
The number field sieve in the medium prime case
A Joux, R Lercier, N Smart, F Vercauteren
Annual International Cryptology Conference, 326-344, 2006
1632006
Why textbook ElGamal and RSA encryption are insecure
D Boneh, A Joux, PQ Nguyen
International Conference on the Theory and Application of Cryptology and …, 2000
1542000
Encryption and authentication method and circuit for synchronous smart card
J Kowalski, M Martin, J Stern, A Joux
US Patent 5,825,882, 1998
1401998
The system can't perform the operation now. Try again later.
Articles 1–20