D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 38 Citations 6,904 214 World Ranking 6417 National Ranking 153

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Programming language
  • Algorithm

His primary areas of study are Theoretical computer science, Cryptography, Algorithm, Cryptanalysis and Public-key cryptography. His work carried out in the field of Theoretical computer science brings together such families of science as Key, Key recovery, Block cipher, Preimage attack and Masking. His studies deal with areas such as Discrete logarithm and Reduction as well as Cryptography.

His Algorithm research is multidisciplinary, incorporating perspectives in Authentication protocol and Elliptic curve. His Cryptanalysis research integrates issues from Discrete mathematics, Signature, NESSIE and Smart card. A significant part of his Public-key cryptography research incorporates Encryption and Computer security studies.

His most cited work include:

  • Password-Based authenticated key exchange in the three-party setting (419 citations)
  • Practical multi-candidate election system (275 citations)
  • Sharing Decryption in the Context of Voting or Lotteries (263 citations)

What are the main themes of his work throughout his whole career to date?

Pierre-Alain Fouque mostly deals with Theoretical computer science, Cryptography, Algorithm, Discrete mathematics and Computer security. The various areas that he examines in his Theoretical computer science study include Cryptographic hash function, SHA-2, Hash function, Discrete logarithm and Block cipher. His study in Block cipher is interdisciplinary in nature, drawing from both Stream cipher and Arithmetic.

His Cryptography study combines topics in areas such as Adversary, Key, Elliptic Curve Digital Signature Algorithm and Encryption. His work in the fields of Algorithm, such as Cryptanalysis, intersects with other areas such as Subset sum problem. His study explores the link between Discrete mathematics and topics such as Elliptic curve that cross with problems in Elliptic curve cryptography.

He most often published in these fields:

  • Theoretical computer science (29.39%)
  • Cryptography (23.27%)
  • Algorithm (24.49%)

What were the highlights of his more recent work (between 2017-2020)?

  • Cryptography (23.27%)
  • Computer security (18.37%)
  • Key exchange (6.53%)

In recent papers he was focusing on the following fields of study:

His main research concerns Cryptography, Computer security, Key exchange, Side channel attack and Encryption. His biological study spans a wide range of topics, including Masking, Theoretical computer science and Composability. His work is dedicated to discovering how Computer security, Handshake are connected with Cryptographic primitive, Adversary and Firewall and other disciplines.

His Key exchange study also includes fields such as

  • Computer security model which connect with Differential, Key schedule, Arithmetic and Block cipher,
  • SIGNAL which intersects with area such as Computer network,
  • Protocol that intertwine with fields like Provable security, Cache, Public-key cryptography, Server and Internet traffic. His studies in Encryption integrate themes in fields like Scheme and Heuristic. His Algorithm study integrates concerns from other disciplines, such as Point and Lattice.

Between 2017 and 2020, his most popular works were:

  • Practical Implementation of Ring-SIS/LWE Based Signature and IBE (17 citations)
  • Masking the GLP Lattice-Based Signature Scheme at Any Order (12 citations)
  • A Formal Treatment of Accountable Proxying Over TLS (12 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Programming language
  • Algebra

Pierre-Alain Fouque mainly focuses on Encryption, Cryptography, Computer security, Side channel attack and Implementation. His Encryption research incorporates elements of Discrete mathematics, Time complexity and Scheme. His research in Cryptography intersects with topics in Lattice and Theoretical computer science.

His work in the fields of Computer security, such as Provable security and Public-key cryptography, overlaps with other areas such as Information technology. His Side channel attack research includes elements of Learning with errors, Reduction, Combinatorics and Modular design. His research integrates issues of Software and Masking in his study of Implementation.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Password-Based authenticated key exchange in the three-party setting

Michel Abdalla;Pierre-Alain Fouque;David Pointcheval.
public key cryptography (2005)

748 Citations

Practical multi-candidate election system

Olivier Baudron;Pierre-Alain Fouque;David Pointcheval;Jacques Stern.
principles of distributed computing (2001)

411 Citations

Sharing Decryption in the Context of Voting or Lotteries

Pierre-Alain Fouque;Guillaume Poupard;Jacques Stern.
financial cryptography (2000)

410 Citations

The Doubling Attack - Why Upwards Is Better than Downwards

Pierre-Alain Fouque;Frederic Valette.
cryptographic hardware and embedded systems (2003)

263 Citations

An improved LPN algorithm

Eric Levieil;Pierre-Alain Fouque.
Lecture Notes in Computer Science (2006)

205 Citations

Practical cryptanalysis of SFLASH

Vivien Dubois;Pierre-Alain Fouque;Adi Shamir;Jacques Stern.
international cryptology conference (2007)

194 Citations

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting

Patrick Derbez;Pierre-Alain Fouque;Pierre-Alain Fouque;Jérémy Jean.
international cryptology conference (2013)

189 Citations

Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks

Pierre-Alain Fouque;David Pointcheval.
international conference on the theory and application of cryptology and information security (2001)

167 Citations

Anomaly Detection in Streams with Extreme Value Theory

Alban Siffer;Pierre-Alain Fouque;Alexandre Termier;Christine Largouet.
knowledge discovery and data mining (2017)

165 Citations

Strong Non-Interference and Type-Directed Higher-Order Masking

Gilles Barthe;Sonia Belaïd;François Dupressoir;Pierre-Alain Fouque.
computer and communications security (2016)

157 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Pierre-Alain Fouque

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 57

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 34

Orr Dunkelman

Orr Dunkelman

University of Haifa

Publications: 31

Lei Wang

Lei Wang

Shanghai Jiao Tong University

Publications: 30

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 30

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 28

Bart Preneel

Bart Preneel

KU Leuven

Publications: 27

Moti Yung

Moti Yung

Columbia University

Publications: 26

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 24

Michel Abdalla

Michel Abdalla

École Normale Supérieure

Publications: 23

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 23

Marc Fischlin

Marc Fischlin

Technical University of Darmstadt

Publications: 22

Bo-Yin Yang

Bo-Yin Yang

National Taiwan University

Publications: 22

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 21

Mohammad Wazid

Mohammad Wazid

Graphic Era University

Publications: 20

Christian Rechberger

Christian Rechberger

Graz University of Technology

Publications: 19

Trending Scientists

Malcolm R. Mackley

Malcolm R. Mackley

University of Cambridge

Lanqun Mao

Lanqun Mao

Chinese Academy of Sciences

Manojit Pal

Manojit Pal

University of Hyderabad

Roland Schauer

Roland Schauer

Kiel University

Gil McVean

Gil McVean

University of Oxford

Christine G. Elsik

Christine G. Elsik

University of Missouri

Ge Zhang

Ge Zhang

Hong Kong Baptist University

Lois S. Weisman

Lois S. Weisman

University of Michigan–Ann Arbor

Marcin Drag

Marcin Drag

Wrocław University of Science and Technology

Zheng Zhang

Zheng Zhang

Southern University of Science and Technology

Helmut Habersack

Helmut Habersack

University of Natural Resources and Life Sciences

Markus Weiler

Markus Weiler

University of Freiburg

Matt Field

Matt Field

University of Sheffield

J. David Spence

J. David Spence

University of Western Ontario

Peter M. Haas

Peter M. Haas

University of Massachusetts Amherst

Thomas R. Dye

Thomas R. Dye

Florida State University

Something went wrong. Please try again later.