BOOKS

  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Sylvain Pasini, Sécurité informatique - Cours et Exercices Corrigés, third edition, Vuibert, 2015. Augmented and updated version of the 2004 and 2010 editions. ISBN 978-2-311-40168-4.

  • Pascal Junod, Anne Canteaut (editors), Advanced Linear Cryptanalysis of Block and Stream Ciphers, volume 7 of Cryptology and Information Security Series, IOS Press, 2011. ISBN 978-1-60750-843-4.

  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Computer Systems Security, EPFL Press (ISBN 978-2-940222-14-8) and CRC Press (ISBN 978-1-4200-4620-5), 2007.

  • Thomas Baignères, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay, A Classical Introduction to Cryptography – Exercise Book, Springer-Verlag, 2006. ISBN 0-387-27943-2.

  • Doug Stinson, Cryptographie: Théorie et Pratique, 2nd ed ition, french translation by Gildas Avoine, Pascal Junod and Serge Vaudenay, Vuibert, 2003. ISBN 2-7117-4800-6.

JOURNAL PAPERS

  • Jeremy Constantin, Raphael Houlmann, Nicholas Preyss, Nino Walenta, Hugo Zbinden, Pascal Junod, Andreas Burg, An FPGA-Based 4Mbps Secret Key Distillation Engine for Quantum Key Distribution Systems, Journal of Signal Processing Systems, volume 86(1), pp. 1-15, 2017. DOI

  • Rodrigue Oeuvray and Pascal Junod, A Practical Approach to Semideviation and its Time Scaling in a Jump-Diffusion Process, Quantitative Finance, volume 15(5), pp. 809-827, 2014. DOI

  • Nino Walenta, Andreas Burg, Dario Caselunghe, Jeremy Constantin, Nicolas Gisin, Olivier Guinnard, Raphael Houlmann, Pascal Junod, Boris Korzh, Natalia Kulesza, Matthieu Legré, Charles Ci Wen Lim, Tommaso Lunghi, Laurent Monat, Christopher Portmann, Mathilde Soucarros, Patrick Trinkler, Gregory Trolliet, Fabien Vannel, Hugo Zbinden, A Fast and Versatile QKD System with Hardware Key Distillation and Wavelength Multiplexing, New Journal of Physics, volume 16(1), 013047, 2014. DOI arXiv

  • Damien Stucki, Matthieu Legré, François Buntschu, Christoph Clausen, Norbert Felber, Nicolas Gisin, Luca Henzen, Pascal Junod, Gérald Litzistorf, Patrick Monbaron, Laurent Monat, Jeff B. Page, Didier Perroud, Grégoire Ribordy, Alexis Rochas, Samuel Robyr, José Tavares, Rob Thew, Patrick Trinkler, Stefano Ventura, Raphaël Voirol, Nino Walenta, and Hugo Zbinden Long-Term Performance of the SwissQuantum Quantum Key Distribution Network in a Field Environment, New Journal of Physics, volume 13, 123001, 2011. DOI

  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables, ACM Transactions on Information and System Security (TISSEC), volume 11, issue 4 (July), 2008. DOI PDF

CONFERENCE PAPERS WITH PEER REVIEW

  • Benjamin Wesolowski and Pascal Junod, Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys, Proceedings of Information Security and Cryptology – ICISC 2015, 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised selected papers, Lecture Notes in Computer Science, 9558, pp. 53-68, Springer-Verlag, 2016. DOI Full version available on IACR ePrint Archive, report 2015-836, 2015.

  • Pascal Junod, Julien Rinaldini, Johan Wehrli and Julie Michielin, Obfuscator-LLVM: Software Protection for the Masses, Proceedings of the IEEE Workshop on Software Protection SPRO’15, May 19th, 2015, Firenze, Italia, pp. 3-9, IEEE, 2015. PDF

