Preprints
[27] J.-F. Biasse, C. Fieker, T. Hofmann, and A. Page Norm relations and computational problems in number fields Submitted. pdf bib.
Journal papers
[26] J.-F. Biasse and B. Pring A framework for reducing the overhead of the quantum oracle for use with Grovers algorithm with applications to cryptanalysis of SIKE to appear in Journal of Mathematical Cryptology, xx(x):xxx-xxx, 2020.
[25] J.-F. Biasse, X. Bonnetain, B. Pring, A. Schrottenloher, and W. Youmans A trade-off between classical and quantum circuit size for an attack against CSIDH to appear in Journal of Mathematical Cryptology, xx(x):xxx-xxx, 2020.
[24] J.-F. Biasse and F. Song On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(ζ2ⁿ) Journal of Mathematical Cryptology, 13(3-4):151-168, 2019. pdf bib.
[23] J.-F. Biasse, C. Fieker and T. Hofmann On the HNF computation of modules over the ring of integers of a number field
Journal of Symbolic Computation, 80:581-615, 2017. pdf bib.
[22] J.-F. Biasse, C. Fieker and M. Jacobson Jr Fast heuristic algorithms for computing relations in the class
group of a quadratic order with applications to isogeny evaluation ,
LMS Journal of Computation and Mathematics, 19:371-390, 2016. pdf bib.
[21] J.-F. Biasse Subexponential time ideal decomposition in orders of number fields of large degree
Advances in Mathematics of Communications, 8(4):407-425, 2014.
pdf bib.
[20] J.-F. Biasse and M. Jacobson Jr. Batch smoothness test of polynomials over finite fields
Advances in Mathematics of Communications, 8(4):459-477, 2014.
pdf bib.
[19] J.-F. Biasse and C. Fieker Subexponential class group and unit group computation in large degree number fields
LMS Journal of Computation and Mathematics, 17:385-403, 2014.
pdf
bib
[18] J.-F. Biasse An L(1/3) algorithm for ideal class group and regulator computation in certain number fields
Mathematics of Computation, 83(288):2005-2031, 2014. pdf bib
[17] J.-F. Biasse Practical improvements to ideal class group computation in imaginary quadratic number fields
Advances in Mathematics of Communications, 4(2):141-154, 2010.
pdf bib
Conference proceedings with reviewing committee
[16] J.-F. Biasse, G. Micheli, E. Persichetti and P. Santini LESS is More: Code-Based Signatures without Syndromes 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020 Lecture Notes in Computer Science,
vol. xxxxx, Springer 2020, pp. xxx-xxx. pdf bib.
[15] J.-F. Biasse, A. Iezzi and M. Jacboson A note on the security of CSIDH 19th International Conference on Cryptology in India (INDOCRYPT), New Delhi, India, December 9-12, 2018 Lecture Notes in Computer Science,
vol. 11356, Springer 2018, pp. 153-168. pdf bib.
[14] J.-F. Biasse and C. van Vredendaal Fast multiquadratic S-unit computation and application to the calculation of class groups Proceedings of the 13th Algorithmic Number Theory Symposium (ANTS XIII) Open Book Series - Mathematical Science Publishers, 2019, vol. 2
pp. 103-118. pdf bib.
[13] J.-F. Biasse Approximate short vectors in ideals of ℚ(ζ2ⁿ) with precomputation of the class groups Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Lecture Notes in Computer Science vol. 10719 Springer, 2017 pp. 374-393. pdf bib.
[12] D. Bernstein, J.-F. Biasse and M. Mosca A low-resource quantum factoring algorithm Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings,
Lecture Notes in Computer Science vol. 10346 Springer, 2017 pp. 330-346. pdf bib
[11] J.-F. Biasse, T. Espiteau, A. Gelin, P.-A. Fouque and P. Kirchener A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France,
Lecture Notes in Computer Science vol. 10210 Springer, 2017 pp. 60-88. pdf bib
[10] J.-F. Biasse and F. Song A polynomial time quantum algorithm for computing class groups and solving the principal ideal problem in arbitrary
degree number fields Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, (SODA), Arlington, VA, USA, January 10-12, 2016,
SIAM, 2016 pp. 893-902. pdf bib
[9] J.-F. Biasse and L. Ruis FHEW with fast multibit bootstrapping
4th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT), Guadalajara,
Mexico, August 23-26, 2015, Lecture Notes in Computer Science,
vol. 9230, Springer 2015, pp. 119-135. pdf bib.
[8] J.-F. Biasse, D. Jao and A. Sankar A quantum algorithm for computing isogenies between supersingular curves
15th International Conference on Cryptology in India (INDOCRYPT), New Delhi, India, December 14-17, 2014 Lecture Notes in Computer Science,
vol. 8885, Springer 2014, pp. 428-442. pdf bib.
[7] J.-F. Biasse and Claus Fieker Improved techniques for computing the ideal class group and a system of fundamental units in number fields
Proceedings of the 10th Algorithmic Number Theory Symposium (ANTS X) Open Book Series - Mathematical Science Publishers, 2012, vol. 1
pp. 113-133.pdf bib
[6] J.-F. Biasse and G. Quintin An algorithm for list decoding number field codes
Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, USA, July
1-6, 2012, IEEE, 2012 pp. 91-95.pdf bib
[5] J.-F. Biasse and C. Fieker A polynomial time algorithm for computing the HNF of a module over the integers of a number field
International Symposium on Symbolic and Algebraic Computation (ISSAC) Grenoble, France - July 22 - 25, 2012, ACM, 2012 pp. 75-82.
pdf bib
[4] J.-F. Biasse M. Jacobson Jr. and A. Silverster Algebraic techniques for number fields
2nd International Conference on Symbolic Computation and Cryptography (SCC 2010, Egham, UK).
pdf bib
[3] J.-F. Biasse and M. Jacobson Jr. Practical improvements to class group and regulator computation in real number fields
Proceedings of the 9th Algorithmic Number Theory Symposium (ANTS IX), Lecture Notes in Computer Science vol. 6197, Springer 2010, pp. 50-67.
pdf bib
[2] J.-F. Biasse M. Jacobson Jr. and A. Silverster Security estimates for number field based cryptosystems
Australasian Conference in Information Security and Privacy (ACISP) , Lecture Notes in Computer Science,
vol. 6168, Springer 2010, pp. 233-247. pdf bib
[1] J.-F. Biasse, C. Berbain, M. Robshaw, S. Fisher and W. Meier Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
7th International Conference on Cryptology in India (INDOCRYPT) Lecture Notes in Computer Science,
vol. 4329, Springer 2006, pp. 2-16. pdf bib