Conference presentations and public lectures

  1. Pierre-Louis Cayrel gave an invited lecture on code-based cryptography in AFRICAN MATHEMATICAL SCHOOL, Cameroon (website : http://httcbambili.com/AMS/)
  2. Pierre-Louis Cayrel gave an invited lecture on code-based cryptography in AIMS, Senegal (website : http://www.aims-senegal.org/)
  3. Vlad Dragoi, Pierre-Louis Cayrel , Brice Colombier and Tania Richmond: Polynomial structures in code-based cryptography, Indocrypt 2013
  4. Daniel Genkin, Adi Shamir, Eran Tromer: RSA Key Extraction​ via Low-Bandwidth Acoustic Cryptanalysis, Advances in Cryptology - CRYPTO 2014
  5. Daniel Genkin, Itamar Pipman and Eran Tromer: Get your hands off my laptop: physical side-channel key-extraction attacks on PCs, CHES 2014
  6. P.-L. Cayrel, M. Meziani, O. Ndiaye et  Q. Santos: Efficient Software Implementations of Code-based Hash Functions and Stream-Ciphers, Proceedings of WAIFI 2014
  7. Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer: Circuits resilient to additive attacks with applications to secure computation, 2014 ACM Symposium on Theory of Computing, STOC '14, ACM, 2014
  8. ​Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt: Differential Power Analysis of a McEliece Cryptosystem, Proc. ACNS 2015
  9. Cong Chen, Thomas Eisenbarth, Ingo von Maurich and Rainer Steinwandt: Masking Large Keys in Hardware: A Masked Implementation of McEliece, 22nd International Conference on Selected Areas in Cryptography (SAC 2015
  10. Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer: Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation, CHES 2015
  11. M. Petrvalsky, T. Richmond, M. Drutarovsky, P.-L. Cayrel and V. Fischer: Countermeasure against the SPA Attack on an Embedded McEliece Cryptosystem, Radioelektronika 2015, 25th International IEEE Conference
  12.  T. Richmond, M. Petrvalsky and M. Drutarovsky: A Side-Channel Attack Against the Secret Permutation on an Embedded McEliece Cryptosystem, TRUDEVICE 2015, Grenoble (France), Mars 2015,
  13. N. Chikouche, F. Cherif, P.-L. Cayrel and M. Benmohammed: Weaknesses in Two RFID Authentication Protocols, C2SI 2015,
  14. Markus Grassl, Brandon Langenberg, Martin Roetteler, and Rainer Steinwandt: Applying Grover’s algorithm to AES: quantum resource estimates, PQCrypto 2016,
  15. P.-L. Cayrel, M. Meziani and O. Ndiaye: SBS : A Fast and Provably Secure Code-Based Stream Cipher, ICCC 2015
  16. P.-L. Cayrel, M. Meziani, O. Ndiaye, R. Lindner and R. Silva: A Pseudorandom Number Generator Based on Worst-Case Lattice Problem, ICCC 2015
  17. Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Trome: rECDH key-extraction via low-bandwidth electromagnetic attacks on PCs, RSA Conference Cryptographers' Track (CT-RSA) 2016,
  18. Andrej Boledovič and Juraj Varga: Practical Implementation of McEliece Cryptosystem on Android, 16th Central European Conference on Cryptology (CECC 2016), June 22-24, Piešťany, Slovakia
  19. Otokar Grošek and Viliam Hromada: On Generation of Error Vectors, 16th Central European Conference on Cryptology (CECC 2016), June 22-24, Piešťany, Slovakia
  20. Yuval Yarom, Daniel Genkin, Nadia Heninger: CacheBleed: a timing attack on OpenSSL constant time RSA, Workshop on Cryptographic Hardware and Embedded Systems CHES 2016
  21. H. Moufek, R. Mahdjoubi, P.-L. Cayrel and K. Guenda, New GPT cryptosystem based on the (u|u+v)-construction codes, ICCC 2015, ICCC 2015, the Sixth International Conference on Computational Creativity (ICCC 2015). Park City, Utah, June 29 – July 2, 2015. 
  22. P.-L. Cayrel, K. Diagne and C. T.Gueye: NP-completeness of the coset weight problem for quasi-dyadic codes, ICCC 2015, the Sixth International Conference on Computational Creativity (ICCC 2015). Park City, Utah, June 29 – July 2, 2015.
  23. Rainer Steinwandt: Understanding the cost of Grover's algorithm for finding a secret key, Workshop on Secure Implementation of Post-Quantum Cryptography, Tel Aviv University Israel, Sep 26 – 27, 2016
  24. Pierre-Louis Cayrel: Our results in side-channel analysis of the McEliece PKC using binary Goppa codes and more general results in code-based cryptography, software implementations and secure designs, Workshop on Secure Implementation of Post-Quantum Cryptography, Tel Aviv University Israel, Sep 26 – 27, 2016
  25. Eran Tromer: Physical Side Channel Attacks on PCs, Workshop on Secure Implementation of Post-Quantum Cryptography, Tel Aviv University Israel, Sep 26 – 27, 2016
  26. Pavol Zajac: McEliece in practice, Workshop on Secure Implementation of Post-Quantum Cryptography, Tel Aviv University Israel, Sep 26 – 27, 2016
  27. Viliam Hromada: Side channel analysis of McEliece cryptosystem, Workshop on Secure Implementation of Post-Quantum Cryptography, Tel Aviv University Israel, Sep 26 – 27, 2016