研究成果

学術論文

[J11]
FHE over the integers and modular arithmetic circuits.
E. Kim and M. Tibouchi.
IET Information Security, IET, 2017, to appear.
[J10]
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models.
S. Neves and M. Tibouchi.
IET Information Security, IET, 2017, to appear.
[J9]
Improved elliptic curve hashing and point representation.
M. Tibouchi and T. Kim. Designs, Codes and Cryptography vol. 82(1–2), Springer, 2017, pp. 161–177.
[J8]
Elliptic curve multiset hash. [arXiv]
J. Maitin-Shepard, M. Tibouchi and D. Aranha.
The Computer Journal, vol. 60(4), Oxford University Press, 2017, pp. 476–490.
[J7]
Strongly-optimal structure preserving signatures from type II pairings: synthesis and lower bounds.
G. Barthe, E. Fagerholm, D. Fiore, A. Scedrov, B. Schmidt and M. Tibouchi.
IET Information Security, vol. 10(6), IET, 2016, pp. 358–371.
[J6]
Practical cryptanalysis of ISO 9796-2 and EMV signatures.
J.-S. Coron, D. Naccache, M. Tibouchi and R.-P. Weinmann.
Journal of Cryptology, vol. 29(3), Springer, 2016, pp. 632–656.
[J5]
Tightly-secure signatures from lossy identification schemes.
M. Abdalla, P.-A. Fouque, V. Lyubashevsky and M. Tibouchi.
Journal of Cryptology, vol. 29(3), Springer, 2016, pp. 597–631.
[J4]
A note on the bivariate Coppersmith theorem.
J.-S. Coron, A. Kirichenko and M. Tibouchi.
Journal of Cryptology, vol. 26(2), Springer, 2013, pp. 246–250.
[J3]
Attacking RSA-CRT signatures with faults on Montgomery multiplication.
P.-A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.-C. Zapalowicz.
Journal of Cryptographic Engineering, vol. 3(1), Springer, 2013, pp. 59–72.
[J2]
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. [eprint]
R.R. Farashahi, P.-A. Fouque, I.E. Shparlinski, M. Tibouchi and J.F. Voloch. Math. Comp. vol. 82, AMS, 2013, pp. 491–512.
[J1]
Modulus fault attacks against RSA-CRT signatures.
E. Brier, D. Naccache, P.Q. Nguyen and M. Tibouchi.
Journal of Cryptographic Engineering, vol. 1(3), Springer, 2011, pp. 243–253.

国際会議(査読有)

