The 3SUM problem is a well-known problem in computer science and many geometric problems have been reduced to it. We study the 3XOR variant which is more cryptologically relevant. In this problem, the attacker is given black-box access to three random functions F,G and H and she has to find three inputs x, y and z such that F(x) ⊕ G(y) ⊕ H(z) = 0. The 3XOR problem is a difficult case of the more-general k-list birthday problem. Wagner’s celebrated k-list birthday algorithm, and the ones inspired by it, work by querying the functions more than strictly necessary from an information-theoretic point of view. This gives some leeway to target a solution of a specific form, at the expense of processing a huge amount of data. However, to handle su...
Given a set X of n binary words of equal length w, the 3XOR problem asks for three elements a, b, c ...
This paper describes a "three-way collision" on SHA-256 truncated to 128 bits. More precisely, it gi...
In this dissertation we consider two different notions of randomness and their applications to probl...
The 3SUM problem is a well-known problem in computer science and many geometric problems have been r...
In this thesis, we discuss algorithmic aspects of three different problems, related to cryptography....
We study a k-dimensional generalization of the birthday problem: given k lists of n-bit values, find...
We present two new algorithms for a variant of the 3XOR problem with lists consisting of N n-bit 10 ...
International audienceThe iterated Even-Mansour construction is an elegant construction that idealiz...
Dans cette thèse, nous discutons d’aspects algorithmiques de trois différents problèmes, en lien ...
© 2020 ACM. This paper shows several connections between data structure problems and cryptography ag...
We present algorithms for variants of the 3XOR problem with lists consisting of random sparse $n$-b...
The 3SUM problem asks if an input n-set of real numbers contains a triple whose sum is zero. We qual...
We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In ...
International audienceXoring the output of k permutations, k ≥ 2 is a very simple way to construct p...
The 3SUM problem is to decide, given a set of n real numbers, whether any three sum to zero. It is w...
Given a set X of n binary words of equal length w, the 3XOR problem asks for three elements a, b, c ...
This paper describes a "three-way collision" on SHA-256 truncated to 128 bits. More precisely, it gi...
In this dissertation we consider two different notions of randomness and their applications to probl...
The 3SUM problem is a well-known problem in computer science and many geometric problems have been r...
In this thesis, we discuss algorithmic aspects of three different problems, related to cryptography....
We study a k-dimensional generalization of the birthday problem: given k lists of n-bit values, find...
We present two new algorithms for a variant of the 3XOR problem with lists consisting of N n-bit 10 ...
International audienceThe iterated Even-Mansour construction is an elegant construction that idealiz...
Dans cette thèse, nous discutons d’aspects algorithmiques de trois différents problèmes, en lien ...
© 2020 ACM. This paper shows several connections between data structure problems and cryptography ag...
We present algorithms for variants of the 3XOR problem with lists consisting of random sparse $n$-b...
The 3SUM problem asks if an input n-set of real numbers contains a triple whose sum is zero. We qual...
We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In ...
International audienceXoring the output of k permutations, k ≥ 2 is a very simple way to construct p...
The 3SUM problem is to decide, given a set of n real numbers, whether any three sum to zero. It is w...
Given a set X of n binary words of equal length w, the 3XOR problem asks for three elements a, b, c ...
This paper describes a "three-way collision" on SHA-256 truncated to 128 bits. More precisely, it gi...
In this dissertation we consider two different notions of randomness and their applications to probl...