Publications

BOOKS

PREPRINTS

  • N/A

JOURNAL PAPERS

  • Rodrigue Oeuvray and Pascal Junod, A Practical Approach to Semideviation and Its Time Scaling in a Jump-Diffusion Process, to appear in Quantitative Finance, 2014.
  • Nino Walenta, Andreas Burg, Dario Caselunghe, Jeremy Constantin, Nicolas Gisin, Olivier Guinnard, Raphael Houlmann, Pascal Junod, Boris Korzh, Natalia Kulesza, Matthieu Legré, Charles Ci Wen Lim, Tommaso Lunghi, Laurent Monat, Christopher Portmann, Mathilde Soucarros, Patrick Trinkler, Gregory Trolliet, Fabien Vannel, Hugo Zbinden, A fast and versatile QKD system with hardware key distillation and wavelength multiplexing. New Journal of Physics, Volume 16(1), 013047, 2014. [DOI/arXiv]
  • Damien Stucki, Matthieu Legré, François Buntschu, Christoph Clausen, Norbert Felber, Nicolas Gisin, Luca Henzen, Pascal Junod, Gérald Litzistorf, Patrick Monbaron, Laurent Monat, Jeff B. Page, Didier Perroud, Grégoire Ribordy, Alexis Rochas, Samuel Robyr, José Tavares, Rob Thew, Patrick Trinkler, Stefano Ventura, Raphaël Voirol, Nino Walenta, and Hugo Zbinden Long term performance of the SwissQuantum quantum key distribution network in a field environment, New Journal of Physics, Volume 13, 123001, 2011. [DOI]
  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Characterization and improvement of time-memory trade-off based on perfect tables, ACM Transactions on Information and System Security (TISSEC), Volume 11, Issue 4 (July), 2008. [PDF ]

