PERRET Ludovic
Maître de Conférences [HDR]
Équipe : PolSys
Tel: 01 44 27 87 59, Ludovic.Perret (at) nulllip6.fr
https://lip6.fr/Ludovic.Perret
Équipe : PolSys
- Sorbonne Université - LIP6
Boîte courrier 169
Couloir 26-00, Étage 3, Bureau 323
4 place Jussieu
75252 PARIS CEDEX 05
Tel: 01 44 27 87 59, Ludovic.Perret (at) nulllip6.fr
https://lip6.fr/Ludovic.Perret
1 Doctorant (Direction de recherche / Co-encadrement)
- MOREIRA FERREIRA River : Conception et Cryptanalyse en Cryptographie Post-Quantique
Publications 2006-2024
-
2024
- L. Bettale, D. Kahrobaei, L. Perret, J. Verbel : “Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials”, Applied Cryptography and Network Security (ACNS), vol. 14583, Lecture Notes in Computer Science, Abu Dhabi, United Arab Emirates, pp. 457-486, (Springer Nature Switzerland) (2024)
- L. Perret, R. Moreira Ferreira : “Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV”, (2024)
-
2023
- D. Kahrobaei, C. Monetta, L. Perret, M. Tota, M. Vigorito : “Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups”, (2023)
- Ch. Battarbee, L. Perret, Siamak F. Shahandashti, D. Kahrobaei : “SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures”, PQCrypto 2023 - The 14th International Conference on Post-Quantum Cryptography, College Park, MD, United States (2023)
- L. Bettale, L. Perret, D. Kahrobaei, J. Verbel : “Biscuit: Shorter MPC-based Signature from PoSSo”, (2023)
-
2022
- Ch. Battarbee, D. Kahrobaei, L. Perret, S. Shahandashti : “A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem”, NIST Fourth PQC Standardization Conference, On-line conference, United States (2022)
- J.‑Ch. Faugère, J. Patarin, L. Perret, G. Macario‑Rat : “A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV”, (2022)
-
2021
- M. Bender, J.‑Ch. Faugère, L. Perret, E. Tsigaridas : “A nearly optimal algorithm to decompose binary forms”, Journal of Symbolic Computation, vol. 105, pp. 71-96, (Elsevier) (2021)
- O. Chakraborty, J.‑Ch. Faugère, L. Perret : “Cryptanalysis of the extension field cancellation cryptosystem”, Designs, Codes and Cryptography, vol. 89 (6), pp. 1335-1364, (Springer Verlag) (2021)
-
2019
- W. Beullens, J.‑Ch. Faugère, E. Koussa, G. Macario‑Rat, J. Patarin, L. Perret : “PKP-Based Signature Scheme”, Progress in Cryptology -- INDOCRYPT 2019, vol. 11898, Lecture Notes in Computer Science, Hyderabad, India, pp. 3-22, (Springer International Publishing), (ISBN: 978-3-030-35423-7) (2019)
- J.‑Ch. Faugère, K. Horan, D. Kahrobaei, M. Kaplan, E. Kashefi, L. Perret : “Fast Quantum Algorithm for Solving Multivariate Quadratic Equations”, (2019)
- M. Conde Pena, R. Durán Díaz, J.‑Ch. Faugère, L. Hernández Encinas, L. Perret : “Non-quantum cryptanalysis of the noisy version of Aaronson–Christiano’s quantum money scheme”, IET Information Security, vol. 13 (4), pp. 362-366, (Institution of Engineering and Technology) (2019)
- J.‑Ch. Faugère, L. Perret, J. Ryckeghem : “Software Toolkit for HFE-based Multivariate Schemes”, CHES 2019 : International Conference on Cryptographic Hardware and Embedded Systems, vol. 2019 (3), IACR Transactions on Cryptographic Hardware and Embedded Systems, Atlanta, United States, pp. 257-304 (2019)
-
2017
- O. Chakraborty, J.‑Ch. Faugère, L. Perret : “CFPKM : A Key Encapsulation Mechanism based on Solving System of non-linear multivariate Polynomials”, (2017)
- J.‑Ch. Faugère, L. Perret, J. Ryckeghem : “DualModeMS: A Dual Mode for Multivariate-based Signature”, (2017)
- A. Casanova, J.‑Ch. Faugère, G. Macario‑Rat, J. Patarin, L. Perret, J. Ryckeghem : “GeMSS: A Great Multivariate Short Signature”, 1-4 pages (2017)
-
2016
- L. Perret : “Gröbner Bases Techniques in Quantum-Safe Cryptography”, habilitation à diriger des recherches, soutenance 12/12/2016 (2016)
- J.‑Ch. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.‑P. Tillich : “Structural Cryptanalysis of McEliece Schemes with Compact Keys”, Designs, Codes and Cryptography, vol. 79 (1), pp. 87-112, (Springer Verlag) (2016)
- M. Bender, J.‑Ch. Faugère, L. Perret, E. Tsigaridas : “A Superfast Randomized Algorithm to Decompose Binary Forms”, ISSAC '16 - 41st International Symposium on Symbolic and Algebraic Computation, Waterloo, Canada, pp. 79-86, (ACM) (2016)
