Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jean-Pierre Flori is active.

Publication


Featured researches published by Jean-Pierre Flori.


IEEE Transactions on Information Theory | 2013

Hyperbent Functions via Dillon-Like Exponents

Sihem Mesnager; Jean-Pierre Flori

This paper is devoted to hyperbent functions with multiple trace terms (including binomial functions) via Dillon-like exponents. We show how the approach developed by Mesnager to extend the Charpin–Gong family, which was also used by Wang and coworkers to obtain another similar extension, fits in a much more general setting. To this end, we first explain how the original restriction for Charpin–Gong criterion can be weakened before generalizing the Mesnager approach to arbitrary Dillon-like exponents. Afterward, we tackle the problem of devising infinite families of extension degrees for which a given exponent is valid and apply these results not only to reprove straightforwardly the results of Mesnager and Wang and coworkers, but also to characterize the hyperbentness of several new infinite classes of Boolean functions. We go into full details only for a few of them, but provide an algorithm (and the corresponding software) to apply this approach to an infinity of other new families. Finally, we compare the asymptotic and practical performances of different characterizations, including these in terms of hyperelliptic curves, and actually build hyperbent functions in cases which could not be attained through naive computations of exponential sums.


SETA'10 Proceedings of the 6th international conference on Sequences and their applications | 2010

On a conjecture about binary strings distribution

Jean-Pierre Flori; Hugues Randriam; Gérard D. Cohen; Sihem Mesnager

It is a difficult challenge to find Boolean functions used in stream ciphers achieving all of the necessary criteria and the research of such functions has taken a significant delay with respect to crypt-analyses. Very recently, an infinite class of Boolean functions has been proposed by Tu and Deng having many good cryptographic properties under the assumption that the following combinatorial conjecture about binary strings is true: Conjecture 0.1. Let St, k be the following set: St,k = {(a, b) ∈ (Z/(2k - 1)Z)2 |a + b = t and w(a) + w(b) < k}. Then: |St,k| ≤ 2k-1. The main contribution of the present paper is the reformulation of the problem in terms of carries which gives more insight on it than simple counting arguments. Successful applications of our tools include explicit formulas of |St,k| for numbers whose binary expansion is made of one block, a proof that the conjecture is asymptotically true and a proof that a family of numbers (whose binary expansion has a high number of 1s and isolated 0s) reaches the bound of the conjecture. We also conjecture that the numbers in that family are the only ones reaching the bound.


information theory workshop | 2011

Non-malleable codes from the wire-tap channel

Hervé Chabanne; Gérard D. Cohen; Jean-Pierre Flori; Alain Patey

Recently, Dziembowski et al. introduced the notion of non-malleable codes (NMC), inspired from the notion of non-malleability in cryptography and the work of Gennaro et al. in 2004 on tamper proof security. Informally, when using NMC, if an attacker modifies a codeword, decoding this modified codeword will return either the original message or a completely unrelated value. The definition of NMC is related to a family of modifications authorized to the attacker. In their paper, Dziembowski et al. propose a construction valid for the family of all bit-wise independent functions. In this article, we study the link between the second version of the Wire-Tap (WT) Channel, introduced by Ozarow and Wyner in 1984, and NMC. Using coset-coding, we describe a new construction for NMC w.r.t. a subset of the family of bit-wise independent functions. Our scheme is easier to build and more efficient than the one proposed by Dziembowski et al.


international symposium on information theory | 2012

Hyper-bent functions via Dillon-like exponents

Sihem Mesnager; Jean-Pierre Flori

This paper is devoted to hyperbent functions with multiple trace terms (including binomial functions) via Dillon-like exponents. We show how the approach developed by Mesnager to extend the Charpin–Gong family, which was also used by Wang and coworkers to obtain another similar extension, fits in a much more general setting. To this end, we first explain how the original restriction for Charpin–Gong criterion can be weakened before generalizing the Mesnager approach to arbitrary Dillon-like exponents. Afterward, we tackle the problem of devising infinite families of extension degrees for which a given exponent is valid and apply these results not only to reprove straightforwardly the results of Mesnager and Wang and coworkers, but also to characterize the hyperbentness of several new infinite classes of Boolean functions. We go into full details only for a few of them, but provide an algorithm (and the corresponding software) to apply this approach to an infinity of other new families. Finally, we compare the asymptotic and practical performances of different characterizations, including these in terms of hyperelliptic curves, and actually build hyperbent functions in cases which could not be attained through naive computations of exponential sums.