[C48]
Side-channel attacks on BLISS lattice-based signatures. [eprint]
T. Espitau, P.-A. Fouque, B. Gérard and M. Tibouchi.
In D. Evans, T. Malkin and D. Xu (Eds.), ACM CCS 2017, ACM, 2017, to appear.
[C47]
Secure GLS recomposition for sum-of-square cofactors.
E. Kim and M. Tibouchi.
In S. Foresti and G. Persiano (Eds.), ACISP 2017, Part II, LNCS vol. 10343, Springer, 2017, pp. 349–365.
[C46]
Zeroizing attacks on indistinguishability obfuscation over CLT13. [eprint]
J.-S. Coron, M.S. Lee, T. Lepoint and M. Tibouchi. In S. Fehr (Ed.), PKC 2017, Part I, LNCS vol. 10174, Springer, 2017, pp. 41–58.
[C45]
FHE over the integers and modular arithmetic circuits.
E. Kim and M. Tibouchi.
In S. Foresti and G. Persiano (Eds.), CANS 2016, LNCS vol. 10052, Springer, 2016, pp. 435–450.
[C44]
Loop-abort faults against lattice-based Fiat–Shamir and hash-and-sign signatures. [eprint]
T. Espitau, P.-A. Fouque, B. Gérard and M. Tibouchi.
In R. Avanzi and H. Heys (Eds.), SAC 2016, LNCS vol. 9xxx, Springer, 2016, to appear.
[C43]
Cryptanalysis of GGH15 multilinear maps. [eprint]
J.-S. Coron, M.S. Lee, T. Lepoint and M. Tibouchi. In J. Katz and M. Robshaw (Eds.), CRYPTO 2016, Part II, LNCS vol. 9815, Springer, 2016, pp. 607–628.
[C42]
Degenerate curve attacks. [eprint]
S. Neves and M. Tibouchi.
In G. Persiano and B.-Y. Yang (Eds.), PKC 2016, Part II, LNCS vol. 9615, Springer, 2016, pp. 19–35.
[C41]
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones. [eprint]
P. Belgarric, P.-A. Fouque, G. Macario-Rat and M. Tibouchi.
In K. Sato (Ed.), CT-RSA 2016, LNCS vol. 9610, Springer, 2016, pp. 236–252.
[C40]
Invalid curve attacks in a GLS setting.
T. Kim and M. Tibouchi.
In K. Tanaka and Y. Suga (Eds.), IWSEC 2015, LNCS vol. 9241, Springer, 2015, pp. 41–55.
[C39]
Zeroizing without low-level zeroes: new attacks on multilinear maps and their limitations. [eprint]
J.-S. Coron, C. Gentry, S. Halevi, T. Lepoint, H.K. Maji, E. Miles, M. Raykova, A. Sahai and M. Tibouchi.
In R. Gennaro and M. Robshaw (Eds.), CRYPTO 2015, Part I, LNCS vol. 9215, Springer, 2015, pp. 247–266.
Based on [P2] below and [GHMS14].
[C38]
New multilinear maps over the integers. [eprint]
J.-S. Coron, T. Lepoint and M. Tibouchi.
In R. Gennaro and M. Robshaw (Eds.), CRYPTO 2015, Part I, LNCS vol. 9215, Springer, 2015, pp. 267–286.
[C37]
Cryptanalysis of the Co-ACD assumption. [eprint]
P.-A. Fouque, M.S. Lee, T. Lepoint and M. Tibouchi.
In R. Gennaro and M. Robshaw (Eds.), CRYPTO 2015, Part I, LNCS vol. 9215, Springer, 2015, pp. 561–580.
[C36]
Improved elliptic curve hashing and point representation.
T. Kim and M. Tibouchi.
In P. Charpin, N. Sendrier and J.-P. Tillich (Eds.), WCC 2015, INRIA, Paris, 2015.
[C35]
Conversion from arithmetic to boolean masking with logarithmic complexity. [eprint]
J.-S. Coron, J. Groszschaedl, M. Tibouchi and P.K. Vadnala.
In G. Leander (Ed.), FSE 2015, LNCS vol. 9054, Springer, 2015, pp. 130–149.
[C34]
Fully structure-preserving signatures and shrinking commitments. [eprint]
M. Abe, M. Kohlweiss, M. Ohkubo and M. Tibouchi.
In M. Fischlin and E. Oswald (Eds.), EUROCRYPT 2015, Part II, LNCS vol. 9057, Springer, 2015, pp. 35–65.
[C33]
Strongly-optimal structure preserving signatures from type II pairings: synthesis and lower bounds. [eprint]
G. Barthe, E. Fagerholm, D. Fiore, A. Scedrov, B. Schmidt and M. Tibouchi.
In J. Katz (Ed.), PKC 2015, LNCS vol. 9020, Springer, 2015, pp. 355–376.
[C32]
