A one round protocol for tripartite Diffie–Hellman A Joux Journal of Cryptology 17 (4), 263-276, 2004 | 2086* | 2004 |

Multicollisions in iterated hash functions. Application to cascaded constructions A Joux Annual International Cryptology Conference, 306-316, 2004 | 657 | 2004 |

Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases JC Faugere, A Joux Annual International Cryptology Conference, 44-60, 2003 | 576 | 2003 |

Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups A Joux, K Nguyen Journal of cryptology 16 (4), 239-247, 2003 | 478 | 2003 |

Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups A Joux, K Nguyen Journal of cryptology 16 (4), 239-247, 2003 | 478 | 2003 |

Differential collisions in SHA-0 F Chabaud, A Joux Annual International Cryptology Conference, 56-71, 1998 | 464 | 1998 |

Decoding random binary linear codes in 2 n/20: how 1+ 1= 0 improves information set decoding A Becker, A Joux, A May, A Meurer Annual International Conference on the Theory and Applications of …, 2012 | 460 | 2012 |

A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic R Barbulescu, P Gaudry, A Joux, E Thomé Annual International Conference on the Theory and Applications of …, 2014 | 380 | 2014 |

Improved low-density subset sum algorithms MJ Coster, A Joux, BA LaMacchia, AM Odlyzko, CP Schnorr, J Stern computational complexity 2 (2), 111-128, 1992 | 361 | 1992 |

Collisions of SHA-0 and Reduced SHA-1 E Biham, R Chen, A Joux, P Carribault, C Lemuet, W Jalby Annual International Conference on the Theory and Applications of …, 2005 | 348 | 2005 |

The Weil and Tate pairings as building blocks for public key cryptosystems A Joux International Algorithmic Number Theory Symposium, 20-32, 2002 | 327 | 2002 |

Lattice reduction: A toolbox for the cryptanalyst A Joux, J Stern Journal of Cryptology 11 (3), 161-185, 1998 | 238 | 1998 |

Algorithmic cryptanalysis A Joux CRC press, 2009 | 237 | 2009 |

Fast correlation attacks: An algorithmic point of view P Chose, A Joux, M Mitton International Conference on the Theory and Applications of Cryptographic …, 2002 | 224 | 2002 |

A new index calculus algorithm with complexity L (1/4+ o (1)) in very small characteristic A Joux Cryptology ePrint Archive, Report 2013/095, 2013. http://eprint. iacr. org, 0 | 209* | |

New generic algorithms for hard knapsacks N Howgrave-Graham, A Joux Advances in Cryptology–EUROCRYPT 2010, 235-256, 2010 | 175 | 2010 |

Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method A Joux, R Lercier Mathematics of computation 72 (242), 953-967, 2003 | 164 | 2003 |

The number field sieve in the medium prime case A Joux, R Lercier, N Smart, F Vercauteren Annual International Cryptology Conference, 326-344, 2006 | 160 | 2006 |

Why textbook ElGamal and RSA encryption are insecure D Boneh, A Joux, PQ Nguyen International Conference on the Theory and Application of Cryptology and …, 2000 | 146 | 2000 |

Encryption and authentication method and circuit for synchronous smart card J Kowalski, M Martin, J Stern, A Joux US Patent 5,825,882, 1998 | 140 | 1998 |