- J.‑Ch. Faugère, A. Otmani, L. Perret, F. De Portzamparc, J.‑P. Tillich : “Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups”, IEEE Transactions on Information Theory, vol. 62 (1), pp. 184-198, (Institute of Electrical and Electronics Engineers) (2016)
-
2015
- J. Berthomieu, J.‑Ch. Faugère, L. Perret : “Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials: The Regular Case”, Journal of Complexity, vol. 31 (4), pp. 590-616, (Elsevier) (2015)
- J.‑Ch. Faugère, D. Gligoroski, L. Perret, S. Simona, E. Thomae : “A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems”, IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'15), Maryland, United States (2015)
- M. Conde Pena, J.‑Ch. Faugère, L. Perret : “Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case”, IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'15), Maryland, United States (2015)
- M. Albrecht, C. Cid, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “On the complexity of the BKW algorithm on LWE”, Designs, Codes and Cryptography, vol. 74 (2), pp. 26, (Springer Verlag) (2015)
-
2014
- M. Albrecht, C. Cid, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “Algebraic Algorithms for LWE Problems”, (2014)
- J.‑Ch. Faugère, L. Perret, F. De Portzamparc : “Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form”, Advances in Cryptology Asiacrypt 2014, vol. 8873, Lecture Notes in Computer Science, Kaohsiung, Taiwan, Province of China, pp. 21-41, (Springer) (2014)
- J.‑Ch. Faugère, D. Gómez‑Pérez, J. Gutierrez, L. Perret : “Mathematical and computer algebra techniques in cryptology”, Journal of Symbolic Computation, vol. 64, pp. 1-88, (Elsevier) (2014)
- M. Albrecht, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret, Y. Todo, K. Xagawa : “Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions”, PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, (Springer) (2014)
- M. Albrecht, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “Lazy Modulus Switching for the BKW Algorithm on LWE”, Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, (Springer) (2014)
- J.‑Ch. Faugère, L. Perret, F. De Portzamparc, A. Otmani, J.‑P. Tillich : “Structural weakness of compact variants of the McEliece cryptosystem”, IEEE International Symposium on Information Theory - ISIT 2014, Honolulu, United States, pp. 1717-1721 (2014)
-
2013
- J.‑Ch. Faugère, V. Gauthier‑Umana, A. Otmani, L. Perret, J.‑P. Tillich : “A Distinguisher for High Rate McEliece Cryptosystems”, IEEE Transactions on Information Theory, vol. 59 (10), pp. 6830-6844, (Institute of Electrical and Electronics Engineers) (2013)
- L. Bettale, J.‑Ch. Faugère, L. Perret : “Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic”, Designs, Codes and Cryptography, vol. 69 (1), pp. 1-52, (Springer Verlag) (2013)
-
2012
- Martin R. Albrecht, C. Cid, J.‑Ch. Faugère, L. Perret : “On the relation between the MXL family of algorithms and Gröbner basis algorithms”, Journal of Symbolic Computation, vol. 47 (8), pp. 926-941, (Elsevier) (2012)
- L. Bettale, J.‑Ch. Faugère, L. Perret : “Solving Polynomial Systems over Finite Fields: Improved Analysis of the Hybrid Approach”, ISSAC 2012 - 37th International Symposium on Symbolic and Algebraic Computation, Grenoble, France, pp. 67-74, (ACM) (2012)
- M. Albrecht, C. Cid, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “On the Complexity of the BKW Algorithm on LWE”, SCC 2012 -- Third international conference on Symbolic Computation and Cryptography, Castro Urdiales, Spain, pp. 100-107 (2012)
- M. Albrecht, C. Cid, J.‑Ch. Faugère, R. Fitzpatrick, L. Perret : “On the complexity of the Arora-Ge Algorithm against LWE”, SCC 2012 -- Third international conference on Symbolic Computation and Cryptography, Castro Urdiales, Spain, pp. 93-99 (2012)
- J.‑Ch. Faugère, L. Perret, Ch. Petit, G. Renault : “Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields”, Eurocrypt 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 7237, Lecture Notes in Computer Science, Cambridge, United Kingdom, pp. 27-44, (Springer) (2012)