  • Hugo Zbinden, Nino Walenta, Olivier Guinnard, Raphael Houlmann, Charles Lim Ci Wen, Boris Korzh, Tommaso Lunghi, Nicolas Gisin, Andreas Burg, Jeremy Constantin, Matthieu Legré, Patrick Trinkler, Dario Caselunghe, Natalia Kulesza, Gregory Trolliet, Fabien Vannel, Pascal Junod, Olivier Auberson, Yoan Graf, Gilles Curchod, Gilles Habegger, Etienne Messerli, Christopher Portmann, Luca Henzen, Christoph Keller, Christian Pendl, Michael Mühlberghuber, Christoph Roth, Norbert Felber, Frank Gürkaynak, Daniel Schöni, Beat Muheim, Continuous QKD and High Speed Data Encryption, Proceedings of SPIE 8899, October 29, Dresden, Germany, 2013. DOI

  • Damien Stucki, Matthieu Legré, Laurent Monat, Samuel Robyr, Patrick Trinkler, Grégoire Ribordy, Rob Thew, Nino Walenta, Nicolas Gisin, François Buntschu, Didier Perroud, Gérald Litzistorf, Stefano Ventura, Pascal Junod, Raphaël Voirol and Patrick Monbaron, Performance of the SwissQuantum Network over 21 Months, Proceedings of SPIE 8189, September 19, Prague, Czech Republic , 2011. DOI

  • Pascal Junod and Alexandre Karlov, An Efficient Public-Key Attribute-Based Broadcast Encryption Scheme Allowing Arbitrary Access Policies, Proceedings of the 10th ACM Workshop on Digital Rights Management (DRM 2010), October 4, 2010, Chicago, Illinois, USA, pp. 13-24, ACM, 2010. PDF

  • Pascal Junod and Marco Macchetti, Revisiting the IDEA Philosophy, Fast Software Encryption, 16th International Workshop, FSE 2009, February 22-25, 2009, Leuven, Belgium, Revised Selected Papers, Lecture Notes in Computer Science, 5665, pp. 277-295, Springer, 2009. PDF

  • Pascal Junod, Alexandre Karlov and Arjen K. Lenstra, Improving the Boneh-Franklin Traitor Tracing Scheme, Public Key Cryptography – PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009, Proceedings, Lecture Notes in Computer Science, 5443, pp. 88-104, Springer, 2009. PDF

  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Time-Memory Tradeoffs: False Alarm Detection using Checkpoints, Progress in Cryptology – INDOCRYPT’05, 6th International Conference on Cryptology in India, December 10-12, 2005, Bengalore, India, Proceedings, Lecture Notes in Computer Science, 3797, pp. 183-196, Springer-Verlag, 2005. PDF

  • Simon Künzli, Pascal Junod, Willi Meier, Distinguishing Attacks on T-functions, Progress in Cryptology – Mycrypt’05, First International Conference on Cryptology in Malaysia, September 26th – October 1st, 2005, Kuala-Lumpur, Malaysia, Lecture Notes in Computer Science, 3715, pp. 2-15, Springer-Verlag, 2005. Best Paper Award. PDF

  • Pascal Junod, New Attacks against Reduced-Round Versions of IDEA, Fast Software Encryption (FSE’05), 12th International Workshop, February 21-23, 2005, Paris, France, Revised Selected Papers, Lecture Notes in Computer Science, 3557, pp. 384-397, Springer-Verlag, 2005. PDF

  • Thomas Baignères, Pascal Junod, Serge Vaudenay, How Far Can We Go Beyond Linear Cryptanalysis ?, Advances in Cryptology – ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, Lecture Notes in Computer Science, 3329, pp. 432-450. Springer-Verlag, 2004. IACR Test-of-Time Award. PDF

  • Pascal Junod, Serge Vaudenay, FOX: a New Family of Block Ciphers, Selected Areas in Cryptography (SAC’04), 11th International Workshop, August 9-10, 2004, Waterloo, Canada, Revised Selected Papers, Lecture Notes in Computer Science, 3357, pp. 114-129, Springer-Verlag. PDF

  • Pascal Junod, Serge Vaudenay, Perfect Diffusion Primitives for Block Ciphers – Building Efficient MDS Matrices, Selected Areas in Cryptography (SAC’04), August 9-10, 2004, Waterloo, Canada, Revised Selected Papers, Lecture Notes in Computer Science, 3357, pp. 84-99, Springer-Verlag. PDF

