Publication | Date of Publication | Type |
---|
Crypto dark matter on the torus. Oblivious PRFs from shallow PRFs and TFHE | 2024-11-13 | Paper |
SLAP: succinct lattice-based polynomial commitments from standard assumptions | 2024-11-13 | Paper |
Batch signatures, revisited | 2024-11-12 | Paper |
\textit{Caveat implementor!} Key recovery attacks on MEGA | 2023-12-08 | Paper |
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract) | 2023-06-28 | Paper |
Estimating quantum speedups for lattice sieves | 2023-03-21 | Paper |
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) | 2022-11-09 | Paper |
Homomorphic Encryption Standard | 2022-11-02 | Paper |
Tightly secure ring-LWE based key encapsulation with short ciphertexts | 2022-08-25 | Paper |
Feistel structures for MPC, and more | 2022-08-25 | Paper |
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography | 2022-07-01 | Paper |
Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices | 2022-04-22 | Paper |
Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance | 2022-04-22 | Paper |
Lattice Attacks on NTRU and LWE: A History of Refinements | 2022-02-25 | Paper |
Round-optimal verifiable oblivious pseudorandom functions from ideal lattices | 2021-12-21 | Paper |
On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem | 2021-12-08 | Paper |
The vacuity of the open source security testing methodology manual | 2021-07-06 | Paper |
Component allocation in make-to-stock assembly systems | 2021-06-17 | Paper |
Exploring trade-offs in batch bounded distance decoding | 2020-07-21 | Paper |
Multilinear maps from obfuscation | 2020-06-15 | Paper |
Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC | 2020-05-11 | Paper |
The general sieve kernel and new records in lattice reduction | 2020-02-06 | Paper |
Estimate all the {LWE, NTRU} schemes! | 2018-10-17 | Paper |
Notes on GGH13 without the presence of ideals | 2018-04-20 | Paper |
Large modulus ring-LWE \(\geq \) module-LWE | 2018-04-06 | Paper |
Revisiting the expected cost of solving uSVP and applications to LWE | 2018-04-06 | Paper |
Optimization of safety stocks in models with an order service level objective or constraint | 2018-02-06 | Paper |
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL | 2017-06-13 | Paper |
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity | 2017-02-01 | Paper |
A Subfield Lattice Attack on Overstretched NTRU Assumptions | 2016-11-30 | Paper |
Coordinating decentralized linear programs by exchange of primal information | 2016-10-06 | Paper |
Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS | 2016-09-09 | Paper |
Polly cracker, revisited | 2016-05-19 | Paper |
Implementing Candidate Graded Encoding Schemes from Ideal Lattices | 2016-03-23 | Paper |
Multilinear Maps from Obfuscation | 2016-03-23 | Paper |
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers | 2015-12-04 | Paper |
On the Efficacy of Solving LWE by Reduction to Unique-SVP | 2015-10-16 | Paper |
On the concrete hardness of learning with errors | 2015-10-13 | Paper |
Ciphers for MPC and FHE | 2015-09-30 | Paper |
The M4RIE library for dense linear algebra over small fields with even characteristic | 2015-03-27 | Paper |
On the complexity of the BKW algorithm on LWE | 2015-02-19 | Paper |
Determining near optimal base-stock levels in two-stage general inventory systems | 2015-02-18 | Paper |
Block Ciphers – Focus on the Linear Layer (feat. PRIDE) | 2014-08-07 | Paper |
Lazy Modulus Switching for the BKW Algorithm on LWE | 2014-03-25 | Paper |
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions | 2014-03-25 | Paper |
On the relation between the MXL family of algorithms and Gröbner basis algorithms | 2012-05-11 | Paper |
Breaking an Identity-Based Encryption Scheme Based on DHIES | 2011-12-16 | Paper |
Polly Cracker, Revisited | 2011-12-02 | Paper |
Efficient Dense Gaussian Elimination over the Finite Field with Two Elements | 2011-11-28 | Paper |
Algebraic Precomputations in Differential and Integral Cryptanalysis | 2011-07-29 | Paper |
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model | 2011-07-07 | Paper |
Algebraic Attacks on the Courtois Toy Cipher | 2011-06-17 | Paper |
F4/5 | 2010-06-25 | Paper |
Supply chain coordination mechanisms. New approaches for collaborative planning | 2009-11-26 | Paper |
Algebraic Techniques in Differential Cryptanalysis | 2009-08-11 | Paper |