Hugues Randriam
Télécom ParisTech
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hugues Randriam.
international cryptology conference | 2010
Eric Brier; Jean-Sébastien Coron; Thomas Icart; David Madore; Hugues Randriam; Mehdi Tibouchi
We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icarts deterministic encoding from Crypto 2009. While almost as efficient as Icarts encoding, this hash function can be plugged into any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle model. We also describe a more general (but less efficient) construction that works for a large class of encodings into elliptic curves, for example the Shallue-Woestijne-Ulas (SWU) algorithm. Finally we describe the first deterministic encoding algorithm into elliptic curves in characteristic 3.
SETA'10 Proceedings of the 6th international conference on Sequences and their applications | 2010
Jean-Pierre Flori; Hugues Randriam; Gérard D. Cohen; Sihem Mesnager
It is a difficult challenge to find Boolean functions used in stream ciphers achieving all of the necessary criteria and the research of such functions has taken a significant delay with respect to crypt-analyses. Very recently, an infinite class of Boolean functions has been proposed by Tu and Deng having many good cryptographic properties under the assumption that the following combinatorial conjecture about binary strings is true: Conjecture 0.1. Let St, k be the following set: St,k = {(a, b) ∈ (Z/(2k - 1)Z)2 |a + b = t and w(a) + w(b) < k}. Then: |St,k| ≤ 2k-1. The main contribution of the present paper is the reformulation of the problem in terms of carries which gives more insight on it than simple counting arguments. Successful applications of our tools include explicit formulas of |St,k| for numbers whose binary expansion is made of one block, a proof that the conjecture is asymptotically true and a proof that a family of numbers (whose binary expansion has a high number of 1s and isolated 0s) reaches the bound of the conjecture. We also conjecture that the numbers in that family are the only ones reaching the bound.
Mathematics of Computation | 2015
Julia Pieltant; Hugues Randriam
We obtain new uniform upper bounds for the tensor rank of the multiplication in the extensions of the finite fields
Integers | 2012
Jean-Pierre Flori; Hugues Randriam
\mathbb{F}_q
information theory workshop | 2010
Hugues Randriam
for any prime power
information theory and applications | 2015
Gérard D. Cohen; Sihem Mesnager; Hugues Randriam
q
Designs, Codes and Cryptography | 2015
Hugues Randriam; Lin Sok; Patrick Solé
; moreover these uniform bounds lead to new asymptotic bounds as well. In addition, we also give purely asymptotic bounds which are substantially better by using a family of Shimura curves defined over
Journal of Number Theory | 2010
Francis N. Castro; Hugues Randriam; Ivelisse Rubio; H. F. Mattson
\mathbb{F}_q
IACR Cryptology ePrint Archive | 2010
Jean-Pierre Flori; Hugues Randriam; Gérard D. Cohen; Sihem Mesnager
, with an optimal ratio of
Designs, Codes and Cryptography | 2018
Minjia Shi; Yan Liu; Hugues Randriam; Lin Sok; Patrick Solé
\mathbb{F}_{q^t}