Miscellaneous Research
[39] J.-F. Biasse, S. Chelleppan, S. Kariev, N. Khan, L. Menezes, E. Seyitoglu, C. Somboonwit, A. Yavuz Trace-: a privacy-preserving contact tracing app . pdf bib.
[38] J.-F. Biasse, W. Youmans, S. Chellappan, N. Fisk, and N. Khan Anonymity preserving
data collection using homomorphic encryption . pdf. U.S. Patent Application 17/213, 965.
[37] M.Baldi, Alessandro Barenghi, L. Beckwith, J.-F. Biasse, A. Esser, K. Gaj, K. Mohajerani, G. Pelosi, E. Persichetti, M.-J. O. Saarinen, P. Santini and R. Wallace LESS: NIST Additional Digital Signature Schemes - Round 1 Submission . Link bib.
Journal papers
[36] J.-F. Biasse, C. Fieker, T. Hofmann, and W. Youmans An Algorithm for Solving the Principal Ideal Problem with Subfields Advances in Mathematics of Communications, early access, 2023.
[35] J.-F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, and F. Song Quantum Algorithms to attack Hardness Assumptions in Post-Quantum Cryptography IET, Information Security, 17(2):171-209, 2023. pdf
[34] J.-F. Biasse and M. R. Erukulangara A proof of the conjectured run time of the Hafner-McCurley class group algorithm Advances in Mathematics of Communications, 17(6):1388-1405, 2023.
[33] J.-F. Biasse, M. R. Erukulangara, C. Fieker, T. Hofmann, and W. Youmans Mildly Short Vectors in Ideal Lattices of Certain Families of Cyclotomic Fields Without Quantum Computers Mathematical Cryptology, 2(1):84-107, 2022. pdf
[32] A. Barenghi, J.-F. Biasse, E. Persichetti, and P. Santini On the Computational Hardness of the Code Equivalence Problem in Cryptography Advances in Mathematics of Communications, 17(1):23-55, 2022. pdf
[31] A. Barenghi, J.-F. Biasse, E. Persichetti, and P. Santini Advanced Functionalities for Signatures from the Code Equivalence Problem. International Journal of Computer Mathematics: Computer Systems Theory, 7(2):112-128, 2022.
[30] J.-F. Biasse, C. Fieker, T. Hofmann, and A. Page Norm relations and computational problems in number fields Journal of the London Mathematical Society 105(4):2373-2414, 2022. pdf bib.
[29] ] R. Azarderakhsh, J.-F. Biasse, R. El Khatib, B. Langenberg, and B. Pring Parallelism strategies for the tuneable golden-claw finding problem International Journal of Computer Mathematics: Computer Systems Theory, 6(4):337-363, 2021.
[28] J.-F. Biasse and B. Pring A framework for reducing the overhead of the quantum oracle for use with Grovers algorithm with applications to cryptanalysis of SIKE Journal of Mathematical Cryptology, 15(1):143-156, 2021.
[27] J.-F. Biasse, X. Bonnetain, B. Pring, A. Schrottenloher, and W. Youmans A trade-off between classical and quantum circuit size for an attack against CSIDH Journal of Mathematical Cryptology, 15(1):4-17, 2021.
[26] J.-F. Biasse and F. Song On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(ζ2ⁿ) Journal of Mathematical Cryptology, 13(3-4):151-168, 2019. pdf bib.
[25] J.-F. Biasse, C. Fieker and T. Hofmann On the HNF computation of modules over the ring of integers of a number field
Journal of Symbolic Computation, 80:581-615, 2017. pdf bib.
[24] J.-F. Biasse, C. Fieker and M. Jacobson Jr Fast heuristic algorithms for computing relations in the class
group of a quadratic order with applications to isogeny evaluation ,
LMS Journal of Computation and Mathematics, 19:371-390, 2016. pdf bib.
[23] J.-F. Biasse Subexponential time ideal decomposition in orders of number fields of large degree
Advances in Mathematics of Communications, 8(4):407-425, 2014.
pdf bib.
[22] J.-F. Biasse and M. Jacobson Jr. Batch smoothness test of polynomials over finite fields
Advances in Mathematics of Communications, 8(4):459-477, 2014.
pdf bib.
[21] J.-F. Biasse and C. Fieker Subexponential class group and unit group computation in large degree number fields
LMS Journal of Computation and Mathematics, 17:385-403, 2014.
pdf
bib
[20] J.-F. Biasse An L(1/3) algorithm for ideal class group and regulator computation in certain number fields
Mathematics of Computation, 83(288):2005-2031, 2014. pdf bib
[19] J.-F. Biasse Practical improvements to ideal class group computation in imaginary quadratic number fields
Advances in Mathematics of Communications, 4(2):141-154, 2010.
pdf bib
Conference proceedings with reviewing committee
[18] J.-F. Biasse and G. Micheli A Search-to-Decision Reduction for the Permutation Code Equivalence Problem IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan pp. 602-607 2023.
