C. Claude, F. Jean-charles, G. Christopher, and R. Guénaël, Analysis of the algebraic side channel attack, J. Cryptographic Engineering, vol.2, issue.1, pp.45-62, 2012.

F. Jean-charles, G. Pierrick, H. Louise, and R. Guénaël, Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm, pp.595-635, 2014.

K. Masanari, R. Guénaël, Y. Kazuhiro, . Hashimoto-tsunogai, . Brumer et al., Quintic polynomials of, In : Int. J. Number Theory, vol.54, pp.555-571, 2009.

O. Sébastien, R. Guénaël, and Y. Kazuhiro, Efficient arithmetic in successive algebraic extension fields using symmetries, In : Math. Comput. Sci, vol.63, pp.217-233, 2012.

B. Guillaume, A. Battistello, D. Guillaume, G. Christophe, R. Guénaël et al., Combined Attack on CRT-RSA -Why Public Verification Must Not Be Public, Actes de conférences internationales avec comité de programme Public-Key Cryptography -PKC 2013 -16th International Conference on Practice and Theory in Public-Key Cryptography Proceedings. PDF. 2013, pp.198-215, 2013.

B. Jingguo, C. Jean-sébastien, F. Jean-charles, P. Q. Nguyen, R. Guénaël et al., Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences, Public-Key Cryptography -PKC 2014 -17th International Conference on Practice and Theory in Public-Key Cryptography Proceedings. PDF. 2014, pp.185-202, 2014.

C. Jean-sébastien, F. Jean-charles, R. Guénaël, and Z. Rina, Factoring N = p r q s for Large r and s " . In : Topics in Cryptology -CT-RSA 2016 -The Cryptographers' Track at the RSA Conference 2016, Proceedings. PDF. 2016, pp.448-464, 2016.

F. Jean-charles, G. Pierrick, H. Louise, and R. Guénaël, Subcubic change of ordering for Gröbner basis: a probabilistic approach, International Symposium on Symbolic and Algebraic Computation, pp.170-177, 2014.

F. Jean-charles, G. Christopher, and R. Guénaël, Attacking (EC)DSA Given Only an Implicit Hint, Selected Areas in Cryptography, 19th International Conference, SAC 2012, pp.252-274, 2012.

F. Jean-charles, H. Louise, J. Antoine, R. Guénaël, and V. Vanessa, Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings. PDF. 2014, pp.40-57, 2014.

F. Jean-charles, M. Raphaël, and R. Guénaël, Implicit Factoring with Shared Most Significant and Middle Bits, Public Key Cryptography -PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography Proceedings. PDF. 2010, pp.70-87, 2010.

F. Jean-charles, P. Ludovic, C. Petit, and R. Guénaël, Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields, Advances in Cryptology -EUROCRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings. PDF. 2012, pp.27-44, 2012.

K. Jean-gabriel, L. Reynald, and R. Guénaël, Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time, Lecture Notes in Comput. Sci. PDF, pp.278-297, 2010.

O. Sébastien, R. Guénaël, and Y. Kazuhiro, Computation schemes for splitting fields of polynomials, ISSAC 2009?Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation. PDF, pp.279-286, 2009.

R. Guénaël and Y. Kazuhiro, Multi-modular algorithm for computing the splitting field of a polynomial, pp.247-254, 2008.

M. Leonard, . Adleman, D. Jonathan, and H. Ming-deh, A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields, International Algorithmic Number Theory Symposium, pp.28-40, 1994.

A. David, B. Karthikeyan, D. Zakir, G. Pierrick, G. Matthew et al., Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.5-17, 2015.

M. R. Albrecht, B. Shi, and D. Léo, A Subfield Lattice Attack on Overstretched NTRU Assumptions -Cryptanalysis of Some FHE and Graded Encoding Schemes, Advances in Cryptology -CRYPTO 2016 -36th Annual International Cryptology Conference Proceedings, Part I. 2016, pp.153-178, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01394211

D. F. Aranha, F. Pierre-alain, G. Benoît, K. Jean-gabriel, T. Mehdi et al., GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias, Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information Security, pp.262-281, 2014.
DOI : 10.1007/978-3-662-45611-8_14

URL : https://hal.archives-ouvertes.fr/hal-01094002

A. O. Atkin and F. Morain, Elliptic curves and primality proving, Mathematics of Computation 61.203 (juil. 1993), pp.29-68
DOI : 10.1090/S0025-5718-1993-1199989-X

URL : https://hal.archives-ouvertes.fr/inria-00075302

B. Guillaume, A. Battistello, D. Guillaume, G. Christophe, R. Guénaël et al., Combined Attack on CRT-RSA -Why Public Verification Must Not Be Public, Public-Key Cryptography -PKC 2013 -16th International Conference on Practice and Theory in Public-Key Cryptography Proceedings. PDF. 2013, pp.198-215, 2013.