CONFERENCE PAPERS WITH PEER REVIEW

  • Hugo Zbinden, Nino Walenta, Olivier Guinnard, Raphael Houlmann, Charles Lim Ci Wen, Boris Korzh, Tommaso Lunghi, Nicolas Gisin, Andreas Burg, Jeremy Constantin, Matthieu Legré, Patrick Trinkler, Dario Caselunghe, Natalia Kulesza, Gregory Trolliet, Fabien Vannel, Pascal Junod, Olivier Auberson, Yoan Graf, Gilles Curchod, Gilles Habegger, Etienne Messerli, Christopher Portmann, Luca Henzen, Christoph Keller, Christian Pendl, Michael Mühlberghuber, Christoph Roth, Norbert Felber, Frank Gürkaynak, Daniel Schöni, Beat Muheim, Continuous QKD and high speed data encryption, Proceedings of SPIE 8899, October 29, Dresden, Germany, 2013. [DOI]
  • Damien Stucki, Matthieu Legré, Laurent Monat, Samuel Robyr, Patrick Trinkler, Grégoire Ribordy, Rob Thew, Nino Walenta, Nicolas Gisin, François Buntschu, Didier Perroud, Gérald Litzistorf, Stefano Ventura, Pascal Junod, Raphaël Voirol and Patrick Monbaron, Performance of the SwissQuantum network over 21 months, Proceedings of SPIE 8189, September 19, Prague, Czech Republic , 2011. [DOI]
  • Pascal Junod and Alexandre Karlov, An Efficient Public-Key Attribute-Based Broadcast Encryption Scheme Allowing Arbitrary Access Policies, Proceedings of the 10th ACM Workshop on Digital Rights Management (DRM 2010), October 4, 2010,  Chicago, Illinois, USA, pp. 13-24, ACM, 2010. [PDF ]
  • Pascal Junod and Marco Macchetti, Revisiting the IDEA philosophy, Fast Software Encryption, 16th International Workshop, FSE 2009, February 22-25, 2009, Leuven, Belgium, Revised Selected Papers, Lecture Notes in Computer Science, 5665, pp. 277-295, Springer, 2009. [PDF ]
  • Pascal Junod, Alexandre Karlov and Arjen K. Lenstra, Improving the Boneh-Franklin traitor tracing scheme, Public Key Cryptography – PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009, Proceedings, Lecture Notes in Computer Science, 5443, pp. 88-104, Springer, 2009. [PDF ]
  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Time-memory tradeoffs: false alarm detection using checkpoints, Progress in Cryptology – INDOCRYPT’05, 6th International Conference on Cryptology in India, December 10-12, 2005, Bengalore, India, Proceedings, Lecture Notes in Computer Science, 3797, pp. 183-196, Springer-Verlag, 2005. [PDF ]
  • Simon Künzli, Pascal Junod, Willi Meier, Distinguishing attacks on T-functions, Progress in Cryptology – Mycrypt’05, First International Conference on Cryptology in Malaysia, September 26th – October 1st, 2005, Kuala-Lumpur, Malaysia, Lecture Notes in Computer Science, 3715, pp. 2-15, Springer-Verlag, 2005. Best Paper Award [PDF ]
  • Pascal Junod, New attacks against reduced-round versions of IDEA, Fast Software Encryption (FSE’05), 12th International Workshop, February 21-23, 2005, Paris, France, Revised Selected Papers, Lecture Notes in Computer Science, 3557, pp. 384-397, Springer-Verlag, 2005. [PDF ]
  • Thomas Baignères, Pascal Junod, Serge Vaudenay, How far can we go beyond linear cryptanalysis ?, Advances in Cryptology – ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, Lecture Notes in Computer Science, 3329, pp. 432-450. Springer-Verlag, 2004. [PDF ]
  • Pascal Junod, Serge Vaudenay, FOX: a new family of block ciphers, Selected Areas in Cryptography (SAC’04), 11th International Workshop, August 9-10, 2004, Waterloo, Canada, Revised Selected Papers, Lecture Notes in Computer Science, 3357, pp. 114-129, Springer-Verlag. [PDF ]
  • Pascal Junod, Serge Vaudenay, Perfect diffusion primitives for block ciphers – building efficient MDS matrices, Selected Areas in Cryptography (SAC’04), August 9-10, 2004, Waterloo, Canada, Revised Selected Papers, Lecture Notes in Computer Science, 3357, pp. 84-99, Springer-Verlag. [PDF ]
  • Pascal Junod, On the optimality of linear, differential and sequential distinguishers, in Advances in Cryptology — EUROCRYPT’03, May 4-8, Warsaw, Poland, Lecture Notes in Computer Science, 2656, pp. 17-32, Springer-Verlag, 2003. [PDF ]
  • Pascal Junod, Serge Vaudenay, Optimal key ranking procedures in a statistical cryptanalysis, Fast Software Encryption (FSE’03), 10th International Workshop, February 24-26, Lund, Sweden, Lecture Notes in Computer Science, 2887, pp. 235-246, Springer-Verlag, 2003. [PDF ]
  • Pascal Junod, On the complexity of Matsui’s attack, Selected Areas in Cryptography (SAC’01), Toronto, Canada, Lecture Notes in Computer Science, 2259, pp. 199-211, Springer-Verlag, 2001. [PDF ]

VULGARIZATION

PATENTS

  • Pascal Junod, Method for generating software code, EP 2338730, May 2010.
  • Pascal Junod, Alexandre Karlov, Method for public-key attribute-based encryption with respect to a conjunctive logical expression, WO/2011/061285, November 2009.
  • Pascal Junod, Method for authenticating access to a secured chip by a test device, WO/2010/130709, May 2009.
  • Alexandre Karlov, Pascal Junod, Method to enforce by a management center the access rules for a broadcast product, WO/2010/031781, September 2008.
  • Pascal Junod, Olivier Brique, Method for updating security data in a security module and security module for implementing this method , EP 2129115, May 2008.
  • Alexandre Karlov, Pascal Junod, Method to trace traceable parts of original private keys in a public-key cryptosystem, WO/2009/080683, December 2007.
  • Alexandre Karlov, Pascal Junod, Method to generate a private key in a Boneh-Franklin scheme, WO/2009/071639, December 2007.
  • Pascal Junod, Method of revocation of security modules used to secure broadcast messages, WO/2008/020041, August 2006.
  • Thierry Lelégard, Pascal Junod, Method for encrypting and decrypting a conditional access content, WO/2007/068720, December 2005.
  • Pascal Junod, Serge Vaudenay, Method for generating pseudo-random sequence, WO/2005/025123, September 2003.
  • Pascal Junod, Serge Vaudenay, Device and method for encrypting and decrypting a block of Data, WO/2004/105305, May 2003.

