1. Luk Bettale, Jean-Charles Faugère, and Ludovic Perret, Cryptanalysis of the TRMS signature scheme of PKC'05, Progress in Cryptology, AfricaCrypt 2008, Lecture Notes in Computer Science, vol. 5023, Springer Berlin/Heidelberg, 2008, pp. 143-155.
  2. Jean-Charles Faug'ere, Françoise Levy-dit-Vehel, and Ludovic Perret, Cryptanalysis of MinRank, Advances in Cryptology, CRYPTO 2008, Lecture Notes in Computer Science, vol. 5157, Springer, 2008, pp. 280–296.
  3. Jean-Charles Faugére and Ludovic Perret, Algebraic cryptanalysis of Curry and Flurry using correlated messages, IACR (2008), 14 pages.[eprint]
  4. Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, and Jacques Stern, Total break of the l-IC signature scheme, Public Key Cryptography, PKC 2008, Lecture Notes in Computer Science, vol. 4939, Springer, 2008, pp. 1–17.
  5. Françoise Levy-dit-Vehel and Ludovic Perret, Polynomial equivalence problems and applications to multivariate cryptosystems, Progress in Cryptology—Indocrypt 2003, Lecture Notes in Comput. Sci., vol. 2904, Springer, Berlin, 2003, pp. 235–251.[MR]
  6. Françoise Levy-dit-Vehel and Ludovic Perret, A Polly Cracker system based on satisfiability, Coding, cryptography and combinatorics, Progr. Comput. Sci. Appl. Logic, vol. 23, Birkhäuser, Basel, 2004, pp. 177–192.[MR]
  7. Ludovic Perret, A fast cryptanalysis of the isomorphism of polynomials with one secret problem, in Advances in Cryptology - Eurocrypt 2005, Lecture Notes in Computer Science, vol. 3494, Springer Berlin/Heidelberg, 2005, pp. 354–370.