Cryptanalysis of a (somewhat) additively homomorphic encryption scheme used in PIR. [eprint]
T. Lepoint and M. Tibouchi.
In M. Brenner and K. Rohloff (Eds.), WAHC 2015, LNCS vol. 8976, Springer, 2015, pp. 184–193.
[C31]
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias.
D.F. Aranha, P.-A. Fouque, B. Gérard, J.-G. Kammerer, M. Tibouchi and J.-C. Zapalowicz.
In T. Iwata and P. Sarkar (Eds.), ASIACRYPT 2014, Part I, LNCS vol. 8873, Springer, 2014, pp. 262–281.
[C30]
Impossibility of surjective Icart-like encodings.
M. Tibouchi.
In S.S.M. Chow, J.K. Liu, L.C.K. Hui and S.M. Yiu (Eds.), ProvSec 2014, LNCS vol. 8782, Springer, 2014, pp. 29–39.
[C29]
Making RSA-PSS provably secure against non-random faults. [eprint]
G. Barthe, F. Dupressoir, P.-A. Fouque, B. Grégoire, M. Tibouchi and J.-C. Zapalowicz.
In L. Batina and M. Robshaw (Eds.), CHES 2014, LNCS vol. 8731, Springer, 2014, pp. 206–222.
[C28]
Structure-preserving signatures from type II pairings. [eprint]
M. Abe, J. Groth, M. Ohkubo and M. Tibouchi.
In J. Garay and R. Gennaro (Eds.), CRYPTO 2014, Part I, LNCS vol. 8616, Springer, 2014, pp. 390–407.
[C27]
Binary Elligator squared. [eprint]
D.F. Aranha, P.-A. Fouque, C. Qian, M. Tibouchi and J.-C. Zapalowicz.
In A. Youssef and A. Joux (Eds.), SAC 2014, LNCS vol. 8781, Springer, 2014, pp. 20–37.
[C26]
Close to uniform prime number generation with fewer random bits. [arXiv]
P.-A. Fouque and M. Tibouchi.
In J. Esparza et al. (Eds.), ICALP 2014 (Track A), LNCS vol. 8572, Springer, 2014, pp. 991—1002.
[C25]
Bit-flip faults on elliptic curve base fields, revisited.
T. Kim and M. Tibouchi.
In I. Boureanu, P. Owezarski and S. Vaudenay (Eds.), ACNS 2014, LNCS vol. 8479, Springer, 2014, pp. 163–180.
[C24]
Scale-invariant fully homomorphic encryption over the integers. [eprint]
J.-S. Coron, T. Lepoint and M. Tibouchi.
In H. Krawczyk (Ed.), PKC 2014, LNCS vol. 8383, Springer, 2014, pp. 311–328.
[C23]
Elligator Squared: uniform points on elliptic curves of prime order as uniform random strings. [eprint]
M. Tibouchi.
In N. Christin and R. Safavi-Naini (Eds.), FC 2014, LNCS vol. 8437, Springer, 2014, pp. 139–156.
[C22]
Unified, minimal and selectively randomizable structure-preserving signatures. [eprint]
M. Abe, J. Groth, M. Ohkubo and M. Tibouchi.
In Y. Lindell (Ed.), TCC 2014, LNCS vol. 8349, Springer, 2014, pp. 688–712.
[C21]
Recovering private keys generated with weak PRNGs.
P.-A. Fouque, M. Tibouchi and J.-C. Zapalowicz.
In M. Stam (Ed.), IMACC 2013, LNCS vol. 8308, Springer, 2013, pp. 158–172.
[C20]
Practical multilinear maps over the integers. [eprint]
J.-S. Coron, T. Lepoint and M. Tibouchi.
In R. Canetti, J. Garay (Eds.), CRYPTO 2013, LNCS vol. 8042, Springer, 2013, pp. 476–493.
[C19]
Injective encodings to elliptic curves. [eprint]
P.-A. Fouque, A. Joux and M. Tibouchi.
In C. Boyd, L. Simpson (Eds.), ACISP 2013, LNCS vol. 7959, Springer, 2013, pp. 203–218.
[C18]
Batch fully homomorphic encryption over the integers. [eprint]
J.H. Cheon, J.-S. Coron, J. Kim, M.S. Lee, T. Lepoint, M. Tibouchi and A. Yun.
In T. Johansson, P.Q. Nguyen (Eds.), EUROCRYPT 2013, LNCS vol. 7881, Springer, 2013, pp. 315–335.
[C17]
Fault attacks on projective-to-affine coordinate conversion.
D. Maimuţ, C. Murdica, D. Naccache and M. Tibouchi.
In E. Prouff (Ed.), COSADE 2013, LNCS vol. 7864, Springer, 2013, pp. 46–61.
[C16]
Another look at affine-padding RSA signatures. [eprint]
J.-S. Coron, D. Naccache and M. Tibouchi.
