| Publication | Date of Publication | Type |
|---|
| Crypto dark matter on the torus. Oblivious PRFs from shallow PRFs and TFHE | 2024-11-13 | Paper |
| SLAP: succinct lattice-based polynomial commitments from standard assumptions | 2024-11-13 | Paper |
| Batch signatures, revisited | 2024-11-12 | Paper |
\textit{Caveat implementor!} Key recovery attacks on MEGA Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract) Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
| Estimating quantum speedups for lattice sieves | 2023-03-21 | Paper |
| Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) | 2022-11-09 | Paper |
Homomorphic Encryption Standard Protecting Privacy through Homomorphic Encryption | 2022-11-02 | Paper |
| Feistel structures for MPC, and more | 2022-08-25 | Paper |
| Tightly secure ring-LWE based key encapsulation with short ciphertexts | 2022-08-25 | Paper |
Sampling from arbitrary centered discrete Gaussians for lattice-based cryptography Applied Cryptography and Network Security | 2022-07-01 | Paper |
| Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance | 2022-04-22 | Paper |
| Subtractive sets over cyclotomic rings. Limits of Schnorr-like arguments over lattices | 2022-04-22 | Paper |
| Lattice attacks on NTRU and LWE: a history of refinements | 2022-02-25 | Paper |
| Round-optimal verifiable oblivious pseudorandom functions from ideal lattices | 2021-12-21 | Paper |
| On bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem | 2021-12-08 | Paper |
The vacuity of the open source security testing methodology manual (available as arXiv preprint) | 2021-07-06 | Paper |
Component allocation in make-to-stock assembly systems SN Operations Research Forum | 2021-06-17 | Paper |
| Exploring trade-offs in batch bounded distance decoding | 2020-07-21 | Paper |
Multilinear maps from obfuscation Journal of Cryptology | 2020-06-15 | Paper |
| Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC | 2020-05-11 | Paper |
| The general sieve kernel and new records in lattice reduction | 2020-02-06 | Paper |
| Estimate all the \(\{\)LWE, NTRU\(\}\) schemes! | 2018-10-17 | Paper |
| Notes on GGH13 without the presence of ideals | 2018-04-20 | Paper |
| Large modulus ring-LWE \(\geq \) module-LWE | 2018-04-06 | Paper |
| Revisiting the expected cost of solving uSVP and applications to LWE | 2018-04-06 | Paper |
Optimization of safety stocks in models with an order service level objective or constraint European Journal of Operational Research | 2018-02-06 | Paper |
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL Lecture Notes in Computer Science | 2017-06-13 | Paper |
MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
A Subfield Lattice Attack on Overstretched NTRU Assumptions Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Coordinating decentralized linear programs by exchange of primal information European Journal of Operational Research | 2016-10-06 | Paper |
Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Polly cracker, revisited Designs, Codes and Cryptography | 2016-05-19 | Paper |
Multilinear maps from obfuscation Theory of Cryptography | 2016-03-23 | Paper |
Implementing candidate graded encoding schemes from ideal lattices Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers Selected Areas in Cryptography | 2015-12-04 | Paper |
On the efficacy of solving LWE by reduction to unique-SVP Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
On the concrete hardness of learning with errors Journal of Mathematical Cryptology | 2015-10-13 | Paper |
Ciphers for MPC and FHE Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
The M4RIE library for dense linear algebra over small fields with even characteristic Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation | 2015-03-27 | Paper |
On the complexity of the BKW algorithm on LWE Designs, Codes and Cryptography | 2015-02-19 | Paper |
Determining near optimal base-stock levels in two-stage general inventory systems European Journal of Operational Research | 2015-02-18 | Paper |
Block ciphers -- focus on the linear layer (feat. PRIDE) Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Lazy modulus switching for the BKW algorithm on LWE Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
On the relation between the MXL family of algorithms and Gröbner basis algorithms Journal of Symbolic Computation | 2012-05-11 | Paper |
Breaking an identity-based encryption scheme based on DHIES Cryptography and Coding | 2011-12-16 | Paper |
Polly cracker, revisited Lecture Notes in Computer Science | 2011-12-02 | Paper |
| Efficient Dense Gaussian Elimination over the Finite Field with Two Elements | 2011-11-28 | Paper |
Algebraic precomputations in differential and integral cryptanalysis Information Security and Cryptology | 2011-07-29 | Paper |
On cipher-dependent related-key attacks in the ideal-cipher model Fast Software Encryption | 2011-07-07 | Paper |
Algebraic attacks on the Courtois toy cipher Cryptologia | 2011-06-17 | Paper |
| F4/5 | 2010-06-25 | Paper |
Supply chain coordination mechanisms. New approaches for collaborative planning Lecture Notes in Economics and Mathematical Systems | 2009-11-26 | Paper |
Algebraic Techniques in Differential Cryptanalysis Fast Software Encryption | 2009-08-11 | Paper |