Publications scientifiques

Les agents de l’ANSSI s'impliquent activement dans la communauté de recherche française et internationale sur les différents domaines de la SSI.

Publié le 21 Juillet 2022 Mis à jour le 08 Novembre 2023

Nos agents publient des articles de recherche dans des  revues scientifiques, présentent leurs travaux dans des conférences nationales ou internationales, et échangent régulièrement avec leurs pairs dans des colloques.

Ces contributions, nombreuses, relèvent de domaines aussi variés que la cryptographie, les attaques par canaux auxiliaires, les interférences électromagnétiques, la sécurité des langages ou encore la sécurité des architectures informatiques fixes ou mobiles. Elles permettent aux agents de l’ANSSI d’entretenir leur expertise et d’être reconnus au sein des diverses communautés scientifiques.

Les contributions de l'ANSSI

  • Tamarin-based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks, Tristan Claverie, Gildas Avoine, Stéphanie Delaune, José Lopes Esteves, ESORICS, 2023 
  • WooKey: Designing a Trusted and Efficient USB Device, Ryad Benadjila, Arnauld Michelizza, Mathieu Renard, Philippe Thierry, Philippe Trebuchet - ACSAC, décembre 2019
  • Chipsec, un outil pour les tests de conformité des firmwares, Arnaud Malard, Yves-Alexis Perez - MISC Magazine 109, mai 2020
  • Relevé de configuration matérielle sur plate-forme x86, Arnaud Malard, Yves-Alexis Perez - MISC Magazine 109, mai 2020
  • Utilisation de Chipsec pour valider la sécurité de plate-formes matérielles, Yves-Alexis Perez, Arnaud Malard - SSTIC, Rennes, juin 2020
  • Inter-CESTI: Methodological and Technical Feedbacks on Hardware Devices Evaluations, Ryad Benadjila, Arnauld Michelizza, Philippe Thierry, Philippe Trébuchet, Mathieu Renard - SSTIC, Rennes, juin 2020
  • Standard lattices of compatibly embedded finite fields. L. De Feo, Hugues Randriam, E. Rousseau - ISSAC 2019 (Beijing) pp. 122--130
  • Unifying Leakage Models on a Rényi Day. T. Prest, D. Goudarzi, Ange Martinelli, A. Passelègue - CRYPTO 2019, pp. 683-712
  • GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. G. Barthe, S. Belaïd, T. Espitau, P.-A. Fouque, Mélissa Rossi, M. Tibouchi - ACM CCS 2019, pp. 2147-2164
  • An Efficient and Provable Masked Implementation of qTESLA. F. Gérard, Mélissa Rossi - CARDIS 2019, pp. 74-91
  • Cryptanalysis of NORX v2.0. C. Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard - Journal of Cryptology, vol 32(4), pp. 1423-1447 (2019)
  • Blind Schnorr Signatures in the Algebraic Group Model. G. Fuchsbauer, A. Plouviez, Yannick Seurin - IACR Cryptol. ePrint Arch. 2019: 877 (2019)
  • Variants of the AES Key Schedule for Better Truncated Differential Bounds - IACR Cryptol. ePrint Arch. 2019/95. P. Derbez, P.-A. Fouque, Jérémy Jean, B. Lambin.
  • Horizontal Collision Correlation Attack on Elliptic Curves. Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, J. Wild - IACR Cryptol. ePrint Arch. 2019/321
  • Anticanonical codes from del Pezzo surfaces with Picard rank one, R. Blache, A. Couvreur, E. Hallouin, D. Madore, J. Nardi, M. Rambaud, Hughes Randriam - Trans. Amer. Math. Soc. 373 (2020) pp. 5371—5393
  • MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces, J. Nick, T.Ruffing, Yannick Seurin, P. Wuille - ACM CCS 2020, pp. 1717-1731
  • LWE with Side Information: Attacks and Concrete Security Estimation, D. Dachman-Soled, L. Ducas, H. Gong, Mélissa Rossi - CRYPTO 2020, pp. 329-358
