Publications
Most of these articles are copyrighted by the International Association for Cryptologic Research and reproduced here as part of the copyright assignment agreement under which they where published.
All articles are PDF files; you may also download the references in BibTeX format.
- Optimal Resistance Against
the Davies and Murphy Attack
T. Pornin, Advances in Cryptology - ASIACRYPT'98, LNCS 1514, Springer-Verlag, 2000. - Decorrelated Fast Cipher:
an AES Candidate
H. Gilbert, M. Girault, P. Hoogvorst, F. Noilhan, T. Pornin, G. Poupard, J. Stern, S. Vaudenay, Proceedings of the First Advanced Encryption Standard (AES) Candidate Conference, 1998. - DFC Update
O. Baudron, H. Gilbert, L. Granboulan, H. Handschuh, R. Harley, A. Joux, P. Nguyen, F. Noilhan, D. Pointcheval, T. Pornin, G. Poupard, J. Stern, S. Vaudenay, Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, 1999. - Report on the AES
Candidates
O. Baudron, H. Gilbert, L. Granboulan, H. Handschuh, A. Joux, P. Nguyen, F. Noilhan, D. Pointcheval, T. Pornin, G. Poupard, J. Stern, S. Vaudenay, Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, 1999. - Software-Hardware
Trade-offs
T. Pornin, J. Stern, Cryptographic Hardware and Embedded Systems - CHES 2000, LNCS 1965, Springer-Verlag, 2000. - Transparent Harddisk
Encryption
T. Pornin, Cryptographic Hardware and Embedded Systems - CHES 2001, LNCS 2162, Springer-Verlag, 2000. - Implantation et optimisation
des primitives cryptographiques
T. Pornin, PhD thesis, defended on October 25th, 2001. -
IPAKE: Isomorphisms
for Password-based Authenticated Key Exchange
D. Catalano, D. Pointcheval, T. Pornin, Advances in Cryptology - CRYPTO 2004, LNCS 3152, Springer-Verlag, 2004. - SOSEMANUK, a fast
software-oriented stream cipher
C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, Proceedings of SKEW - Symmetric Key Encryption Workshop, Network of Excellence in Cryptology ECRYPT, Aarhus, Danemark, May 26th and 27th, 2005. - DECIM, a new stream cipher
for hardware applications
C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, Proceedings of SKEW - Symmetric Key Encryption Workshop, Network of Excellence in Cryptology ECRYPT, Aarhus, Danemark, May 26th and 27th, 2005. - Digital Signatures Do Not
Guarantee Exclusive Ownership
T. Pornin, J. P. Stern, Applied Cryptography and Network Security - ACNS 2005, LNCS 3531, Springer-Verlag, 2005. - DECIM v2
C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, Proceedings of SASC 2006 - ECRYPT Workshop on stream ciphers, Leuven, Belgique, February 2006. -
Trapdoor
Hard-to-Invert Group Isomorphisms and Their Application to
Password-Based Authentication
D. Catalano, D. Pointcheval, T. Pornin, Journal of Cryptology, volume 20, number 1, Springer-Verlag, 2007. - Perfect Block Ciphers
with Small Blocks
L. Granboulan, T. Pornin, Fast Software Encryption - FSE 2007, LNCS 4593, Springer-Verlag, 2007. - Comparative Performance Review
of the SHA-3 Second-Round Candidates
T. Pornin, presented at the Second SHA-3 Candidate Conference, August 2010 (Update for the finalists). - The Makwa Password Hashing Function
T. Pornin, submitted to the Password Hashing Competition, February 2014 (April 2015 for version 1.1). - Optimizing Makwa on GPU and CPU
T. Pornin, technical report submitted to the Password Hashing Competition, May 2015.