TALKS

  • Cyber-Sécurité en 2014: Bienvenue au Far-West!, Keynote, InnovaudConnect@AppSec, November 5th, 2014, Yverdon-les-Bains, Switzerland. [PDF ]
  • Obfuscator-LLVM — Software Obfuscation for the Masses, area41, June 2nd, 2014, Zürich, Switzerland. [PDF ]
  • Sécurité informatique: késako?, September 4th, 2013, La Chaux-de-Fonds, Switzerland. [PDF ]
  • LLVM and Code Obfuscation, Université Catholique de Louvain, June 26th, 2013, Louvain-la-Neuve, Belgium. [PDF ]
  • Playing Hide-and-Seek with Hash-DoS, Insomni’Hack 2013, March 22nd, 2013, Geneva, Switzerland.  [PDF ]
  • QCrypt: Implementing a Next-Generation Quantum Key Distillation Engine in Practice, ESC’13, January 18th, 2013, Mondorf-les-Bains, Luxembourg. [PDF ]
  • Obfuscator, Workshop final du projet, December 3rd, 2012, Yverdon-les-Bains, Switzerland. [PDF ]
  • Obfuscator reloaded, Application Security Forum – Western Switzerland, November 7th, 2012, Yverdon-les-Bains, Switzerland. [PDF ]
  • Bridging Theory and Practice in Cryptography, ECRYPT Workshop on Lightweight Cryptography, November 28-29, 2011, Louvain-la-Neuve, Belgium. [PDF ]
  • Software Obfuscation: Quid Novi ?, Application Security Forum – Western Switzerland, October 27th, 2011, Yverdon-les-Bains, Switzerland. [PDF ]
  • Software Obfuscation: Quid Novi ?, 0sec, October 14th, 2011, Bern, Switzerland.
  • Advanced Block Cipher Design, ECRYPT II Summer School, May 31st, 2011, Albena, Bulgaria. [PDF ]
  • Cryptographie: de la Théorie à la Pratique, CLUSIS, March 8th, 2011, Genève, Suisse.
    [PDF ]
  • La Cryptographie, Insomni’Hack 2011, March 4th, 2011, Genève, Suisse. [PDF ]
  • Open-Source Cryptographic Libraries and Embedded Platforms, Hashdays 2010, November 5th, 2010, Luzern, Switzerland. [PDF ]
  • IDEA – Past, Present and Future, ESC’10, January 14th, 2010, Remich, Luxembourg. [PDF ]
  • Exploitation de l’identité numérique, Journée sur l’identité numérique et la sphère privée, June 16th, 2009, Hôtel Royal Savoy, Lausanne, Switzerland. [PDF ]
  • Yet another proof of the PRP/PRF switching lemma, EUROCRYPT’05 (rump session), May 24th, 2005, Aarhus, Denmark.
  • New attacks against reduced-round versions of IDEA, FSE’05, February 23rd, 2005, Paris, France. [PDF ]
  • Attacks against TSC, FSE’05 (rump session), February 21st, 2005, Paris, France. [PDF ]
  • Statistical cryptanalysis of block ciphers, Journées Codes et Cryptographie, February 2nd, 2005, Aussois (Savoie), France. [PDF ]
  • FOX: a new family of block ciphers, SAC’04, August 9, 2004, Waterloo, Canada. [PDF ]
  • Perfect diffusion primitives for block ciphers – building efficient MDS matrices, SAC’04, August 9, 2004, Waterloo, Canada. [PDF ]
  • FOX – une nouvelle famille d’algorithmes de chiffrement par bloc (in french), November 24, 2003, Institut Fourier, Université Joseph Fourier, Grenoble, France. [PDF ]
  • A Brief Outlook at Block Ciphers, Summer School “Cryptologie, Sécurité et Applications”, September 8-12, 2003,  Rabat, Morocco. [PDF ]
  • On the optimality of linear, differential and sequential distinguishers, EUROCRYPT’03, May 5, 2003, Warsaw, Poland. [PDF ]
  • Optimal key ranking procedures in a statistical cryptanalysis, Fast Software Encryption (FSE’03), February 24-26, 2003, Lund, Sweden. [PDF ]
  • On the complexity of Matsui’s attack, Selected Areas in Cryptography (SAC’01), Toronto, Canada, 2001. [PDF ]
  • On the complexity of Matsui’s attack, Workshop on Cryptographic Protocols, March 18-23, 2001, Monte-Verita, Ascona, Switzerland. [PDF ]
  • On the complexity of Matsui’s attack, ASIACRYPT’00, Rump Session, December 3-7, 2000, Kyoto, Japan. [PDF ]

