Overview
This page lists some of my research papers on cryptography and automated planning.
The full list of my publications can be found on Google Scholar.
Cryptography
I mainly work on code-based cryptosystems that are designed to provide security against attacks from both classical and quantum computers.
My work has lead to several contributions to the standardization of Post-Quantum Cryptography.
- S. Bettaieb, L. Bidoux, P. Gaborit, M. Kulkarni. Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures. Cryptology ePrint Archive 2024/1668, 2024. [pdf]
- L. Bidoux, T. Feneuil, P. Gaborit, R. Neveu, M. Rivain. Dual Support Decomposition in the Head: Shorter Signatures from RSD and MinRank. International Conference on the Theory and Application of Cryptology and Information (Asiacrypt), 2024. [pdf]
- S. Bettaieb, L. Bidoux, A. Budroni, M. Palumbi, L. Perin. Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2024. [pdf]
- L. Bidoux, P. Briaud, M. Bros, P. Gaborit. RQC Revisited and More Cryptanalysis for Rank-Based Cryptography. IEEE Transactions on Information Theory (IEEE IT), 2023. [pdf]
- L. Bidoux, P. Gaborit. Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems. International Conference on Codes, Cryptology and Information Security (C2SI), 2023. [pdf]
- L. Bidoux, P. Gaborit, M. Kulkarni, V. Mateu. Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem. Designs, Codes and Cryptography (DCC), 2023. [pdf]
- S. Bettaieb, L. Bidoux, O. Blazy, B. Cottier, D. Pointcheval. Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone. International Symposium on Foundations and Practice of Security (FPS), 2022. [pdf]
- S. Bettaieb, L. Bidoux, O. Blazy, Y. Connan, P. Gaborit. A Gapless Code-Based Hash Proof System based on RQC and its Applications. Designs, Codes and Cryptography (DCC), 2022. [pdf]
- S. Bettaieb, L. Bidoux, O. Blazy, B. Cottier, D. Pointcheval. Secure Decision Forest Evaluation. 16th International Conference on Availability, Reliability and Security (ARES), 2021. [pdf]
- N. Aragon, S. Bettaieb, L. Bidoux, Y. Connan, J. Coulaud, P. Gaborit, A. Kominiarz. The Rank-Based Cryptography Library. International Workshop on Code-Based Cryptography (CBC), 2021. [pdf]
- G. Wafo-Tapa, S. Bettaieb, L. Bidoux, P. Gaborit, E. Marcatel. A practicable timing attack against HQC and its countermeasure. Advances in Mathematics of Communications (AMC), 2020. [pdf]
- S. Bettaieb, L. Bidoux, P. Gaborit, E. Marcatel. Preventing timing attacks against RQC using constant time decoding of Gabidulin codes. 10th International Conference on Post-Quantum Cryptography (PQCrypto), 2019. [pdf]
- S. Bettaieb, L. Bidoux, Y. Connan, P. Gaborit, A. Hauteville. The Learning with Rank Errors problem and an application to symmetric authentication. IEEE International Symposium on Information Theory (ISIT), 2018. [pdf]
Automated Planning and Multi-Criteria Decision Analysis
I studied preference-based planning in the case where preferences are represented using the Multi-Attribute Utility Theory along with a Choquet integral.
This led to the creation of ChoPlan, a planner that was deployed in an information system for planning in crisis management context.
- L. Bidoux, J.P. Pignon, F. Bénaben. Planning with Preferences using Multi-Attribute Utility Theory along with a Choquet Integral. Engineering Applications of Artificial Intelligence (EAAI), 2019. [pdf]
- L. Bidoux, J.P. Pignon, F. Bénaben. On the use of automated planning in crisis management. 14th international conference on Information Systems for Crisis Response and Management (ISCRAM), 2017. [pdf]