  • Pascal Junod, On the Optimality of Linear, Differential and Sequential Distinguishers, in Advances in Cryptology – EUROCRYPT’03, May 4-8, Warsaw, Poland, Lecture Notes in Computer Science, 2656, pp. 17-32, Springer-Verlag, 2003. PDF

  • Pascal Junod, Serge Vaudenay, Optimal Key Ranking Procedures in a Statistical Cryptanalysis, Fast Software Encryption (FSE’03), 10th International Workshop, February 24-26, Lund, Sweden, Lecture Notes in Computer Science, 2887, pp. 235-246, Springer-Verlag, 2003. PDF

  • Pascal Junod, On the Complexity of Matsui’s Attack, Selected Areas in Cryptography (SAC’01), Toronto, Canada, Lecture Notes in Computer Science, 2259, pp. 199-211, Springer-Verlag, 2001. PDF

VULGARIZATION

  • Pascal Junod, Cryptographie et Standardisation (in french), Market.ch, 12-2009. PDF

  • Pascal Junod, Les Fonctions de Hachage Sortiraient-Elles de l’Ombre ? (in french), Multi-System and Internet Security Cookbook (MISC), n. 18, mars-avril 2005.

  • Pascal Junod, Frédéric Raynal, Dix Dangers qui Guettent le Programmeur de Cryptographie (in french), Multi-System and Internet Security Cookbook (MISC), n. 12, mars-avril 2004.

  • Pascal Junod, Problèmes d’Implémentation de la Cryptographie: les Attaques par Effet de Bord (in french), Multi-System and Internet Security Cookbook (MISC), n. 4, novembre-décembre 2002.

  • Gildas Avoine, Pascal Junod, PGP: Comment Éviter les Mauvaises Surprises ? (in french), Multi-System and Internet Security Cookbook (MISC), n. 3, juillet 2002.

  • Pascal Junod, Six Façons Différentes de Casser DES (in french), Flash Informatique Spécial Été, EPFL, 2000. PDF

PATENTS

  • Pascal Junod, Method for Generating Software Code, EP 2338730, May 2010.

  • Pascal Junod, Alexandre Karlov, Method for Public-Key Attribute-Based Encryption with Respect to a Conjunctive Logical Expression, WO/2011/061285, November 2009.

  • Pascal Junod, Method for Authenticating Access to a Secured Chip by a Test Device, WO/2010/130709, May 2009.

  • Alexandre Karlov, Pascal Junod, Method to Enforce by a Management Center the Access Rules for a Broadcast Product, WO/2010/031781, September 2008.

  • Pascal Junod, Olivier Brique, Method for Updating Security Data in a Security Module and Security Module for Implementing this Method , EP 2129115, May 2008.

  • Alexandre Karlov, Pascal Junod, Method to Trace Traceable Parts of Original Private Keys in a Public-Key Cryptosystem, WO/2009/080683, December 2007.

  • Alexandre Karlov, Pascal Junod, Method to Generate a Private Key in a Boneh-Franklin Scheme, WO/2009/071639, December 2007.

  • Pascal Junod, Method of Revocation of Security Modules Used to Secure Broadcast Messages, WO/2008/020041, August 2006.

  • Thierry Lelégard, Pascal Junod, Method for Encrypting and Decrypting a Conditional Access Content, WO/2007/068720, December 2005.

  • Pascal Junod, Serge Vaudenay, Method for Generating Pseudo-Random Sequence, WO/2005/025123, September 2003.

  • Pascal Junod, Serge Vaudenay, Device and Method for Encrypting and Decrypting a Block of Data, WO/2004/105305, May 2003.

TALKS

  • Computing on Encrypted Data: a Survey, BlackAlps’19, November 7th, 2019, Yverdon-les-Bains, Switzerland.

  • Looking into the White-Box, area41, June 15th, 2018, Zürich, Switzerland.

  • Confessions d’un Cyber-Serrurier, Association Vaudoise des Banques, November 2nd, 2017, Lausanne, Switzerland.