B. Razvan, G. Pierrick, J. Antoine, and T. Emmanuel, A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.1-16, 2014.

B. Magali, F. Jean-charles, and S. Bruno, On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations, International Conference on Polynomial System Solving -ICPSS, pp.71-75, 2004.

B. Lucas, E. Ninon, R. Guénaël, and R. Raphaël, Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques, To appear in 2nd ACM International Workshop on Software Protection, SPRO 2016, pp.1-9, 2016.

B. Aurélie and J. Antoine, Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables, Advances in Cryptology -EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings. Sous la dir. de Moni NAOR. T. 4515. Lecture Notes in Computer Science, pp.361-378, 2007.

B. Eberhard, M. Teo, M. Grazia, M. Carlo, and T. , The shape of the Shape Lemma, Proceedings of the international symposium on Symbolic and algebraic computation. ISSAC '94, pp.129-133, 1994.

T. Becker and V. Weispfenning, Gröbner bases. T. 141. Graduate Texts in Mathematics . A computational approach to commutative algebra, In cooperation with Heinz Kredel, pp.574-574, 1993.

D. J. Bernstein, B. Peter, J. Marc, L. Tanja, and P. Chistiane, Twisted Edwards Curves, Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology. AFRICACRYPT'08, pp.389-405, 2008.
DOI : 10.1007/978-3-540-68164-9_26

J. Daniel, . Bernstein, and L. Tanja, Faster Addition and Doubling on Elliptic Curves, Advances in Cryptology : ASIACRYPT 2007. T. 4833. Lecture Notes in Computer Science, pp.29-50, 2007.

B. Jingguo, C. Jean-sébastien, F. Jean-charles, P. Q. Nguyen, R. Guénaël et al., Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences, Public-Key Cryptography -PKC 2014 -17th International Conference on Practice and Theory in Public-Key Cryptography Proceedings. PDF. 2014, pp.185-202, 2014.

B. Jean-françois and F. Claus, A polynomial time algorithm for computing the HNF of a module over the integers of a number field, International Symposium on Symbolic and Algebraic Computation, pp.75-82, 2012.

B. Jean-françois and S. Fang, Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fields, Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, pp.893-902, 2016.

B. Fabrizio, J. Sébastien, and L. Axel, Comparative Evaluation of the Effectiveness of Constraint Solvers against Opaque Conditionals, Poster presented during the 36th IEEE Symposium on Security and Privacy

B. Fabrizio, J. Sébastien, L. Axel, and S. Thomas, Effectiveness of Synthesis in Concolic Deobfuscation " . working paper or preprint, 2015.

D. Kifle, B. Wolfram, D. , C. Fieker, and S. Andreas, Gröbner bases over algebraic number fields, Proceedings of the 2015 International Workshop on Parallel Symbolic Computation, pp.16-24, 2015.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

B. Dan and D. Glenn, Cryptanalysis of RSA with private key d less than N 0.292, IEEE Transactions on Information Theory, vol.464, p.1339, 2000.

B. Dan, D. Glenn, and H. Nick, Factoring N = p r q for Large r, Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, pp.326-337, 1999.

B. Dan and M. K. Franklin, Identity-Based Encryption from the Weil Pairing Advances in Cryptology -CRYPTO, 21st Annual International Cryptology Conference, pp.213-229, 2001.

R. L. Borger, On De Moivre's Quintic, The American Mathematical Monthly, vol.1510, pp.171-174, 1908.

B. Alin, S. Bruno, and S. Éric, Fast Algorithms for Zero-Dimensional Polynomial Systems Using Duality, Applicable Algebra in Engineering, Communication and Computing, pp.239-272, 2003.

B. Charles, C. Chen-mou, C. Tung, N. Ruben, and Y. Bo-yin, Fast Exhaustive Search for Quadratic Systems in F 2 on FPGAs, Selected Areas in Cryptography -SAC 2013 -20th International Conference, pp.205-222, 2013.