In T. Kwon, M.-K. Lee, D. Kwon (Eds.), ICISC 2012, LNCS vol. 7839, Springer, 2012, pp. 22–32.
[C15]
Indifferentiable hashing to Barreto-Naehrig curves.
P.-A. Fouque and M. Tibouchi.
In A. Hevia, G. Neven (Eds.), LATINCRYPT 2012, LNCS vol. 7533, Springer, 2012, pp. 1–17.
[C14]
Attacking RSA-CRT signatures with faults on Montgomery multiplication. [eprint]
P.-A. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi and J.-C. Zapalowicz.
In E. Prouff, P. Schaumont (Eds.), CHES 2012, LNCS vol. 7428, Springer, 2012, pp. 447–462.
[C13]
Tightly-secure signatures from lossy ID schemes. [eprint]
M. Abdalla, P.-A. Fouque, V. Lyubashevsky and M. Tibouchi.
In D. Poincheval, T. Johansson (Eds.), EUROCRYPT 2012, LNCS vol. 7237, Springer, 2012, pp. 572–590.
[C12]
Public key compression and modulus switching for fully homomorphic encryption over the integers. [eprint]
J.-S. Coron, D. Naccache and M. Tibouchi.
In D. Poincheval, T. Johansson (Eds.), EUROCRYPT 2012, LNCS vol. 7237, Springer, 2012, pp. 446–464.
[C11]
Modulus fault attacks against RSA-CRT signatures. [eprint] [slides]
E. Brier, D. Naccache, P.Q. Nguyen and M. Tibouchi.
In B. Preneel, T. Takagi (Eds.), CHES 2011, LNCS vol. 6917, Springer, 2011, pp. 192–206.
[C10]
Fully homomorphic encryption over the integers with shorter public keys. [eprint] [slides]
J.-S. Coron, A. Mandal, D. Naccache and M. Tibouchi.
In P. Rogaway (Ed.), CRYPTO 2011, LNCS vol. 6841, Springer, 2011, pp. 487–504.
[C9]
Cryptanalysis of the RSA subgroup assumption from TCC 2005. [eprint] [slides]
J.-S. Coron, A. Joux, A. Mandal, D. Naccache and M. Tibouchi.
In D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi (Eds.), PKC 2011, LNCS vol. 6571, Springer, 2011, pp. 147–155.
[C8]
Deterministic encoding and hashing to odd hyperelliptic curves. [eprint] [slides]
P.-A. Fouque and M. Tibouchi.
In M. Joye, A. Miyaji, A. Otsuka (Eds.), Pairing 2010, LNCS vol. 6487, Springer, 2010, pp. 265–277.
[C7]
Efficient indifferentiable hashing to ordinary elliptic curves. [eprint] [slides]
E. Brier, J.-S. Coron, T. Icart., D. Madore, H. Randriam and M. Tibouchi.
In T. Rabin (Ed.), CRYPTO 2010, LNCS vol. 6223, Springer, 2010, pp. 237–254.
[C6]
Estimating the size of the image of deterministic hash functions to elliptic curves. [eprint] [slides]
P.-A. Fouque and M. Tibouchi.
In M. Abdalla, P.S.L.M. Barreto (Eds.), LATINCRYPT 2010, LNCS vol. 6212, Springer, 2010, pp. 81–91.
[C5]
Huff’s model for elliptic curves. [eprint] [slides]
M. Joye, M. Tibouchi and D. Vergnaud.
In G. Hanrot, F. Morain, E. Thomé (Eds.), ANTS-IX, LNCS vol. 6197, Springer, 2010, pp. 234–250.
[C4]
On the security of PKCS#1 v1.5 encryption. [eprint] [slides]
A. Bauer, J.-S. Coron, D. Naccache, M. Tibouchi and D. Vergnaud.
In J. Zhou, M. Yung (Eds.), ACNS 2010, LNCS vol. 6123, Springer, 2010, pp. 1–18.
Best student paper award.
[C3]
Fault attacks against EMV signatures. [eprint] [slides]
J.-S. Coron, D. Naccache and M. Tibouchi.
In J. Pieprzyk (Ed.), CT-RSA 2010, LNCS vol. 5985, Springer, 2010, pp. 208–220.
[C2]
Factoring unbalanced moduli with known bits. [eprint] [slides]
E. Brier, D. Naccache and M. Tibouchi.
In D. Lee, S. Hong (Eds.), ICISC 2009, LNCS vol. 5984, Springer, 2009, pp. 65–72.
[C1]
Practical cryptanalysis of ISO/IEC 9796-2 and EMV signatures. [eprint] [slides]
J.-S. Coron, D. Naccache, M. Tibouchi and R.P. Weinmann.
In S. Halevi (Ed.), CRYPTO 2009, LNCS vol. 5677, Springer, 2009, pp. 428–444.

解説論文

[S18]
Extension of the GLV/GLS recomposition method of Aranha et al.
E. Kim and M. Tibouchi.
SCIS 2017, IEICE, 2017.
[S17]
同種写像を用いた置換有理関数の生成手法.
G. Bisson and M. Tibouchi.
SCIS 2017, IEICE, 2017. In Japanese.
[S16]
Cryptographic multilinear maps: a status report.
M. Tibouchi.
CRYPTREC Technical Report No. 2603, 2016.
[S15]
Hashing into elliptic curves.
E. Ochoa-Jiménez, F. Rodriguez-Henríquez and M. Tibouchi.
In N. El Mrabet and M. Joye (Eds.), Guide to pairing-based cryptography, CRC Press, 2016.
[S14]
楕円曲線符号化関数の擬似ランダム性について.
T. Kim and M. Tibouchi.
SCIS 2016, IEICE, 2016. In Japanese.
[S13]
Co-ACD仮定とそれを基にした準同型暗号方式の安全性評価.
P.-A. Fouque, T. Lepoint and M. Tibouchi.
SCIS 2015, IEICE, 2015. In Japanese. Innovation paper award.
[S12]
Optimizing obfuscation: towards smaller matrix branching programs.
J. Kim and M. Tibouchi.
SCIS 2015, IEICE, 2015.
[S11]
Differential fault attacks on GLS curves.
T. Kim and M. Tibouchi.
SCIS 2015, IEICE, 2015.
[S10]
Fully homomorphic encryption over the integers: from theory to practice.
M. Tibouchi.
NTT Technical Review, vol. 12(7), NTT Corporation, 2014, pp. 26–31.
[S9]
整数上完全準同型暗号の研究. [pdf]
M. Tibouchi.
NTT技術ジャーナル, vol. 26(3), NTT Corporation, 2014, pp. 71–75. In Japanese.
[S8]
素数位数楕円曲線上の点を一様に近いビットストリングとして表す手法.
M. Tibouchi.
SCIS 2014, IEICE, 2014. In Japanese.
[S7]
Impossibility of symmetric structure-preserving signatures with single verification equation.
M. Abe, M. Ohkubo and M. Tibouchi.
SCIS 2013, IEICE, 2013.
[S6]
Lattice-based fault attacks on signatures.
P.Q. Nguyen and M. Tibouchi.
In M. Joye and M. Tunstall (Eds.), Fault analysis in cryptography, Springer, 2012, pp. 201–220.
[S5]
A note on hashing to BN curves. [pdf]
M. Tibouchi.
In A. Miyaji (Ed.), SCIS 2012, IEICE, 2012.
[S4]
A Nagell algorithm in any characteristic.
M. Tibouchi.
In D. Naccache (Ed.), Cryptography and Security: From Theory to Applications, Festschrift Jean-Jacques Quisquater, LNCS vol. 6805, Springer, 2012, pp. 474–479.
[S3]
Security reduction.
M. Tibouchi.
In H.C.A. van Tilborg and S. Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd edition, Part 19, Springer, 2011, pp. 1167–1168.
[S2]
ISO-9796 signature standards.
M. Tibouchi.
In H.C.A. van Tilborg and S. Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd edition, Part 9, Springer, 2011, pp. 649–650.
[S1]
Securing e-passports with elliptic curves.
H. Chabanne and M. Tibouchi.
IEEE Security & Privacy vol. 9(2), IEEE, 2011, pp. 75–78.

プレプリント

[P5]
Cryptanalysis of Compact-LWE. [eprint]
J. Bootle and M. Tibouchi.
[P4]
Constructing permutation rational functions from isogenies. [arXiv]
G. Bisson and M. Tibouchi.
[P3]
Cryptanalysis of the quadratic zero-testing of GGH. [eprint]
Z. Brakerski, C. Gentry, S. Halevi, T. Lepoint, A. Sahai and M. Tibouchi.
[P2]
Cryptanalysis of two candidate fixes of multilinear maps over the integers. [eprint]
J.-S. Coron, T. Lepoint and M. Tibouchi.
[P1]
Proofs as cryptography: a new interpretation of the Curry–Howard isomorphism for software certificates. [hal]
A. Kumar, P.-A. Fouque, T. Genet and M. Tibouchi.

博士論文

[T]
Hachage vers les courbes elliptiques et cryptanalyse de schémas RSA. [pdf] [slides]
Ph.D. thesis of Université Paris 7 and University of Luxembourg.
(Introduction in French, main matter in English).