Journal of Mathematical Cryptology | 2013

An efficient characterization of a family of hyper-bent functions with multiple trace terms

Jean-Pierre Flori; Sihem Mesnager

Abstract. The connection between exponential sums and algebraic varieties has been known for at least six decades. Recently, Lisoněk exploited it to reformulate the Charpin–Gong characterization of a large class of hyper-bent functions in terms of numbers of points on hyperelliptic curves. As a consequence, he obtained a polynomial time and space algorithm for certain subclasses of functions in the Charpin–Gong family. In this paper, we settle a more general framework, together with detailed proofs, for such an approach and show that it applies naturally to a distinct family of functions proposed by Mesnager. Doing so, a polynomial time and space test for the hyper-bentness of functions in this family is obtained as well. Nonetheless, a straightforward application of such results does not provide a satisfactory criterion for explicit generation of functions in the Mesnager family. To address this issue, we show how to obtain a more efficient test leading to a substantial practical gain. We finally elaborate on an open problem about hyperelliptic curves related to a family of Boolean functions studied by Charpin and Gong.


SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications | 2012

Dickson polynomials, hyperelliptic curves and hyper-bent functions

Jean-Pierre Flori; Sihem Mesnager

In this paper, we study the action of Dickson polynomials on subsets of finite fields of even characteristic related to the trace of the inverse of an element and provide an alternate proof of a not so well-known result. Such properties are then applied to the study of a family of Boolean functions and a characterization of their hyper-bentness in terms of exponential sums recently proposed by Wang et al.Finally, we extend previous works of Lisoněk and Flori and Mesnager to reformulate this characterization in terms of the number of points on hyperelliptic curves and present some numerical results leading to an interesting problem.


IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding | 2011

Binary kloosterman sums with value 4

Jean-Pierre Flori; Sihem Mesnager; Gérard D. Cohen

Kloosterman sums have recently become the focus of much research, most notably due to their applications in cryptography and their relations to coding theory. Very recently Mesnager has showed that the value 4 of binary Kloosterman sums gives rise to several infinite classes of bent functions, hyper-bent functions and semi-bent functions in even dimension. In this paper we analyze the different strategies used to find zeros of binary Kloosterman sums to develop and implement an algorithm to find the value 4 of such sums. We then present experimental results showing that the value 4 of binary Kloosterman sums gives rise to bent functions for small dimensions, a case with no mathematical solution so far.


Integers | 2012

On the Number of Carries Occurring in an Addition Mod

Jean-Pierre Flori; Hugues Randriam

Abstract. In this paper we study the number of carries occurring while performing an addition modulo . For a fixed modular integer t, it is natural to expect the number of carries occurring when adding a random modular integer a to be roughly the Hamming weight of t. Here we are interested in the number of modular integers in producing strictly more than this number of carries when added to a fixed modular integer . In particular it is conjectured that less than half of them do so. An equivalent conjecture was proposed by Tu and Deng in a different context. Although quite innocent, this conjecture has resisted different attempts of proof and only a few cases have been proved so far. The most manageable cases involve modular integers t whose bits equal to are sparse. In this paper we continue to investigate the properties of , the fraction of modular integers a to enumerate, for t in this class of integers. Doing so we prove that has a polynomial expression and describe a closed form for this expression. This is of particular interest for computing the function giving and studying it analytically. Finally, we bring to light additional properties of in an asymptotic setting and give closed-form expressions for its asymptotic values.


International Journal of Information and Coding Theory | 2017

On a generalised combinatorial conjecture involving addition mod 2 k 1

Jean-Pierre Flori; Gérard D. Cohen

In this note, we give a simple proof of the combinatorial conjecture proposed by Tang, Carlet and Tang, based on which they constructed two classes of Boolean functions with many good cryptographic properties. We also give more general properties about the generalisation of the conjecture they propose.


IACR Cryptology ePrint Archive | 2015

Diversity and Transparency for ECC

Jean-Pierre Flori; Jérôme Plût; Jean-René Reinhard; Martin Ekerå

Collaboration


Dive into the Jean-Pierre Flori's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Martin Ekerå

Royal Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge