Guilhem Castagnos

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient succinct zero-knowledge arguments in the CL framework
Journal of Cryptology
2025-01-17Paper
An improved threshold homomorphic cryptosystem based on class groups2025-01-10Paper
Pattern matching in encrypted stream from inner product encryption
Lecture Notes in Computer Science
2023-11-24Paper
Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups
Journal of Cryptology
2023-07-05Paper
Public Key Encryption with Flexible Pattern Matching
Lecture Notes in Computer Science
2023-05-26Paper
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security
Theoretical Computer Science
2022-11-17Paper
A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency
Theoretical Computer Science
2022-04-19Paper
Bandwidth-efficient threshold EC-DSA2021-12-01Paper
Two-party ECDSA from hash proof systems and efficient instantiations2020-03-09Paper
Practical fully secure unrestricted inner product functional encryption modulo \(p\)2019-01-23Paper
Encryption switching protocols revisited: switching modulo \(p\)2017-11-03Paper
Linearly homomorphic encryption from \(\mathsf {DDH}\)
Lecture Notes in Computer Science
2016-03-02Paper
High-order masking by using coding theory and its application to AES
Cryptography and Coding
2014-01-17Paper
Homomorphic encryption for multiplications and pairing evaluation
Lecture Notes in Computer Science
2012-09-25Paper
Factoring \(pq ^{2}\) with quadratic forms: Nice cryptanalyses
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
Lecture Notes in Computer Science
2008-11-20Paper
Towards a DL-Based Additively Homomorphic Encryption Scheme
Lecture Notes in Computer Science
2008-06-24Paper
Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems
Lecture Notes in Computer Science
2008-06-24Paper
An efficient probabilistic public-key cryptosystem over quadratic fields quotients
Finite Fields and their Applications
2007-06-29Paper


Research outcomes over time


This page was built for person: Guilhem Castagnos