- D. Lin, J.‑Ch. Faugère, L. Perret, T. Wang : “On enumeration of polynomial equivalence classes and their application to MPKC”, Finite Fields and Their Applications, vol. 18 (2), pp. 283-302, (Elsevier) (2012)
- D. Gligoroski, R. Ødegard, R. Jensen, L. Perret, J.‑Ch. Faugère, S. Knapskog, S. Markovski : “MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme”, Trusted Systems - The Third International Conference on Trusted Systems - INTRUST 2011, vol. 7222, Lecture Notes in Computer Science, Beijing, China, pp. 184-203, (Springer Verlag) (2012)
-
2011
- F. Armknecht, D. Augot, L. Perret, Ah. Sadeghi : “On Constructing Homomorphic Encryption Schemes from Coding Theory”, 13th IMA International Conference on Cryptography and Coding, vol. 7089, Lecture Notes in Computer Science, Oxford, United Kingdom, pp. 23-40, (Springer) (2011)
- M. Albrecht, J.‑Ch. Faugère, P. Farshim, L. Perret : “Polly Cracker, Revisited”, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, vol. 7073, Lecture Notes in Computer Science, Seoul, Korea, Republic of, pp. 179-196, (Springer) (2011)
- J.‑Ch. Faugère, V. Gauthier‑Umana, A. Otmani, L. Perret, J.‑P. Tillich : “A distinguisher for high rate McEliece cryptosystems”, ITW 2011- IEEE Information Theory Workshop, Paraty, Brazil, pp. 282-286, (IEEE) (2011)
- M. Albrecht, C. Cid, Th. Dulien, J.‑Ch. Faugère, L. Perret : “Algebraic Precomputations in Differential Cryptanalysis”, Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Revised Selected Papers, vol. 6584, Lecture Notes in Computer Science, Shanghai, China, pp. 387-403, (Springer Berlin / Heidelberg) (2011)
- L. Bettale, J.‑Ch. Faugère, L. Perret : “Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants”, Public Key Cryptography - PKC 2011, vol. 6571, Lecture Notes in Computer Science, Taormina, Italy, pp. 441-458, (Springer Berlin / Heidelberg) (2011)
- Ch. Bouillaguet, J.‑Ch. Faugère, P.‑A. Fouque, L. Perret : “Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial With One Secret Problem”, 14th IACR International Conference on Practice and Theory of Public Key Cryptography - PKC 2011, vol. 6571, Lecture Notes in Computer Science, Taormina, Italy, pp. 473-493, (Springer) (2011)
-
2010
- J.‑Ch. Faugère, R. Ødegard, L. Perret, D. Gligoroski : “Analysis of the MQQ Public Key Cryptosystem”, Cryptology and Network Security, vol. 6467, Lecture Notes in Computer Science, Kuala Lumpur, Malaysia, pp. 169-183, (Springer Berlin / Heidelberg) (2010)
- J.‑Ch. Faugère, A. Otmani, L. Perret, J.‑P. Tillich : “A Distinguisher for High Rate McEliece Cryptosystem -- Extended Abstract”, Yet Another Conference on Cryptography, YACC 2010, Porquerolles, France, pp. 1-4 (2010)
- J.‑Ch. Faugère, A. Otmani, L. Perret, J.‑P. Tillich : “Algebraic Cryptanalysis of McEliece Variants with Compact Keys -- Toward a Complexity Analysis”, Yet Another Conference on Cryptography, YACC 2010, Porquerolles, France, pp. 1-4 (2010)
- J.‑Ch. Faugère, A. Joux, L. Perret, J. Treger : “Cryptanalysis of the Hidden Matrix Cryptosystem”, Progress in Cryptology - LATINCRYPT 2010, vol. 6212, Lecture Notes in Computer Science, Puebla, Mexico, pp. 241-254, (Springer Berlin / Heidelberg) (2010)
- J.‑Ch. Faugère, J. Gathen, L. Perret : “Decomposition of Generic Multivariate Polynomials”, ISSAC '10: Proceedings of the 2010 international symposium on Symbolic and algebraic computation, Munich, Germany, pp. 131-137, (ACM) (2010)
- J.‑Ch. Faugère, A. Otmani, L. Perret, J.‑P. Tillich : “Algebraic Cryptanalysis of McEliece Variants with Compact Keys -- Toward a Complexity Analysis”, SCC '10: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography, London, United Kingdom, pp. 45-55 (2010)
- M. Albrecht, C. Cid, Th. Dulien, J.‑Ch. Faugère, L. Perret : “Algebraic Precomputations in Differential Cryptanalysis”, Tools'10: Proceedings of the Workshop on Tools for Cryptanalysis 2010, London, United Kingdom, pp. 37-50, (Ecrypt II) (2010)
- J.‑Ch. Faugère, R. Ødegard, L. Perret, D. Gligoroski : “Analysis of the MQQ Public Key Cryptosystem”, SCC'10: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography, Londres, United Kingdom, pp. 101-116 (2010)