B. Eric, C. Jean-sébastien, I. Thomas, M. David, R. Hugues et al., Efficient Indifferentiable Hashing into Ordinary Elliptic Curves, pp.237-254, 2009.

B. Johannes, Reducing lattice bases by means of approximations, Algorithmic Number Theory ? Proc. ANTS-I. T. 877. Lecture Notes in Computer Science, pp.160-168, 1994.

C. Claude, F. Jean-charles, G. Christopher, and R. Guénaël, Analysis of the algebraic side channel attack, J. Cryptographic Engineering, vol.2, issue.1, pp.45-62, 2012.

A. Cauchy, Usage des fonctions interpolaires dans la détermination des fonctions symétriques des racines d'une équation algébrique donnée, pp.473-108, 1840.

C. Christophe, F. Benoit, G. Georges, R. Mylène, and V. Vincent, Square Always Exponentiation, pp.40-57, 2011.

C. Christian, Engineering Code Obfuscation Invited talk at EUROCRYPT'16, 2016.

C. Don, Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known, Advances in Cryptology -Proc. EUROCRYPT '96. T. 1070. Lecture Notes in Computer Science, pp.178-189, 1996.

C. Don, Finding a Small Root of a Univariate Modular Equation, Advances in Cryptology -Proc. EUROCRYPT '96. T. 1070. Lecture Notes in Computer Science, pp.155-165, 1996.

C. Don, Finding Small Solutions to Small Degree Polynomials, Cryptography and Lattices, International Conference, pp.20-31, 2001.

C. Don, Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities, In : J. Cryptology Journal version, vol.1035, issue.34, pp.233-260, 1997.

C. Jean-sébastien, F. Jean-charles, R. Guénaël, and Z. Rina, Factoring N = p r q s for Large r and s " . In : Topics in Cryptology -CT-RSA 2016 -The Cryptographers' Track at the RSA Conference 2016, Proceedings. PDF. 2016, pp.448-464, 2016.

C. Christophe, Q. Phong, . Nguyen, and S. Jacques, The Effectiveness of Lattice Attacks Against Low-Exponent RSA, Public Key Cryptography ? Proc. PKC '99. T. 1560. Lecture Notes in Computer Science, pp.204-218, 1999.

C. Jean-marc and L. Reynald, Galois invariant smoothness basis, In : Series on Number Theory and Its Applications World Scientific, vol.5, pp.142-167, 2008.

C. Couvreur and J. Quisquater, Fast Decipherment Algorithm for RSA Public- Key Cryptosystem, Electronics Letters, vol.1821, pp.905-907, 1982.

D. Cox, J. Little, and D. O. Shea, Ideals, varieties, and algorithms. Second. Undergraduate Texts in Mathematics. An introduction to computational algebraic geometry and commutative algebra, p.536, 1997.

A. David and . Cox, Galois theory, Pure and Applied Mathematics, pp.559-559

D. Xavier and S. Éric, Sharp estimates for triangular sets, Symbolic and Algebraic Computation, International Symposium ISSAC 2004 Proceedings, pp.103-110, 2004.

D. Hervé and V. Brigitte, An Upper Bound on the Average Number of Iterations of the LLL Algorithm, In : Theor. Comput. Sci, vol.1231, pp.95-115, 1994.

D. Jérémie, H. Guillaume, P. Xavier, and S. Damien, Accelerating Lattice Reduction with FPGAs, Progress in Cryptology -LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, pp.124-143, 2010.

C. Diem, On the discrete logarithm problem in class groups of curves, Mathematics of Computation, vol.80, issue.273, pp.443-475, 2011.
DOI : 10.1090/S0025-5718-2010-02281-1

C. Diem, Abstract, Compositio Mathematica, vol.6, issue.01, pp.75-104, 2011.
DOI : 10.1112/S0010437X10005075

D. Emmanuelle, G. Christophe, R. Matthieu, and S. Yannick, On Second-Order Fault Analysis Resistance for CRT-RSA Implementations, pp.68-83, 2009.

D. Vincent and V. Et-alexandre, Redundant Modular Reduction Algorithms, pp.102-114, 2011.

M. Harold and . Edwards, A Normal Form for Elliptic Curves, In : Bulletin of the American Mathematical Society. T. Juil, vol.44, pp.393-422, 2007.

