Mehdi Tibouchi

From MaRDI portal
Revision as of 08:34, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:315554

Available identifiers

zbMath Open tibouchi.mehdiWikidataQ28002947 ScholiaQ28002947MaRDI QIDQ315554

List of research outcomes





PublicationDate of PublicationType
Cryptanalysis of EagleSign2025-01-10Paper
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves2024-12-27Paper
CDS composition of multi-round protocols2024-12-13Paper
Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme2024-11-12Paper
Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all2024-10-16Paper
Verifiable isogeny walks: towards an isogeny-based postquantum VDF2024-10-14Paper
\textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON2024-08-30Paper
Masking the GLP lattice-based signature scheme at any order2024-01-23Paper
Quantum-access security of hash-based signature schemes2024-01-11Paper
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves2023-08-25Paper
Shorter hash-and-sign lattice-based signatures2023-06-28Paper
MuSig-L: lattice-based multi-signature with single-round online phase2023-06-28Paper
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval2022-12-22Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}2022-08-30Paper
On black-box extension of a non-interactive zero-knowledge proof system for secret equality2022-07-06Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2022-04-21Paper
On subset-resilient hash function families2022-03-21Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2021-12-21Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices2021-12-01Paper
One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips2021-05-25Paper
Equidistribution among cosets of elliptic curve points in intervals2021-05-03Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves2020-06-24Paper
Recovering secrets from prefix-dependent leakage2020-06-24Paper
Masking Dilithium. Efficient implementation and side-channel evaluation2020-01-30Paper
Cryptanalysis of compact-LWE2020-01-21Paper
A coin-free oracle-based augmented black box framework2020-01-10Paper
Efficient fully structure-preserving signatures and shrinking commitments2019-08-13Paper
Close to Uniform Prime Number Generation With Fewer Random Bits2019-01-28Paper
LWE without modular reduction and improved side-channel attacks against BLISS2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols2018-12-04Paper
FHE over the integers and modular arithmetic circuits2018-10-26Paper
Invalid curve attacks in a GLS setting2018-10-24Paper
Universal witness signatures2018-10-24Paper
Lower bounds on structure-preserving signatures for bilateral messages2018-10-17Paper
Constructing Permutation Rational Functions from Isogenies2018-07-20Paper
Masking the GLP lattice-based signature scheme at any order2018-07-09Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures2018-02-16Paper
Secure GLS recomposition for sum-of-square cofactors2017-08-25Paper
Zeroizing Attacks on Indistinguishability Obfuscation over CLT132017-06-13Paper
Improved elliptic curve hashing and point representation2017-02-10Paper
Cryptanalysis of GGH15 Multilinear Maps2016-10-27Paper
Tightly secure signatures from lossy identification schemes2016-09-21Paper
Practical cryptanalysis of ISO 9796-2 and EMV signatures2016-09-21Paper
Binary Elligator Squared2016-04-13Paper
Degenerate Curve Attacks2016-04-13Paper
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones2016-04-08Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations2015-12-10Paper
New Multilinear Maps Over the Integers2015-12-10Paper
Cryptanalysis of the Co-ACD Assumption2015-12-10Paper
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings2015-10-08Paper
Fully Structure-Preserving Signatures and Shrinking Commitments2015-09-30Paper
Impossibility of Surjective Icart-Like Encodings2015-09-29Paper
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity2015-09-18Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds2015-08-27Paper
Making RSA–PSS Provably Secure against Non-random Faults2015-07-21Paper
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias2015-01-16Paper
Structure-Preserving Signatures from Type II Pairings2014-08-07Paper
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited2014-07-07Paper
Close to Uniform Prime Number Generation with Fewer Random Bits2014-07-01Paper
Scale-Invariant Fully Homomorphic Encryption over the Integers2014-03-25Paper
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures2014-02-18Paper
Recovering Private Keys Generated with Weak PRNGs2014-01-17Paper
Practical Multilinear Maps over the Integers2013-09-02Paper
Lattice-Based Fault Attacks on Signatures2013-07-09Paper
Injective Encodings to Elliptic Curves2013-06-28Paper
A note on the bivariate Coppersmith theorem2013-06-27Paper
Another Look at Affine-Padding RSA Signatures2013-06-04Paper
Batch Fully Homomorphic Encryption over the Integers2013-05-31Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves2013-03-20Paper
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication2012-11-13Paper
Indifferentiable Hashing to Barreto–Naehrig Curves2012-09-21Paper
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers2012-06-29Paper
Tightly-Secure Signatures from Lossy Identification Schemes2012-06-29Paper
A Nagell Algorithm in Any Characteristic2012-06-08Paper
Fully Homomorphic Encryption over the Integers with Shorter Public Keys2011-08-12Paper
Cryptanalysis of the RSA Subgroup Assumption from TCC 20052011-03-15Paper
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves2010-11-26Paper
Huff’s Model for Elliptic Curves2010-09-29Paper
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves2010-08-31Paper
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves2010-08-24Paper
Factoring Unbalanced Moduli with Known Bits2010-07-16Paper
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption2010-07-06Paper
Fault Attacks Against emv Signatures2010-03-16Paper
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures2009-10-20Paper

Research outcomes over time

This page was built for person: Mehdi Tibouchi