- L. Bettale, J.‑Ch. Faugère, L. Perret : “Hybrid Approach : a Tool for Multivariate Cryptography”, Tools'10: Proceedings of the Workshop on Tools for Cryptanalysis 2010, London, United Kingdom, pp. 15-23, (Ecrypt II) (2010)
- L. Bettale, J.‑Ch. Faugère, L. Perret : “Hybrid approach for solving multivariate systems over finite fields”, Journal of Mathematical Cryptology, vol. 3 (3), pp. 177-197, (De Gruyter) (2010)
- F. Levy‑dit‑Vehel, L. Perret : “Security Analysis of Word Problem-Based Cryptosystems”, Designs, Codes and Cryptography, vol. 54 (1), pp. 29-41, (Springer Verlag) (2010)
- J.‑Ch. Faugère, A. Otmani, L. Perret, J.‑P. Tillich : “Algebraic Cryptanalysis of McEliece Variants with Compact Keys”, Eurocrypt 2010 - 29th International Conference on Cryptology, vol. 6110, Lecture Notes in Computer Science, Monaco, Monaco, pp. 279-298, (Springer Verlag) (2010)
- J.‑Ch. Faugère, L. Perret : “Symbolic Computation and Cryptography”, vol. 3 (2), Mathematics in Computer Science, 127-224 pages, (Birkhäuser and Springer) (2010)
-
2009
- D. Augot, J.‑Ch. Faugère, L. Perret : “Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics”, Journal of Symbolic Computation, vol. 44, pp. 1605-1724, (Elsevier) (2009)
- J.‑Ch. Faugère, L. Perret : “Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages”, Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December, 2009, Revised Selected Papers, vol. 6151, Lecture Notes in Computer Science, Beijing, China, pp. 266-277, (Springer-Verlag) (2009)
- L. Bettale, J.‑Ch. Faugère, L. Perret : “Security Analysis of Multivariate Polynomials for Hashing”, Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Revised Selected Papers, vol. 5487, Lecture Notes in Computer Science, Beijing, China, pp. 115-124, (Springer-Verlag) (2009)
- J.‑Ch. Faugère, L. Perret : “An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography”, Journal of Symbolic Computation, vol. 44 (12), pp. 1676-1689, (Elsevier) (2009)
- J.‑Ch. Faugère, L. Perret, P.‑J. Spaenlehauer : “Algebraic-Differential Cryptanalysis of DES”, Western European Workshop on Research in Cryptology - WEWoRC 2009, Graz, Austria, pp. 1-5 (2009)
- J.‑Ch. Faugère, L. Perret : “High order derivatives and decomposition of multivariate polynomials”, ISSAC '09: Proceedings of the 2009 international symposium on Symbolic and algebraic computation, Seoul, Korea, Republic of, pp. 207-214, (ACM) (2009)
- F. Levy‑dit‑Vehel, M.‑G. Marinari, L. Perret, C. Traverso : “A Survey on Polly Cracker Systems”, chapter in Gröbner Bases, Coding, and Cryptography, pp. 285-305, (Springer), (ISBN: 978-3-540-93805-7) (2009)
- M. Sala, Sh. Sakata, T. Mora, C. Traverso, L. Perret : “Gröbner Bases, Coding, and Cryptography”, 1-430 pages, (Springer), (ISBN: 978-3-540-93805-7) (2009)
-
2008
- J.‑Ch. Faugère, L. Perret : “High order derivatives and decomposition of multivariate polynomials”, Second Workshop on Mathematical Cryptology, Santander, Spain, pp. 15-19 (2008)
- J.‑Ch. Faugère, F. Levy‑dit‑Vehel, L. Perret : “Cryptanalysis of MinRank”, Advances in Cryptology – CRYPTO 2008, vol. 5157, Lecture Notes in Computer Science, Santa Barbara, CA, United States, pp. 280-296, (Springer) (2008)
-
2007
- M. Sugita, M. Kawazoe, L. Perret, H. Imai : “Algebraic Cryptanalysis of 58-Round SHA-1”, Fast Software Encryption, 14th International Workshop, FSE, vol. 4593, Lecture Notes in Computer Science, Luxembourg, Luxembourg, pp. 349-365, (Springer) (2007)
-
2006
- J.‑Ch. Faugère, L. Perret : “Cryptanalysis of 2R-- schemes”, Advances in Cryptology CRYPTO 2006, vol. 4117, Lecture Notes in Computer Science, Santa Barbara, California, United States, pp. 357-372, (Springer-Verlag) (2006)
- J.‑Ch. Faugère, L. Perret : “Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects”, International Workshop on Post-Quantum Cryptography 2006, Louvain, Belgium, pp. 67-84 (2006)
- J.‑Ch. Faugère, L. Perret : “Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects”, EuroCrypt 2006 Advances in Cryptology, vol. 4004, Lecture Notes in Computer Science, Saint Petersburg, Russian Federation, pp. 30-47, (Springer-Verlag) (2006)