E. Andreas, G. Pierrick, and T. Emmanuel, An L(1/3) Discrete Logarithm Algorithm for Low Degree Curves, J. Cryptology, vol.241, pp.24-41, 2011.

E. Thomas, F. Pierre-alain, G. Alexandre, and K. Paul, Computing generator in cyclotomic integer rings, IACR Cryptology ePrint Archive 2016, p.957, 2016.

R. Rezaeian, F. Hongfeng, W. Changan, and Z. , Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three, Selected Areas in Cryptography , 19th International Conference, pp.135-148, 2012.

J. Faugère and C. Mou, Fast Algorithm for Change of Ordering of Zero-dimensional Gröbner Bases with Sparse Multiplication Matrices, ISSAC '11: Proceedings of the 2011 international symposium on Symbolic and algebraic computation. ISSAC '11, pp.1-8, 2011.

F. Jean-charles, A New Efficient Algorithm for Computing Gröbner Bases (F4), In : Journal of Pure and Applied Algebra, vol.139, pp.1-3, 1999.

F. Jean-charles, A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5), Proceedings of the 2002 international symposium on Symbolic and algebraic computation. ISSAC '02, pp.75-83, 2002.

F. Jean-charles, M. Safey-el, D. Thibaut, and V. , On the complexity of computing Gröbner bases for weighted homogeneous systems, J. Symb. Comput, vol.76, pp.107-141, 2016.

F. Jean-charles, G. Pierrick, H. Louise, and R. Guénaël, Fast change of ordering with exponent !, In : (Poster abstract) ACM Commun. Comput. Algebra, vol.46, pp.92-93

F. Jean-charles, G. Pierrick, H. Louise, and R. Guénaël, Polynomial Systems Solving by Fast Linear Algebra

F. Jean-charles, G. Pierrick, H. Louise, and R. Guénaël, Subcubic change of ordering for Gröbner basis: a probabilistic approach, International Symposium on Symbolic and Algebraic Computation, pp.170-177, 2014.

F. Jean-charles, G. Pierrick, H. Louise, and R. Guénaël, Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm, pp.595-635, 2014.

F. Jean-charles, G. Patrizia, L. Daniel, and M. Teo, Efficient Computation of Zero-dimensional Gröbner Bases by Change of Ordering, Journal of Symbolic Computation, vol.164, pp.329-344, 1993.

F. Jean-charles, G. Christopher, and R. Guénaël, Attacking (EC)DSA Given Only an Implicit Hint, Selected Areas in Cryptography, 19th International Conference, SAC 2012, pp.252-274, 2012.

F. Jean-charles, H. Louise, J. Antoine, R. Guénaël, and V. Vanessa, Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings. PDF. 2014, pp.40-57, 2014.

F. Jean-charles, M. Raphaël, and R. Guénaël, Implicit Factoring with Shared Most Significant and Middle Bits, Public Key Cryptography -PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography Proceedings. PDF. 2010, pp.70-87, 2010.

F. Jean-charles and M. Chenqi, Fast Algorithm for Change of Ordering of Zero-dimensional Gröbner Bases with Sparse Multiplication Matrices, ISSAC '11: Proceedings of the 2011 international symposium on Symbolic and algebraic computation . ISSAC '11, pp.1-8, 2011.

F. Jean-charles, P. Ludovic, C. Petit, and R. Guénaël, Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields, Advances in Cryptology -EUROCRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings. PDF. 2012, pp.27-44, 2012.

F. Jean-charles, P. Ludovic, P. Frédéric-de, and R. O. , Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form, Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I. 2014, pp.21-41, 2014.

F. Jean-charles, S. Pierre-jean, S. Jules, N. Kosaku, W. Franz et al., Sparse Gröbner bases: the unmixed case, International Symposium on Symbolic and Algebraic Computation, pp.178-185, 2014.

F. Jean-charles and S. Jules, Gröbner bases of ideals invariant under a commutative group: the non-modular case, International Symposium on Symbolic and Algebraic Computation, pp.347-354, 2013.

F. Claus and K. Jürgen, Computation of Galois groups of rational polynomials, In : LMS Journal of Computation and Mathematics, vol.17, issue.1, pp.141-158, 2014.