  • (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption scheme, J.-P. D'Anvers, Mélissa Rossi, F. Virdia - EUROCRYPT 2020, pp. 3-33.
  • Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model. G. Fuchsbauer, A. Plouviez, Yannick Seurin - EUROCRYPT 2020, vol.2, pp. 63-95.
  • Incremental Cryptography Revisited: PRFs, Nonces and Modular Design. V. Arte, M. Bellare, Louiza Khati - INDOCRYPT 2020, pp. 576-598.
  • Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. D. Goudarzi, Jérémy Jean, S. Kölbl, T. Peyrin, M. Rivain, Y. Sasaki, S. Meng Sim - IACR Transactions on Symmetric Cryptology 2020 (S1), pp. 31-59
  • SKINNY-AEAD and SKINNY-Hash. C. Beierle, Jérémy Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, S. Meng Sim - IACR Transactions on Symmetric Cryptology 2020 (S1), pp. 88-1
  • Isochronous Gaussian Sampling: From Inception to Implementation. J. Howe, T. Prest, T. Ricosset, Mélissa Rossi - PQCRYPTO 2020, pp. 53-71
  • MuSig2: Simple Two-Round Schnorr Multi-Signatures. J. Nick, T. Ruffing, Yannick Seurin - IACR Cryptol. ePrint Arch. 2020/1261
  • QCB: Efficient Quantum-secure Authenticated Encryption. R. Bhaumik, X. Bonnetain, A. Chailloux, G. Leurent, M. Naya-Plasencia, A. Schrottenloher, Yannick Seurin - IACR Cryptol. ePrint Arch. 2020/1304
  • Observations on COMET. D. J. Bernstein, Henri Gilbert, M. Sönmez Turan - IACR Cryptol. ePrint Arch. 2020/1445
  • Identifying and characterizing ZMap scans : a cryptanalytic approach, J. Mazel, R. Strullu - arXiv,  2019
  • Deep Learning for side-channel analysis and introduction to ASCAD database, Ryad Benadjila, Emmanuel Prouff, Rémi Strullu, E. Cagli, C. Dumas - Journal of Cryptographic Engineering, 2020
  • Percolation-Based Detection of Anomalous Subgraphs in Complex Networks, Corentin Larroche, Johan Mazel, Stephan Clémençon - Symposium on Intelligent Data Analysis (IDA 2020)
  • Recent Trends in Statistical Analysis of Event Logs for Network-Wide Intrusion Detection, Corentin Larroche, Johan Mazel, Stephan Clémençon - Conference on Artificial Intelligence for Defense (CAID 2020)
  • Memory forensics analysis of Cisco IOS XR 32 bits routers with 'Amnesic-Sherpa', Solal Jacob -  Hack.lu 2019
  • Sécurité de l'implémentation standard de VXLAN, Arnaud Fuhrer - MISC-110
  • Que faut-il attendre de DNS-over-HTTPS ?, François Contat - SSTIC 2020
  • Inter-CESTI: Methodological and Technical Feedbacks on Hardware Devices Evaluations, Ryad Benadjila – SSTIC 2020
  • A systematic appraisal of side-channel evaluation stratregies, M. Azouaoui, D. Bellizia, I. Buhan, N. Debande, S. Duval, C. Giraud, Eliane Jaulmes, F. Koene, E. Oswald, F.-X. Standaert, Carolyn Whitnall – SSR 2020
  • Fault injection characterization on modern CPUs  – From the ISA to the Micro-Architecture, Thomas Trouchkine, Guillaume Bouffard, J. Clédière – WISTP 2019
  • Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models, Thomas Trouchkine, S. K. Bukasa, M. Escouteloup, R. Lashermes, Guillaume Bouffard – CoRR 2019
  • Thermal covert channel in bluetooth low energy networks, T. Claeys, F. Roussseau, Boris Simunovic, B. Tourancheau – WISec 2019
  • EM Injection Vs Modern CPU – Fault Characterization And AES Differential Fault Analysis, Thomas Trouchkine, Guillaume Bouffard, J. Clédière - CEM France 2020 (2020)
  • Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND, E. Kushilevitz, R. Ostrovsky, Emmanuel Prouff, A. Rosén, Adrian Thillard, D. Vergnaud – TCC (2) 2019: 386-40
  • Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations, S. Landry, Y. Linge, Emmanuel Prouff – WISTP2019: 66-84
  • Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks, Z. Guo, M. Tang, Emmanuel Prouff, M. Luo, F. Yan - IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(1): 34-44 (2020)
  • A Comprehensive Study of Deep Learning for Side-Channel Analysis, L. Masure, C. Dumas, Emmanuel Prouff - IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 348-375 (2020)
  • Random Probing Security: Verification, Composition, Expansion and New Constructions, S. Belaïd, J.-S. Coron, Emmanuel Prouff, M.Rivain, A.R. Taleb - CRYPTO (1) 2020: 339-368
  • Applications of the Random Coupling Model for stacked printed circuit boards , V. Houchouas, M. Darces, M. Hélier, E. Cottais, J. Lopes Esteves - 2020 International Symposium on Electromagnetic Compatibility - EMC EUROPE, sept. 2020, p. 1‑6
  • Applications of the Random Coupling Model for stacked printed circuit boards, V. Houchouas, M. Darces, M. Hélier, E. Cottais, J. Lopes Esteves - General Assembly and Scientific Symposium (URSI GASS), 2020 XXXIIIrd URSI, Rome, Italy, 2020
  • Applications of the Random Coupling Model to Assess Induced Currents or Voltages in Reverberant Environment, V. Houchouas, M. Darces, M. Hélier, E. Cottais, J. Lopes Esteves - Progress In Electromagnetic Research (PIERC), 2020, vol. 102, p. 109‑125
  • Active Forensics Tracking Exploiting Logical Effects of HPEM , J. Lopes Esteves - à General Assembly and Scientific Symposium (URSI GASS), 2020 XXXIIIrd URSI, Rome, Italy, sept. 2020
  • Electromagnetic security exploitation of the susceptibility of a UAV, J. Lopes Esteves - Directed Energy Research Symposium (DERC 2020), juin 2020
  • Testing for Weak Key Management in Bluetooth Low Energy Implementations, J. Lopes Esteves, T. Claverie – SSTIC (Symposium Sur la sécurité des Technologies de l’Information et des Communications), Rennes, France, juin 2020
  • FreeSpec: specifying, verifying, and executing impure computations in Coq, Thomas Letan, Y. Régis-Gianas - CPP 2020
  • The use of Coq for Common Criteria Evaluations, Y. Bertot, M. Dénès, V. Laporte, Arnaud Fontaine, Thomas Letan - CoqPL 2020
  • Modular verification of programs with effects and effects handlers, Thomas Letan, Y. Régis-Gianas, Pierre Chifflier, G. Hiet - Formal Aspects of Computing
  • coqffi: Génération automatique de FFI Coq-OCaml, Thomas Letan, Li-Yao Xia - JFLA 202

A paraître

  • The quadratic hull of a code and the geometric view on multiplication algorithms. Hugues Randriambololona - AGCT-17, actes à paraître dans Contemporary Mathematics
  • Trisymmetric multiplication formulae in finite fields. Hugues Randriambololona, E. Rousseau -WAIFI 2020, actes à paraître chez Springer LNCS
  • Algebraic geometry codes and some applications. A. Couvreur, Hugues Randriambololona -Chapitre 15 de l’ouvrage à pararaîre, A concise encyclopedia of coding theory, W. Cary Huffman, Jon-Lark Kim & Patrick Solé
  • The DEOXYS AEAD Family. Jérémy Jean, I. Nikolic, T. Peyrin, Yannick Seurin - Journal of Cryptology, à paraître
  • Electromagnetic security for information systems - Statistical assessment of couplings in reverberant environments, V. Houchouas, Thèse de doctorat, Sorbonne Université, juin 2020, en cours de publication
Sur le même sujet :