  • Towards Developer-Proof Cryptography, Summer Research Institute, June 20th, 2016, School of Computer and Communication Sciences, EPFL, Lausanne, Switzerland. PDF

  • Are Crypto APIs Good Friends of Developers?, area41, June 10th, 2016, Zürich, Switzerland. PDF

  • Secure Software Development and Beyond, Fri Software Days, February 1st, 2016, Fribourg, Switzerland. PDF

  • Ciphertext-Policy Attributed-Based Broadcast Encryption with Small Keys, ICISC’15, November 25th, 2015, Seoul, South Korea. PDF

  • The Long Journey from Papers to Software: Crypto APIs, IACR Cryptology School on Design and Security of Cryptographic Algorithms and Devices, October 23rd, 2015, Chia, Sardinia, Italy. PDF

  • A Secure Development Lifecycle, DEVCON 2015, October 6th, 2015, European Broadcasting Union (EBU), Geneva, Switzerland.

  • Obfuscator-LLVM – Software Protection for the Masses, SPRO’15, May 19th, 2015, Firenze, Italy PDF

  • SSL/TLS: Still Alive?, Tech Meetings, Colab, March 27th, 2015, Fribourg, Switzerland PDF

  • Cyber-Sécurité en 2014: Bienvenue au Far-West!, Keynote, InnovaudConnect@AppSec, November 5th, 2014, Yverdon-les-Bains, Switzerland. PDF

  • Obfuscator-LLVM – Software Obfuscation for the Masses, area41, June 2nd, 2014, Zürich, Switzerland. PDF

  • Sécurité Informatique: Késako?, September 4th, 2013, La Chaux-de-Fonds, Switzerland. PDF

  • LLVM and Code Obfuscation, Université Catholique de Louvain, June 26th, 2013, Louvain-la-Neuve, Belgium. PDF

  • Playing Hide-and-Seek with Hash-DoS, Insomni’Hack 2013, March 22nd, 2013, Geneva, Switzerland. PDF

  • QCrypt: Implementing a Next-Generation Quantum Key Distillation Engine in Practice, ESC’13, January 18th, 2013, Mondorf-les-Bains, Luxembourg. PDF

  • Obfuscator, Project Final Workshop, December 3rd, 2012, Yverdon-les-Bains, Switzerland. PDF

  • Obfuscator Reloaded, Application Security Forum Western Switzerland, November 7th, 2012, Yverdon-les-Bains, Switzerland. PDF

  • Bridging Theory and Practice in Cryptography, ECRYPT Workshop on Lightweight Cryptography, November 28-29, 2011, Louvain-la-Neuve, Belgium. PDF

  • Software Obfuscation: Quid Novi ?, Application Security Forum Western Switzerland, October 27th, 2011, Yverdon-les-Bains, Switzerland. PDF

  • Software Obfuscation: Quid Novi ?, 0sec, October 14th, 2011, Bern, Switzerland.

  • Advanced Block Cipher Design, ECRYPT II Summer Schoo, May 31st, 2011, Albena, Bulgaria. PDF

  • Cryptographie: de la Théorie à la Pratique, CLUSIS, March 8th, 2011, Genève, Suisse. PDF

  • La Cryptographie, Insomni’Hack 2011, March 4th, 2011, Genève, Suisse. PDF

  • Open-Source Cryptographic Libraries and Embedded Platforms, Hashdays 2010, November 5th, 2010, Luzern, Switzerland. PDF

  • IDEA – Past, Present and Future, ESC’10, January 14th, 2010, Remich, Luxembourg. PDF

  • Exploitation de l’Identité Numérique, Journée sur l’identité numérique et la sphère privée, June 16th, 2009, Hôtel Royal Savoy, Lausanne, Switzerland. PDF

  • Yet Another Proof of the PRP/PRF Switching Lemma, EUROCRYPT’05 (rump session), May 24th, 2005, Aarhus, Denmark.