F. Pierre-alain and T. Mehdi, Deterministic Encoding and Hashing to Odd Hyperelliptic Curves, Pairing-Based Cryptography -Pairing 2010 -4th International Conference, pp.265-277, 2010.

F. Joshua, G. Pierrick, H. Nadia, and T. Emmanuel, A kilobit hidden SNFS discrete logarithm computation, IACR Cryptology ePrint Archive 2016, p.961, 2016.

H. Garner, The Residue Number System, IRE Transactions on Electronic Computers, vol.86, pp.140-147, 1959.
DOI : 10.1109/tec.1959.5219515

J. Von-zur, G. Jürgen, and G. , Modern computer algebra, pp.1-785, 2003.
DOI : 10.1017/CBO9781139856065

G. Pierrick, An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves, Advances in Cryptology -EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, pp.19-34, 2000.

G. Pierrick, Index Calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem, Journal of Symbolic Computation, vol.4412, pp.1690-1702, 2009.

G. Pierrick, T. Emmanuel, T. Nicolas, and D. Claus, A double large prime variation for small genus hyperelliptic index calculus, In : Math. Comput, vol.76257, pp.475-492, 2007.

G. Patrizia and M. Teo, Algebraic Solution of Systems of Polynomial Equations using Gröbner Bases Applied Algebra, Algebraic Algorithms and Error Correcting Codes, Proceedings of AAECC-5, pp.247-257, 1989.

G. Dahmun, R. Matthieu, and V. Damien, Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication, Selected Areas in Cryptography -SAC 2016. Sous la dir. de Roberto AVANZI et Howard HEYS. Selected Areas in Cryptography -SAC 2016, 2016.

G. Tim, K. Timo, N. Martin, C. Paar, and R. Andy, Cryptanalysis with COPACOBANA, IEEE Trans. Computers, vol.5711, pp.1498-1513, 2008.

P. K. Gupta, Xeon+FPGA Platform for the Data Center (presentation only), The Fourth Workshop on the Intersections of Computer Architecture and Reconfigurable Logic, 2015.

H. Mark-van, K. Jürgen, and N. Andrew, Generating subfields, J. Symb. Comput, vol.52, pp.17-34, 2013.

H. Nick, Finding Small Roots of Univariate Modular Equations Revisited, Cryptography and Coding ? Proc. IMA '97. T. 1355. Lecture Notes in Computer Science, pp.131-142, 1997.

T. Icart, How to Hash into Elliptic Curves, pp.303-316, 2009.
DOI : 10.1007/978-3-642-03356-8_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.5920

S. Charanjit and . Jutla, On Finding Small Solutions of Modular Multivariate Polynomial Equations, Advances in Cryptology -EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, pp.158-170, 1998.

K. Jean-gabriel, L. Reynald, and R. Guénaël, Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time, Lecture Notes in Comput. Sci. PDF, pp.278-297, 2010.

K. Richard, Reflection Groups and Invariant Theory, 2001.

K. Walter, Fast Algorithms for the Characteristic Polynomial, Theor. Comput. Sci, vol.36, issue.2, pp.309-317, 1985.

K. Masanari, R. Guénaël, Y. Kazuhiro, . Hashimoto-tsunogai, . Brumer et al., Quintic polynomials of, In : Int. J. Number Theory, vol.54, pp.555-571, 2009.

J. Lagrange, Réflexions sur la résolution algébrique des équations, Nouveaux Mémoires de l'Académie Royale des Sciences et Belles-Lettres de Berlin, pp.1770-1771

N. Yagati and . Lakshman, On the Complexity of Computing a Gröbner Basis for the Radical of a Zero Dimensional Ideal, Proceedings of the twenty-second annual ACM symposium on Theory of computing. STOC '90, pp.555-563, 1990.

N. Yagati, . Lakshman, and L. Daniel, On the Complexity of Zero-Dimensional Algebraic Systems, Effective methods in algebraic geometry. T. 94. Birkhauser, p.217, 1991.

L. Susan, Polynomial Time Algorithms for Galois Groups, EUROSAM 84, International Symposium on Symbolic and Algebraic Computation Proceedings. Computation, pp.225-236, 1984.

L. Susan, L. Gary, and . Miller, Solvability by Radicals is in Polynomial Time, Proceedings of the 15th Annual ACM Symposium on Theory of Computing, pp.25-27

D. Lazard, Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations In : Computer Algebra. Sous la dir, Lecture Notes in Computer Science, pp.146-156, 1983.

