Number Field Sieve for the DLP.

Reynald Lercier , Antoine Joux
Encyclopedia of Cryptography and Security (2nd Ed.) 867 -873

1
2011
Cryptanalysis of a Provably Secure Cryptographic Hash Function.

Jean-Sébastien Coron , Antoine Joux
IACR Cryptology ePrint Archive 2004 13

32
2004
Report on the AES Candidates

Fabrice Noilhan , Serge Vaudenay , Thomas Pornin , Guillaume Poupard
Proceedings from the Second Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology (NIST)

22
1999
Solving shortest and closest vector problems: The decomposition approach.

Nicolas Gama , Anja Becker , Antoine Joux
IACR Cryptology ePrint Archive 2013 685

22
2013
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions.

Charles Bouillaguet , Pierre-Alain Fouque , Orr Dunkelman , Antoine Joux
IACR Cryptology ePrint Archive 2009 77

3
2009
Nearly Sparse Linear Algebra.

Cécile Pierrot , Antoine Joux
IACR Cryptology ePrint Archive 2015 930

2
2015
Synchronous smart card authentication and encryption circuit and method

Jacques Stern , Jacek Kowalski , Michel Martin , Antoine Joux

9
1993
Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic.

Thomas Espitau , Antoine Joux
IACR Cryptology ePrint Archive 2016 528

2016
On the security of randomized CBC-MAC beyond the birthday paradox limit a new construction

Fiédéric Valette , Antoine Joux , Eliane Jaulmes
Lecture Notes in Computer Science 237 -251

119
2002
Discrete Logarithms in Small Characteristic Finite Fields: a Survey of Recent Advances

Antoine Joux
symposium on theoretical aspects of computer science

2017
Overtaking VEST

Antoine Joux , Jean-René Reinhard
fast software encryption 58 -72

4
2007
62
2009
Introduction to Identity-Based Cryptography

Antoine Joux
Identity-Based Cryptography 1 -12

23
2009
Multi-user collisions: Applications to Discrete Logs, Even-Mansour and Prince.

Pierre-Alain Fouque , Chrysanthi Mavromati , Antoine Joux
IACR Cryptology ePrint Archive 2013 761

6
2013
Counting points on elliptic curves in medium characteristic.

Reynald Lercier , Antoine Joux
IACR Cryptology ePrint Archive 2006 176

9
2006
Drinfeld modules are not for isogeny based cryptography.

Antoine Joux , Anand Kumar Narayanan
IACR Cryptology ePrint Archive 2019 1329

2019