  • New Attacks against Reduced-Round Versions of IDEA, FSE’05, February 23rd, 2005, Paris, France. PDF

  • Attacks against TSC, FSE’05 (rump session), February 21st, 2005, Paris, France. PDF

  • Statistical Cryptanalysis of Block Ciphers, Journées Codes et Cryptographie, February 2nd, 2005, Aussois (Savoie), France. PDF

  • FOX: a New Family of Block Ciphers, SAC’04, August 9, 2004, Waterloo, Canada. PDF

  • Perfect Diffusion Primitives for Block Ciphers – Building Efficient MDS Matrices, SAC’04, August 9, 2004, Waterloo, Canada. PDF

  • FOX – une Nouvelle Famille d’Algorithmes de Chiffrement par Bloc (in french), November 24, 2003, Institut Fourier, Université Joseph Fourier, Grenoble, France. PDF

  • A Brief Outlook at Block Ciphers, Summer School “Cryptologie, Sécurité et Applications”, September 8-12, 2003, Rabat, Morocco. PDF

  • On the Optimality of Linear, Differential and Sequential Distinguishers, EUROCRYPT’03, May 5, 2003, Warsaw, Poland. PDF

  • Optimal Key Ranking Procedures in a Statistical Cryptanalysis, Fast Software Encryption (FSE’03), February 24-26, 2003, Lund, Sweden. PDF

  • On the Complexity of Matsui’s Attack, Selected Areas in Cryptography (SAC’01), Toronto, Canada, 2001. PDF

  • On the Complexity of Matsui’s Attack, Workshop on Cryptographic Protocols, March 18-23, 2001, Monte-Verita, Ascona, Switzerland. PDF

  • On the Complexity of Matsui’s Attack, ASIACRYPT’00, Rump Session, December 3-7, 2000, Kyoto, Japan. PDF

MISCELLANEOUS

  • Rodrigue Oeuvray and Pascal Junod, On Time Scaling of Semivariance in a Jump-Diffusion Process. arXiv

  • Graham Turner, Corinne Le Buhan Jordan, Robin Wilson, Pascal Junod, The Influence of Network Evolution, Cryptography Advances, and the Need for Flexible Entitlement Models in DCAS Design, 58th Annual IEEE Broadcast Symposium (Alexandria, VA, USA).

  • Alexandre Karlov, Pascal Junod, Arjen K. Lenstra, Improving the Boneh-Franklin Traitor Tracing Scheme, IACR ePrint Archive 2008-384. PDF

  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Time-Memory Tradeoffs: False Alarms Detection Using Checkpoints, Technical Report LASEC-REPORT-2005-002, EPFL/LASEC, Switzerland, 2005. PDF

  • Pascal Junod, Serge Vaudenay, FOX Specifications Version 1.2, 2005. PDF

  • Pascal Junod, Statistical Cryptanalysis of Block Ciphers, PhD thesis number 3179, École Polytechnique Fédérale de Lausanne, Switzerland, 2004. PDF

  • Pascal Junod, Serge Vaudenay, FOX Specifications Version 1.1, technical report EPFL/IC/2004/75, 2004. PDF

  • Pascal Junod, Serge Vaudenay, FOX Specifications Version 1.0, technical report EPFL/IC/2003/82, 2003. PDF

  • Pascal Junod, On the Optimality of Linear, Differential and Sequential Distinguishers (full version), IACR ePrint Archive 2003-064, 2003. PDF

  • Nicolas Courtois, Rob Johnson, Pascal Junod, Thomas Pornin, Michael Scott, Did Filiol Break AES ?, IACR ePrint Archive 2003-022, 2003. PDF

  • Pascal Junod, Linear Cryptanalysis of DES, master thesis, Computer Science Department, ETH Zürich, 2000. PDF

  • Pascal Junod Cryptographic Secure Pseudo-Random Bits Generation : the Blum-Blum-Shub Generator, manuscript, 1999. PDF

  • Pascal Junod, Implementation of a Point Visibility Algorithm on Digital Terrain Models, semester thesis, Computer Science Department, ETH Zürich, 1999. PDF

  • Pascal Junod Unconditionally Secure Key-Agreement: Two Case Studies, semester thesis, Computer Science Department, ETH Zürich, 1999. PDF

  • Sandro Buss, Pascal Junod, High Period Power Spectra of Horizontal Wind Speed over Twenty Years at Three Different Locations, semester thesis, Computer Science Department, ETH Zürich, 1998.