D. Lazard, Solving zero-dimensional algebraic systems, Journal of Symbolic Computation, vol.13, issue.2, pp.117-131, 1992.
DOI : 10.1016/S0747-7171(08)80086-7

URL : http://doi.org/10.1016/s0747-7171(08)80086-7

L. Daniel and V. Annick, Computing subfields: Reverse of the primitive element problem, Computational algebraic geometry. Birkhäuser, pp.163-176, 1993.

L. Romain and S. Éric, Algorithms for the universal decomposition algebra, International Symposium on Symbolic and Algebraic Computation, pp.234-241, 2012.

M. Lederer, Explicit constructions in splitting fields of polynomials, In : Riv. Mat. Univ. Parma, issue.7, pp.3-233, 2004.

A. K. Lenstra, H. W. Lenstra-jr, L. Et, and . Lovász, Factoring polynomials with rational coefficients, Mathematische Annalen, vol.32, issue.4, pp.513-534, 1982.
DOI : 10.1007/BF01457454

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.318

H. W. Lenstra and A. Silverberg, Lattices with Symmetry, In : IACR Cryptology ePrint Archive, vol.2014, p.1026, 2014.
DOI : 10.1145/2465506.2465929

H. W. Lenstra and A. Silverberg, Revisiting the Gentry-Szydlo Algorithm Advances in Cryptology -CRYPTO 2014 -34th Annual Cryptology Conference, Proceedings, Part I. 2014, pp.280-296, 2014.

J. Lv, P. Kalla, and F. Enescu, Efficient Gröbner Basis Reductions for Formal Verification of Galois Field Arithmetic Circuits, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.32, issue.9, pp.1409-1420
DOI : 10.1109/TCAD.2013.2259540

L. Kenneth, . Manders, and A. Leonard, NP-Complete decision problems for binary quadratics, In : Journal of Computer and System Sciences, vol.16, issue.2, pp.168-184, 1978.

A. May, Using LLL-Reduction for Solving RSA and Factorization Problems, p.116, 2010.
DOI : 10.1007/978-3-642-02295-1_10

M. Alexander and R. Maike, Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint In : Public Key Cryptography -PKC, 12th International Conference on Practice and Theory in Public Key Cryptography, pp.1-14, 2009.

J. Mckay and R. Stauduhar, Finding relations among the roots of an irreducible polynomial, Proceedings of the 1997 international symposium on Symbolic and algebraic computation , ISSAC '97, pp.75-77, 1997.
DOI : 10.1145/258726.258752

M. Bernard, Y. Victor, and . Pan, Asymptotic Acceleration of Solving Multivariate Polynomial Systems of Equations, Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp.488-496, 1998.

M. Ginger and C. S. Collberg, Software watermarking via opaque predicates: Implementation, analysis, and attacks, In : Electronic Commerce Research, vol.6, issue.2, pp.155-171, 2006.

H. Najafi, M. E. Jafari, and M. Damen, On Adaptive Lattice Reduction over Correlated Fading Channels, IEEE Transactions on Communications, vol.59, issue.5, pp.1224-1227, 2011.
DOI : 10.1109/TCOMM.2011.022811.090576

P. Q. Nguyen and D. Stehlé, An LLL Algorithm with Quadratic Complexity, SIAM Journal on Computing, vol.39, issue.3, pp.874-903, 2009.
DOI : 10.1137/070705702

URL : https://hal.archives-ouvertes.fr/hal-00550981

P. Q. Nguyen and B. Vallée, The LLL Algorithm: Survey and Applications. Information Security and Cryptography, 2010.
DOI : 10.1007/978-3-642-02295-1

URL : https://hal.archives-ouvertes.fr/hal-01141414

Q. Phong, I. E. Nguyen, and . Shparlinski, The Insecurity of the Digital Signature Algorithm with Partially Known Nonces, In : J. Cryptology, vol.153, pp.151-176, 2002.

N. Andrew, S. Damien, and V. Gilles, An LLL-reduction algorithm with quasi-linear time complexity: extended abstract, Proc. STOC '11, pp.403-412, 2011.

O. Sébastien, R. Guénaël, and Y. Kazuhiro, Computation schemes for splitting fields of polynomials, ISSAC 2009?Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation. PDF, pp.279-286, 2009.

