| Publication | Date of Publication | Type |
|---|
Two-round threshold signature from algebraic one-more learning with errors | 2024-12-13 | Paper |
\textit{Flood and submerse}: distributed key generation and robust threshold signature from lattices | 2024-12-13 | Paper |
\textsf{Plover}: masking-friendly hash-and-sign lattice signatures | 2024-11-13 | Paper |
Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme | 2024-11-12 | Paper |
\textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON | 2024-08-30 | Paper |
On Gaussian sampling, smoothing parameter and application to signatures | 2024-08-30 | Paper |
Finding short integer solutions when the modulus is small Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Masking the GLP lattice-based signature scheme at any order Journal of Cryptology | 2024-01-23 | Paper |
Shorter hash-and-sign lattice-based signatures Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Fast reduction of algebraic lattices over cyclotomic fields | 2022-11-09 | Paper |
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} | 2022-08-30 | Paper |
On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes | 2022-07-06 | Paper |
Towards faster polynomial-time lattice reduction | 2022-04-22 | Paper |
The nearest-colattice algorithm: time-approximation tradeoff for approx-CVP Open Book Series | 2021-03-11 | Paper |
\(*\)-liftings for differential privacy | 2020-05-27 | Paper |
Relational \(\star\)-liftings for differential privacy | 2020-01-03 | Paper |
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond | 2019-12-10 | Paper |
Certified lattice reduction Advances in Mathematics of Communications | 2019-11-26 | Paper |
An assertion-based program logic for probabilistic programs | 2019-09-13 | Paper |
Synthesizing Probabilistic Invariants via Doob’s Decomposition Computer Aided Verification | 2019-05-03 | Paper |
Proving uniformity and independence by self-composition and coupling EPiC Series in Computing | 2019-01-10 | Paper |
LWE without modular reduction and improved side-channel attacks against BLISS | 2018-12-20 | Paper |
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols IEEE Transactions on Computers | 2018-12-04 | Paper |
Masking the GLP lattice-based signature scheme at any order | 2018-07-09 | Paper |
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures | 2018-02-16 | Paper |
Computing generator in cyclotomic integer rings. A subfield algorithm for the principal ideal problem in \(L_{|\varDelta_\mathbb {K}|}\left(\frac{1}{2}\right)\) and application to the cryptanalysis of a FHE scheme Lecture Notes in Computer Science | 2017-06-13 | Paper |
Relational reasoning via probabilistic coupling Logic for Programming, Artificial Intelligence, and Reasoning | 2016-01-12 | Paper |
Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE Lecture Notes in Computer Science | 2015-12-10 | Paper |