MISCELLANEOUS

  • Rodrigue Oeuvray and Pascal Junod, On time scaling of semivariance in a jump-diffusion process. [arXiv]
  • Graham Turner, Corinne Le Buhan Jordan, Robin Wilson, Pascal Junod, The influence of network evolution, cryptography advances, and the need for flexible entitlement models in DCAS design, 58th Annual IEEE Broadcast Symposium (Alexandria, VA, USA).
  • Alexandre Karlov, Pascal Junod, Arjen K. Lenstra, Improving the Boneh-Franklin traitor tracing scheme, IACR Eprint Archive 2008/384. [PDF ]
  • Gildas Avoine, Pascal Junod, Philippe Oechslin, Time-Memory Tradeoffs: False Alarms Detection Using Checkpoints, Technical Report LASEC-REPORT-2005-002, EPFL/LASEC, Switzerland, 2005. [PDF ]
  • Pascal Junod, Serge Vaudenay, FOX Specifications Version 1.2, 2005. [PDF ]
  • Pascal Junod, Statistical Cryptanalysis of Block Ciphers, PhD thesis number 3179, École Polytechnique Fédérale de Lausanne, Switzerland, 2004. [PDF ]
  • Pascal Junod, Serge Vaudenay, FOX Specifications Version 1.1, technical report EPFL/IC/2004/75, 2004. [PDF ]
  • Pascal Junod, Serge Vaudenay, FOX Specifications Version 1.0, technical report EPFL/IC/2003/82, 2003. [PDF ]
  • Pascal Junod, On the optimality of linear, differential and sequential distinguishers (full version), IACR Eprint Archive 2003/064, 2003. [PDF ]
  • Nicolas Courtois, Rob Johnson, Pascal Junod, Thomas Pornin, Michael Scott, Did Filiol Break AES ?IACR Eprint Archive 2003/022, 2003. [PDF ]
  • Pascal Junod, Linear Cryptanalysis of DES, master thesis, Computer Science Department, ETH Zürich, 2000. [PDF ]
  • Pascal Junod Cryptographic Secure Pseudo-Random Bits Generation : the Blum-Blum-Shub Generator, manuscript, 1999. [PDF ]
  • Pascal Junod, Implementation of a point visibility algorithm on digital terrain models, semester thesis, Computer Science Department, ETH Zürich, 1999. [PDF ]
  • Pascal Junod Unconditionally secure key-agreement: two case studies, semester thesis, Computer Science Department, ETH Zürich, 1999. [PDF ]
  • Sandro Buss, Pascal Junod, High period power spectra of horizontal wind speed over twenty years at three different locations, semester thesis, Computer Science Department, ETH Zürich, 1998.

Comments Off