Fabrice Benhamouda

From MaRDI portal
Person:1629405



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Weighted secret sharing from wiretap channels2024-11-22Paper
SPRINT: high-throughput robust distributed Schnorr signatures2024-11-13Paper
Anonymous counting tokens2024-06-26Paper
Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation2023-04-13Paper
On the (in)security of ROS
Journal of Cryptology
2022-09-23Paper
Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms2022-08-25Paper
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
Computer Security -- ESORICS 2015
2022-08-19Paper
Mr NISC: multiparty reusable non-interactive secure computation2022-03-23Paper
On the (in)security of ROS
Lecture Notes in Computer Science
2021-12-08Paper
Multiparty reusable non-interactive secure computation from LWE2021-12-08Paper
Can a public blockchain keep a secret?2021-12-01Paper
On the local leakage resilience of linear secret sharing schemes
Journal of Cryptology
2021-06-28Paper
From single-input to multi-client inner-product functional encryption2020-05-11Paper
Algebraic XOR-RKA-secure pseudorandom functions from post-zeroizing multilinear maps2020-05-05Paper
Decentralizing inner-product functional encryption2020-01-28Paper
On the tightness of forward-secure signature reductions
Journal of Cryptology
2019-01-29Paper
Two-round adaptively secure multiparty computation from standard assumptions2018-12-11Paper
Related-key security for pseudorandom functions beyond the linear barrier
Journal of Cryptology
2018-11-01Paper
On the local leakage resilience of linear secret sharing schemes
Lecture Notes in Computer Science
2018-09-12Paper
Optimization of bootstrapping in circuits
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms
2018-07-16Paper
\(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits2018-07-09Paper
Hash proof systems over lattices revisited2018-05-29Paper
Robust non-interactive multiparty computation against constant-size collusion2017-11-03Paper
Private multiplication over finite fields2017-10-27Paper
CCA-secure inner-product functional encryption from projective hash functions
Lecture Notes in Computer Science
2017-06-13Paper
Removing erasures with explainable hash proof systems
Lecture Notes in Computer Science
2017-06-13Paper
Efficient cryptosystems from \(2^k\)-th power residue symbols
Journal of Cryptology
2017-05-22Paper
Randomness complexity of private circuits for multiplication
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Easing Coppersmith methods using analytic combinatorics: applications to public-key cryptography with weak pseudorandomness
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Implicit zero-knowledge arguments and applications to the malicious setting
Lecture Notes in Computer Science
2015-12-10Paper
An algebraic framework for pseudorandom functions and applications to related-key security
Lecture Notes in Computer Science
2015-12-10Paper
Disjunctions for Hash Proof Systems: New Constructions and Applications
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Public-key encryption indistinguishable under plaintext-checkable attacks
Lecture Notes in Computer Science
2015-08-27Paper
Better zero-knowledge proofs for lattice encryption and their application to group signatures
Lecture Notes in Computer Science
2015-01-16Paper
Related-key security for pseudorandom functions beyond the linear barrier
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
SPHF-friendly non-interactive commitments
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
New techniques for SPHFs and efficient one-round PAKE protocols
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Tighter Reductions for Forward-Secure Signature Schemes
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Public-Key Cryptography – PKC 2013
2013-04-19Paper


Research outcomes over time


This page was built for person: Fabrice Benhamouda