H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 6,448 147 World Ranking 5871 National Ranking 140

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Programming language
  • Algorithm

His primary areas of study are Theoretical computer science, Cryptography, Algorithm, Cryptanalysis and Public-key cryptography. His work carried out in the field of Theoretical computer science brings together such families of science as Key, Key recovery, Block cipher, Preimage attack and Masking. His studies deal with areas such as Discrete logarithm and Reduction as well as Cryptography.

His Algorithm research is multidisciplinary, incorporating perspectives in Authentication protocol and Elliptic curve. His Cryptanalysis research integrates issues from Discrete mathematics, Signature, NESSIE and Smart card. A significant part of his Public-key cryptography research incorporates Encryption and Computer security studies.

His most cited work include:

  • Password-Based authenticated key exchange in the three-party setting (419 citations)
  • Practical multi-candidate election system (275 citations)
  • Sharing Decryption in the Context of Voting or Lotteries (263 citations)

What are the main themes of his work throughout his whole career to date?

Pierre-Alain Fouque mostly deals with Theoretical computer science, Cryptography, Algorithm, Discrete mathematics and Computer security. The various areas that he examines in his Theoretical computer science study include Cryptographic hash function, SHA-2, Hash function, Discrete logarithm and Block cipher. His study in Block cipher is interdisciplinary in nature, drawing from both Stream cipher and Arithmetic.

His Cryptography study combines topics in areas such as Adversary, Key, Elliptic Curve Digital Signature Algorithm and Encryption. His work in the fields of Algorithm, such as Cryptanalysis, intersects with other areas such as Subset sum problem. His study explores the link between Discrete mathematics and topics such as Elliptic curve that cross with problems in Elliptic curve cryptography.

He most often published in these fields:

  • Theoretical computer science (29.39%)
  • Cryptography (23.27%)
  • Algorithm (24.49%)

What were the highlights of his more recent work (between 2017-2020)?

  • Cryptography (23.27%)
  • Computer security (18.37%)
  • Key exchange (6.53%)

In recent papers he was focusing on the following fields of study:

His main research concerns Cryptography, Computer security, Key exchange, Side channel attack and Encryption. His biological study spans a wide range of topics, including Masking, Theoretical computer science and Composability. His work is dedicated to discovering how Computer security, Handshake are connected with Cryptographic primitive, Adversary and Firewall and other disciplines.

His Key exchange study also includes fields such as

  • Computer security model which connect with Differential, Key schedule, Arithmetic and Block cipher,
  • SIGNAL which intersects with area such as Computer network,
  • Protocol that intertwine with fields like Provable security, Cache, Public-key cryptography, Server and Internet traffic. His studies in Encryption integrate themes in fields like Scheme and Heuristic. His Algorithm study integrates concerns from other disciplines, such as Point and Lattice.

Between 2017 and 2020, his most popular works were:

  • Practical Implementation of Ring-SIS/LWE Based Signature and IBE (17 citations)
  • Masking the GLP Lattice-Based Signature Scheme at Any Order (12 citations)
  • A Formal Treatment of Accountable Proxying Over TLS (12 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Programming language
  • Algebra

Pierre-Alain Fouque mainly focuses on Encryption, Cryptography, Computer security, Side channel attack and Implementation. His Encryption research incorporates elements of Discrete mathematics, Time complexity and Scheme. His research in Cryptography intersects with topics in Lattice and Theoretical computer science.

His work in the fields of Computer security, such as Provable security and Public-key cryptography, overlaps with other areas such as Information technology. His Side channel attack research includes elements of Learning with errors, Reduction, Combinatorics and Modular design. His research integrates issues of Software and Masking in his study of Implementation.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Password-Based authenticated key exchange in the three-party setting

Michel Abdalla;Pierre-Alain Fouque;David Pointcheval.
public key cryptography (2005)

658 Citations

Practical multi-candidate election system

Olivier Baudron;Pierre-Alain Fouque;David Pointcheval;Jacques Stern.
principles of distributed computing (2001)

400 Citations

Sharing Decryption in the Context of Voting or Lotteries

Pierre-Alain Fouque;Guillaume Poupard;Jacques Stern.
financial cryptography (2000)

389 Citations

The Doubling Attack - Why Upwards Is Better than Downwards

Pierre-Alain Fouque;Frederic Valette.
cryptographic hardware and embedded systems (2003)

259 Citations

An improved LPN algorithm

Eric Levieil;Pierre-Alain Fouque.
security and cryptography for networks (2006)

198 Citations

Practical cryptanalysis of SFLASH

Vivien Dubois;Pierre-Alain Fouque;Adi Shamir;Jacques Stern.
international cryptology conference (2007)

179 Citations

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting

Patrick Derbez;Pierre-Alain Fouque;Pierre-Alain Fouque;Jérémy Jean.
international cryptology conference (2013)

163 Citations

Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks

Pierre-Alain Fouque;David Pointcheval.
international conference on the theory and application of cryptology and information security (2001)

162 Citations

Verified Proofs of Higher-Order Masking

Gilles Barthe;Sonia Belaïd;François Dupressoir;Pierre-Alain Fouque.
theory and application of cryptographic techniques (2015)

124 Citations

Strong Non-Interference and Type-Directed Higher-Order Masking

Gilles Barthe;Sonia Belaïd;François Dupressoir;Pierre-Alain Fouque.
computer and communications security (2016)

122 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Pierre-Alain Fouque

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 57

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 34

Orr Dunkelman

Orr Dunkelman

University of Haifa

Publications: 31

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 30

Lei Wang

Lei Wang

Shanghai Jiao Tong University

Publications: 30

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 28

Bart Preneel

Bart Preneel

KU Leuven

Publications: 27

Moti Yung

Moti Yung

Columbia University

Publications: 26

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 24

Michel Abdalla

Michel Abdalla

École Normale Supérieure

Publications: 23

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 23

Marc Fischlin

Marc Fischlin

TU Darmstadt

Publications: 22

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 21

Alex Biryukov

Alex Biryukov

University of Luxembourg

Publications: 19

Christian Rechberger

Christian Rechberger

Graz University of Technology

Publications: 19

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 18

Something went wrong. Please try again later.