[17] A. Barenghi, J.-F. Biasse, E. Persichetti, and P. Santini LESS-FM: Fine-Tuning Signatures from the Code Equivalence Problem Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings Lecture Notes in Computer Science,
vol. 12841, Springer 2021, pp. 23-43. pdf.
[16] J.-F. Biasse, G. Micheli, E. Persichetti and P. Santini LESS is More: Code-Based Signatures without Syndromes 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020 Lecture Notes in Computer Science,
vol. 12174, Springer 2020, pp. 45-65. pdf bib.
[15] J.-F. Biasse, A. Iezzi and M. Jacboson A note on the security of CSIDH 19th International Conference on Cryptology in India (INDOCRYPT), New Delhi, India, December 9-12, 2018 Lecture Notes in Computer Science,
vol. 11356, Springer 2018, pp. 153-168. pdf bib.
[14] J.-F. Biasse and C. van Vredendaal Fast multiquadratic S-unit computation and application to the calculation of class groups Proceedings of the 13th Algorithmic Number Theory Symposium (ANTS XIII) Open Book Series - Mathematical Science Publishers, 2019, vol. 2
pp. 103-118. pdf bib.
[13] J.-F. Biasse Approximate short vectors in ideals of ℚ(ζ2ⁿ) with precomputation of the class groups Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Lecture Notes in Computer Science vol. 10719 Springer, 2017 pp. 374-393. pdf bib.
[12] D. Bernstein, J.-F. Biasse and M. Mosca A low-resource quantum factoring algorithm Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings,
Lecture Notes in Computer Science vol. 10346 Springer, 2017 pp. 330-346. pdf bib
[11] J.-F. Biasse, T. Espiteau, A. Gelin, P.-A. Fouque and P. Kirchener A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France,
Lecture Notes in Computer Science vol. 10210 Springer, 2017 pp. 60-88. pdf bib
[10] J.-F. Biasse and F. Song A polynomial time quantum algorithm for computing class groups and solving the principal ideal problem in arbitrary
degree number fields Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, (SODA), Arlington, VA, USA, January 10-12, 2016,
SIAM, 2016 pp. 893-902. pdf bib
[9] J.-F. Biasse and L. Ruis FHEW with fast multibit bootstrapping
4th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT), Guadalajara,
Mexico, August 23-26, 2015, Lecture Notes in Computer Science,
vol. 9230, Springer 2015, pp. 119-135. pdf bib.
[8] J.-F. Biasse, D. Jao and A. Sankar A quantum algorithm for computing isogenies between supersingular curves
15th International Conference on Cryptology in India (INDOCRYPT), New Delhi, India, December 14-17, 2014 Lecture Notes in Computer Science,
vol. 8885, Springer 2014, pp. 428-442. pdf bib.
[7] J.-F. Biasse and Claus Fieker Improved techniques for computing the ideal class group and a system of fundamental units in number fields
Proceedings of the 10th Algorithmic Number Theory Symposium (ANTS X) Open Book Series - Mathematical Science Publishers, 2012, vol. 1
pp. 113-133.pdf bib
[6] J.-F. Biasse and G. Quintin An algorithm for list decoding number field codes
Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, July
1-6, 2012, IEEE, 2012 pp. 91-95.pdf bib
[5] J.-F. Biasse and C. Fieker A polynomial time algorithm for computing the HNF of a module over the integers of a number field
International Symposium on Symbolic and Algebraic Computation (ISSAC) Grenoble, France - July 22 - 25, 2012, ACM, 2012 pp. 75-82.
pdf bib
[4] J.-F. Biasse M. Jacobson Jr. and A. Silverster Algebraic techniques for number fields
2nd International Conference on Symbolic Computation and Cryptography (SCC 2010, Egham, UK).
pdf bib
[3] J.-F. Biasse and M. Jacobson Jr. Practical improvements to class group and regulator computation in real number fields
Proceedings of the 9th Algorithmic Number Theory Symposium (ANTS IX), Lecture Notes in Computer Science vol. 6197, Springer 2010, pp. 50-67.
pdf bib
[2] J.-F. Biasse M. Jacobson Jr. and A. Silverster Security estimates for number field based cryptosystems
Australasian Conference in Information Security and Privacy (ACISP) , Lecture Notes in Computer Science,
vol. 6168, Springer 2010, pp. 233-247. pdf bib
[1] J.-F. Biasse, C. Berbain, M. Robshaw, S. Fisher and W. Meier Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
7th International Conference on Cryptology in India (INDOCRYPT) Lecture Notes in Computer Science,
vol. 4329, Springer 2006, pp. 2-16. pdf bib