O. Sébastien, R. Guénaël, and Y. Kazuhiro, Efficient arithmetic in successive algebraic extension fields using symmetries, In : Math. Comput. Sci, vol.63, pp.217-233, 2012.

P. Tim, K. Priyank, and E. Florian, Word-Level Abstraction from Bit-Level Circuits using Gröbner Bases. Paper presented during the International Workshop on Logic and Synthesis

G. Renault and K. Yokoyama, A Modular Method for Computing the Splitting Field of a Polynomial, In : ANTS, pp.124-140, 2006.
DOI : 10.1007/11792086_10

URL : https://hal.archives-ouvertes.fr/hal-01337040

R. Guénaël, Computation of the splitting field of a dihedral polynomial, pp.290-297, 2006.

R. Guénaël, Introduction à la Théorie de Galois Effective In : JNCF'08: Journées Nationales du Calcul Formel (online). PDF, Slides, pp.141-197, 2008.

R. Guénaël, Introduction à l'Algorithmique Galoisienne, Invited talk at Mathematik Park (Institut Henri Poincaré), Slides, 2011.

R. Guénaël, On polynomial systems with structures related to the ECDLP, Invited talk during the Conference Effective Moduli Spaces and Applications to Cryptography, 2014.

R. Guénaël, On Using Torsion Points in the Elliptic Curve Index Calculus, Invited talk during the 18th Workshop On Elliptic Curve Cryptography, 2014.

R. Guénaël, The Heuristic Coppersmith Technique from a Computer Algebra Point of View, 2013.

R. Guénaël and V. Tristan, On the p-adic stability of the FGLM algorithm, p.848, 1602.

R. Guénaël and Y. Kazuhiro, A modular method for computing the splitting field of a polynomial, Algorithmic number theory. T. 4076. Lecture Notes in Comput. Sci, pp.124-140, 2006.

R. Guénaël and Y. Kazuhiro, Multi-modular algorithm for computing the splitting field of a polynomial, pp.247-254, 2008.

R. Maike, On efficiently calculating small solutions of systems of polynomial equations: lattice-based methods and applications to cryptography, Thèse de doct, 2010.

S. Santanu and M. Subhamoy, Further results on implicit factoring in polynomial time, In : Adv. in Math. of Comm, vol.3, issue.2, pp.205-217, 2009.

I. Semaev, Summation Polynomials and the Discrete Logarithm Problem on Elliptic Curves, Cryptology ePrint Archive Report, 2004.

A. Shallue, C. Van-de, and W. , Construction of Rational Points on Elliptic Curves over Finite Fields, pp.510-524, 2006.
DOI : 10.1007/11792086_36

URL : https://works.bepress.com/andrew_shallue/1/download/

C. Geoffrey, J. A. Shephard, and . Todd, Finite unitary reflection groups, In : Canadian J. Math, vol.6, pp.274-304, 1954.

S. Victor, OAEP Reconsidered, In : J. Cryptology, vol.154, pp.223-249, 2002.

M. Ulas, Rational Points on Certain Hyperelliptic Curves over Finite Fields, Bulletin of the Polish Academy of Sciences Mathematics, vol.55, issue.2, pp.97-104, 2007.
DOI : 10.4064/ba55-2-1

URL : http://arxiv.org/abs/0706.1448

V. Tristan, Matrix-F5 algorithms over finite-precision complete discrete valuation fields, International Symposium on Symbolic and Algebraic Computation, IS- SAC '14, pp.397-404, 2014.

W. Erich and W. Paul, Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs, In : J. Cryptographic Engineering, vol.64, pp.287-297, 2016.

G. Andrew and W. , Algorithms for Galois Group Computations over Multivariate Function Fields, In : Bulletin of the Australian Mathematical Society, vol.941, pp.169-170, 2016.

W. Marc, J. Van, W. Federico, and M. , Defeating RSA Multiply-Always and Message Blinding Countermeasures, pp.77-88, 2011.

K. Yokoyama, A modular method for computing the Galois groups of polynomials Algorithms for algebra, J. Pure Appl. Algebra, vol.117118, pp.617-636, 1996.

Z. Yongxin, A. Main, X. Yuan, . Gu, J. Harold et al., Information Hiding in Software with Mixed Boolean-Arithmetic Transforms Information Security Applications: 8th International Workshop Revised Selected Papers. Sous la dir, pp.61-75, 2007.