His primary areas of study are Theoretical computer science, Cryptography, Algorithm, Cryptanalysis and Public-key cryptography. His work carried out in the field of Theoretical computer science brings together such families of science as Key, Key recovery, Block cipher, Preimage attack and Masking. His studies deal with areas such as Discrete logarithm and Reduction as well as Cryptography.
His Algorithm research is multidisciplinary, incorporating perspectives in Authentication protocol and Elliptic curve. His Cryptanalysis research integrates issues from Discrete mathematics, Signature, NESSIE and Smart card. A significant part of his Public-key cryptography research incorporates Encryption and Computer security studies.
Pierre-Alain Fouque mostly deals with Theoretical computer science, Cryptography, Algorithm, Discrete mathematics and Computer security. The various areas that he examines in his Theoretical computer science study include Cryptographic hash function, SHA-2, Hash function, Discrete logarithm and Block cipher. His study in Block cipher is interdisciplinary in nature, drawing from both Stream cipher and Arithmetic.
His Cryptography study combines topics in areas such as Adversary, Key, Elliptic Curve Digital Signature Algorithm and Encryption. His work in the fields of Algorithm, such as Cryptanalysis, intersects with other areas such as Subset sum problem. His study explores the link between Discrete mathematics and topics such as Elliptic curve that cross with problems in Elliptic curve cryptography.
His main research concerns Cryptography, Computer security, Key exchange, Side channel attack and Encryption. His biological study spans a wide range of topics, including Masking, Theoretical computer science and Composability. His work is dedicated to discovering how Computer security, Handshake are connected with Cryptographic primitive, Adversary and Firewall and other disciplines.
His Key exchange study also includes fields such as
Pierre-Alain Fouque mainly focuses on Encryption, Cryptography, Computer security, Side channel attack and Implementation. His Encryption research incorporates elements of Discrete mathematics, Time complexity and Scheme. His research in Cryptography intersects with topics in Lattice and Theoretical computer science.
His work in the fields of Computer security, such as Provable security and Public-key cryptography, overlaps with other areas such as Information technology. His Side channel attack research includes elements of Learning with errors, Reduction, Combinatorics and Modular design. His research integrates issues of Software and Masking in his study of Implementation.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Password-Based authenticated key exchange in the three-party setting
Michel Abdalla;Pierre-Alain Fouque;David Pointcheval.
public key cryptography (2005)
Practical multi-candidate election system
Olivier Baudron;Pierre-Alain Fouque;David Pointcheval;Jacques Stern.
principles of distributed computing (2001)
Sharing Decryption in the Context of Voting or Lotteries
Pierre-Alain Fouque;Guillaume Poupard;Jacques Stern.
financial cryptography (2000)
The Doubling Attack - Why Upwards Is Better than Downwards
Pierre-Alain Fouque;Frederic Valette.
cryptographic hardware and embedded systems (2003)
An improved LPN algorithm
Eric Levieil;Pierre-Alain Fouque.
Lecture Notes in Computer Science (2006)
Practical cryptanalysis of SFLASH
Vivien Dubois;Pierre-Alain Fouque;Adi Shamir;Jacques Stern.
international cryptology conference (2007)
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez;Pierre-Alain Fouque;Pierre-Alain Fouque;Jérémy Jean.
international cryptology conference (2013)
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Pierre-Alain Fouque;David Pointcheval.
international conference on the theory and application of cryptology and information security (2001)
Anomaly Detection in Streams with Extreme Value Theory
Alban Siffer;Pierre-Alain Fouque;Alexandre Termier;Christine Largouet.
knowledge discovery and data mining (2017)
Strong Non-Interference and Type-Directed Higher-Order Masking
Gilles Barthe;Sonia Belaïd;François Dupressoir;Pierre-Alain Fouque.
computer and communications security (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: